Site Map CHURCH COMMITTEE REPORTS |
NATIONAL SECURITY AGENCY SURVEILLANCE AFFECTING AMERICANS CONTENTS Page I. Introduction and Summary_____________________________________ 735 A. NSA's origins and official responsibilities_ _________________ 736 B. Summary of interception programs_ ______________________ 738 C. Issues and questions____________________________________ 742 II. NSA's Monitoring of International Communications_ __ _____ _______ 743 A. Summary of watch list activity __________________________ 743 B. History _______________________________________________ 744 C. Types of names on watch lists_ _______ ______ ___ ___ __ ___ __ 749 D. Overlapping nature of intelligence community requests_ ____ 750 E. Drug watch lists: United States-South American intercepts_ 752 F. Termination of the civil disturbance watch list activity____ 756 G. Authorizaljon__________________________________________ 761 H. Conclusions_ __________________________________________ 764 III. A Special NSA Collection Program: SHAMROCK_ _______________ 765 A. Legal restrictions____ __ ___ _____ __ __ __ ___ ___ __ _ _ 765 B. The committee's investigation_ ______ ______ ___ ___ ___ __ __ _ 766 C. The origins of SHAMROCK____________________________ 767 D. The participation of the companies_______________________ 770 E. NSA's participation_ ____________ __ __ ___ __ ___ __ _____ _ 774 F. Termination of SHAMROCK___________________________ 776 IV. NSA Personnel Security and Related Matters_ ___________________ 777 A. Background___________________________________________ 777 B. Questionable activities__ ______ _____ __ _ _____ _____ 777 (733) NATIONAL SECURITY AGENCY SURVEILLANCE AFFECTING AMERICANS I. INTRODUCTION AND SUMMARY This report describes the Committee's investigation into certain questionable activities of the National Security Agency (NSA).l The Committee's primary focus in this phase of its investigation was on NSA's electronic surveillance practices and capabilities, especially those involving American citizens, groups, and organizations. NSA has intercepted and disseminated international communications of American citizens whose privacy ought to be protected under our Constitution. For example, from August 1945 to May 1975, NSA obtained copies of many international telegrams sent to, from, or through the United States from three telegraph companies. In addition, from the early 1960s until 1973, NSA targeted the international communications of certain American citizens by placing their names on a "watch list." Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. In neither program were warrants obtained.2 With one exception,3 NSA contends that its interceptions of Americans' private messages were part of monitoring programs already being conducted against various international communications channels for "foreign intelligence" purposes. This contention is borne out by the record. Yet to those Americans who have had their communications- sent with the expectation that they were private-intentionally intercepted and disseminated by their Government, the knowledge that NSA did not monitor specific communications channels solely to acquire their messages is of little comfort. In general, NSA's surveillance of Americans was in response to requests from other Government agencies. Internal NSA directives now forbid the targeting of American citizens' communications. Nonetheless, NSA may still acquire communications of American citizens as part of its foreign intelligence mission, and information derived from these intercepted messages may be used to satisfy foreign intelligence requirements. NSA's current surveillance capabilities and past surveillance practices were both examined in our investigation. The Committee recog- 1 See the Committee's Foreign Intelligence Report for an overview of NSA's legal authority, organization and functions, and size and capabilities. 2 Since the NSA programs involving American citizens have never been challenged in court, the necessity of obtaining a warrant has not yet been determined. Although there 'have been court cases that involved NSA intercepts, NSA's activities have never been disclosed in open court. Spe pp. 765-766 of this Report and the Committee's Report on 'Warrantless FBI Electronic Surveillance for a dis('ussion of wftrrant rE"f)uiremE"nts for electronic surveillancE". 8 Between 1970 and 1973, NSA intercepted telephone calls between the United States and various locations in South America to aId the BNDD (now the Drug Enforcement Administration) in executing its responsibilitiees. See pp. 752-756. (735) 736 nizes that NSA's vast technological capability is a sensitive national asset which ought to be zealously protected for its value to our common defense. If not properly controlled, however, this same technological capability could be turned against the American people, at great cost to liberty. This concern is compounded by the knowledge that the proportion of telephone calls and telegrams being sent through the air is still increasing. In addition to reviewing facts and issues relating to electronic surveillance, the Committee also examined certain questionable activities of the NSA's Office of Security. See pp. 777-783. A. NSA's Origim and Official Respomibilities NSA does not have a statutory charter; its operational responsibilities are set forth exclusively in executive directives first issued in the 19508. One of the questions which the Senate asked the Committee to consider was the "need for specific legislative authority to govern the operations of ... the National Security A~ency." • According to NSA's General Counsel, no eXlstin~ statutes control, limit, or define the signals intelligence activities of NSA. Further, the General Counsel asserts that the Fourth Amendment does not apply to NSA's interception of Americans' international communications for foreign intelligence purposes.5 1.07igim NSA was established in 1952 bv a Top Spcret directive issued by President Truman.' Under this directive, NSA assumed the responsibilities of the Armed Forces Security Agency, which had been created after World War II to integrate American cryptolo~c efforts: These efforts had expanded rapidly after World War II as a result of the demonstrated wartime value of breaking enemy codes, particularly those of the Japanese. 2. Responsibilities (a) SUbject Matter Resp0'fl,.<jibilitws.-The executive branch expects NSA to collect political, economic, and military information as part of its "foreign intelligence" mission." "Foreign intelligence" is an ambiguous term. Its meaning changes, depending upon the pre- • Senate Resolution 21, Section 2 (8). • Roy Banner deposition, 2/4176, pp. 13, 16,39. Banner stated that signals intelligence activities are authorized by the President under Article II of the Constitution and "the Fourth Aml'ndment does not restrict these signals intelligence activities" if the "purpose is solely to obtain foreign intelligence." (Ibid., p. 39.) , Memorandum from President Harry S. Truman to Secretary of State and Secretary of Defense, "Communications Intelligence Activities," 10/24/52. 7 NSA exercises technical control over the three Service Cryptologic Agencies: the Army Security Agency, Naval Security Group Command, and Air Force Security Service. NSA's Director is always a military officl'r of at least three-star rank. He reports to the Secretary of Defense, but responds to requests from other intelligence agencies for intelligence information. " "The purpose [of forming NSA] was to maintain and improve this source of intelligence which was considered of vital importance to the national security, to our ability to wage war, and to the conduct of foreign affairs. This mission of NSA is directed to foreign inteUigC1lCe, obtained from foreign l'lectrical communications and also from other foreign shmal~ such as radars." [Emphasis added.] Lew Allen, Jr. testimony, 10/29/75, Hearings, Vol. 5, p. 6. 737 vailing needs and views of policymakers, and the current world situation. The internal politics of a nation also playa role in setting requirements for foreign intelligence; the domestic economic situation, an upcoming political campaIgn, and internal unrest can all affect the kind of foreign intelligence that a political leader desires. Thus, the definition constantly expands and contracts to satisfy the changing needs of American policymakers for information. This flexibility was illustrated in the late 1960s, when NSA and other intelligence agencies were asked to produce "foreign intelligence" on domestic activists in the wake of major civil disturbances and increasing- antiwar activities. NSA's authority to collect foreign intelligence is derived from a Top Secret National Security Council directive which is implemented by directives issued by the Director of Central Intelligence." These directives give NSA the responsibility for "Signals Intelligence" (SIGINT) and "Communications Security" (COMSEC). SIGlNT is subdivided into "Communications Intelligence" (COMINT) and "Electronics Intelligence" (ELINT). COMINT entails the interception of foreign communications and ELINT involves the interception of electronic signals from radars, missiles, and the like. The COMSEC mission includes the protection of United States Government communications by providing the means for enciphering messages and by establishing procedures for maintaining the security of equipment used to transmit them. NSA's interception of communications-the area on which the Committee focused-arises under the COMINT program. The controlling NSCID defines COMINT in broad terms as "technical and intelligence information derived from foreign communications by other than the intended recipients." 10 The same NSC directive also states that COMINT "shall not include (a) any intercept and processing of unencrypted written communications, press and propaganda broadcasts, or censorship." 11 . The specific exclusion of unencrypted written communications from NSA's mandate would appear to prohibit NSA's interception of telegrams. NSA contends that this exclusion is and always has been limited to mail and communications other than those sent electronically. 12 9 These are referred to as NSCIDs (Nati{)nal Security Council Intelligence Directives) and DelDs (Director of Central Intelligence Directives). 10 The effect of the "other than intended recipients" language is to make clear that the communication is intercepted by someone other than a party to the communication-in this case, the Government. 11 The relevant DCID contains thesatn:e definition. The exclusion is the same, except that after "communications" the words "except written plaintext versions of communications which have been encrypted or are intended for subsequent encryption" have been added. I' Banner disposition, 2/4/76, p. 71. The "written communications exclusion was added in 1958; the CIA's New York mail opening project had been underway since the early 19508. See the Committee's Report on CIA and FBI Mail Opening Programs. The exclusion of "press and propaganda broadcasts" may reflect the fact that OIA had been granted responsibility for intercepting, analyzing, and disseminating such foreign press broadcasts under its Foreign Broadcast Information Service (FBIS) program. In support of NSA's contention that "unencrypted written communications" refers to mail, it might be argued that the exclusion was designed to ensure that NSA would not engage in mail opening, which was under the CIA's jurisdiction. 738 The same NSCID which discusses foreign communications also states that NSA is to produce intelligence "in accordance with objectives, requirements, and priorities established by the Director of Central Intelligence with the advice of the United States Intelligence Board." USIB was composed of representatives from the FBI, CIA, Treasury Department, Energy Research and Development Administration, State Department, and Defense Department.!3 Since 1966, NSA annually received general requirements from USIB for the collection of foreign intelligence. These requirements ordinarily identified broad areas of interest, such as combating international terrorism, and ,vere supplemented by more specific "amplifying requirements" periodically submitted to NSA by other USIB members. (b) Geographw Re8pomibilitie8.-Although none of the applicable executive directives explicitly prohibit NSA from intercepting communications which occur wholly within the United States, internal NSA policy has always prohibited such interceptions. In practice, NSA limits itself to communications where at least one of the terminals is in a foreign country. This means that when Americans use a telephone or other communications link between this country and overseas, their words may be intercepted by NSA. (c) Jurisdiction with Re8pect to Nationality.-Although the controlling NSCID contains no limitation relating to the citizenship of persons whose "foreign communications" may be intercepted, the relevant DCID does exclude messages "exchanged among private organizations and nationals, acting in a private capacity, of the U.S.~' This restriction is designed to prevent NSA from processing communcations between two Americans, regardless of their location. In the late 1960s and early 1970s, however, NSA did intercept and disseminate some messages exchanged between two Americans where one of the terminals was foreign. NSA does not now knowingly process or disseminate messages where both the sender and recipient are American citizens, groups, or organizations. B. Summary of InterceptionProgramJ] The Committee's hearings disclosed three NSA interception programs: the "watch lists" containing names of American citizens; "Operation SHAMROCK," whereby NSA received copies of millions of telegrams leaving or transiting the United States: and the monitoring of certain telephone links between the United States and South America at the request of the Bureau of Narcotics and Dangerous Drugs. In addition, the Committee's investigation revealed that although NSA no longer includes the names of specific citizens in its selection criteria, it still intercepts international communications of Americans as I?art of its foreign intelligence collection activity. Information derived from such communications is disseminated by NSA to other intelligence agencies to satisfy foreign intellig-ence requirements. " USIB was formally abolished by Presidential directive of February 18, 1976. No comparable group was established to replace it, but the directive authorized the Director of Central Intelligence to create such a body. 739 1. Watoh Lists Oontaining Names of Amerioans From the early 1960s until 1973, NSA intercepted and disseminated international communications of selected American citizens and groups on the basis of lists of names supplied by other Government agencies. In 1967, as part of a general concern within the intelligence community over civil disturbances and peace demonstrations, NSA responded to Defense Department requests by expanding its watch list program. Watch lists came to include the names of individuals, groups, and organizations involved in domestic antiwar and civil rights activities in an attempt to discover if there was "foreign influence" on them.a In 1969, NSA formalized the watch list program under the codename MINARET. The program applied not only to alleged foreign influence on domestic dissent, but also to American groups and individuals whose activities "may result in civil disturbances or otherwise subvert the national security of the U.S." 15 At the same time, NSA instructed its personnel to "restrict the knowledge" that NSA was collecting such information and to keep its name off the disseminated "product." 16 Prior to 1973, NSA generally relied on the agencies requesting information to determine the propriety and legality of their actions in submitting names to NSAY NSA's new ~irector, General Lew Allen, Jr., indicated. some concern about Project MINARET in August 1973, and suspended the dissemination of messages under the program. In September 1973, Allen wrote the agencies involved in the watch lists, requesting a recertification of their requirements, particularly as to the appropriateness of their requests. In October 1973, Assistant Attorney General Henry Petersen and Attorney General Elliot Richardson concluded that the watch lists were of "questionable legality" and so advised NSA.18 In response, NSA took the position that although specific names had been targeted, the communications of particular Americans included on the watch lists had been collected "as an incidental and unintended act in the conduct of the interception of foreign communications." Allen concluded: [NSA's] current practice conforms with your guidance that "relevant information acquired [by NSA] in the routine pur- U Although the agencies submitting names to NSA were members of the United States Intelligence Board, USIB never approved a watch list requirement on civil disturbances, or discussed the monitoring of American citizens' communications. 15MINARET Charter, 7/1/69, Hearings, Vol. 5, Exhibit No.3, pp. 149-150. 16 Ibid. 11 Allen, 10/29/75, Hearings, Vol. 5, pp. 31-32. 18 Letter from Elliot Richardson to Lew Allen, Jr., 10/1/73, Hearings, Vol. 5, Exhibit No.7, pp. 160--161. Petersen reported to Richardson that he had discovered the watch list program ("of which we had no previous knowledge") as a result of inquiries made to the FBI and other intelligence agencies with respect to possible electronic surveillance undertaken by such agencies in connection'with a criminal prosecution. In one case in which NSA reported that it had conducted such surveillance, the Government elected to drop the prosecution. See pp. 757-758, 761. Memorandum from Henry Petersen to Elliot Richardson, 9/4/73. 740 suit of the collection of foreign intelligence information may continue to be furnished to appropriate government agencies.19 f. 0 btaining Oopies of Messages from I nternati01U1l Telegraph Oompanies: Operation SHAMROOK From August 1945 until May 1975, NSA received copies of millions of international telegrams sent to, from, or transitmg the United States. Codenamed Operation SHAMROCK, this was the largest governmental interception program affecting Americans, dwarfing CIA's mail opening program by comparison. Of the messages provided to NSA by the three major international telegraph companies, it is estimated that in later years approximately 150,000 per month were reviewed by NSA analysts. NSA states that the origInal purpose of the program was to obtain the enciphered telegrams of eertain forei~ targets. Nevertheless, NSA had aecess to virtually all the internatIOnal telegrams of Americans carned by RCA Global and ITT World Communications.20 Once obtained, these telegrams were available for analysis and dissemination according to NSA's selection criteria, which included the watch lists. The SHAMROCK program began in August 1945, when representatives of the Army Signals SecurIty Agency approached the commercial telegraph compames to seek post-war aecess to foreign governmental traffic passing over the facilities of the companies. Despite advice from their attorneys that the contemplated mtercept operation would be illegal in peaeetime, the companies agreed to participate, provided they received the personal assurance of the Attorney General of the United States that he would protect them from suit, and that efforts be immediately undertaken to legalize the intercept operation. Apparently these assurances were forthcoming, because the intercept program began shortly thereafter.2oa In 1947, representatives of the companies met with Secretary of Defense Forrestal to discuss their continued participation in SHAMROCK. Forrestal told them that the program was "in the highest interests of national security" and urged them to continue.'11 The companies were told that President Truman and Attorney General Tom C. Clark approved and that they would not suffer criminal liability, at least while the current Administration was in office. Those assurances were renewed in 1949, when it was again emphasized that future administrations could not be bound. There is no evidence that the companies ever sought such assurances again. 10 Letter from Lew Allen, Jr. to Elliot Richardson, 10/4/73, Hearings, Vol. 5, Exhibit No. 8, pp. 162-163. 20 Western Union International provided NSA only with copies of the messages of the foreign targets, except for messages to one country, where it provided everything. - A letter, dated August 24, 1945, from the Army officer responsible for making the arrangements with the companies states that ITT would begin participation in SHAMROCK the last week in August. Another letter, dated October 9, 1945, from RCA to the Army states that it would 'begin participation immediately. See pp. 768-769. n Testimony of Robert Andrews, Special Assistant to the General Counsel, Department of Defense, 9/23/75, p. 34. 741 Throughout the operation NSA never informed the companies that it was analyzing and disseminating telegrams of Americans. Yet the companies, who had feared in 1945 that their conduct might be illegal, apparently never sought assurances that NSA was limitmg its use to the messages of the foreign targets once the intercept program had begun. 3. Monitoring of South American Links for Dmg Traffic Oontrol Purposes From 1970 to 1973, at the request of the Bureau of Narcotics and Dangerous Drugs, NSA monitored selected telephone circuits between the United States and certain countries in South America to obtain information relating to drug trafficking. The BNDD was initially concerned about drug deals that were being arranged in calls to a South American city from public telephone booths in New York City. The Bureau determined that it could not legally tap the public telephones and enlisted NSA's help to monitor international communications links that carried these telephone calls. Thus, instead of intercepting calls from a few telephone booths, as the BNDD would have done with a wiretap, NSA had access to international calls placed from, or received in, cities aU over the United States that were switched through New York.zz In addition, BNDD submitted the names of 450 Americans to NSA for a "drug" watch list. This list resulted in the dissemination of about 1,900 reports on drug traffickers to BNDDand CIA. The CIA began to assist NSA's monitoring effort in late 1972, but later determined that the program served a law enforcement function and terminated its participation in February 1973.23 NSA was affected by the CIA decision, as it had come to view this program as possibly serving a law enforcement function and thus beyond the scope of its proper mission. NSA terminated this activity in June 1973, but continued to monitor some of the same United States-South American links for foreign intelligence purposes until July 1975. 4. "Incidental" Intercepts of Americans' Oommunications Although NSA does not now target communications of American citizens, groups, or organizations for interception by placing their names on watch lists, other selection criteria are used which result in NSA's reviewing many communications to, from, or about an American. The initial interception of a stream of communications is analogous to a vacuum cleaner: NSA picks up all communications carried over a specific link that it is monitoring. The combination of this technology and the use of words to select communications of interest results in NSA analysts reviewing the international messages of American citizens, groups, and organizations for foreign intelligence. The interception and subsequent processing of communications are conducted in a manner that minimizes the number of unwanted mes- .. According to the International Telephone and Telegraph Company, calls from American cities to South America are routinely switched through New York. .. CIA's participation in this activity violated provisions of its charter, the National Security Act of 1947, which prohibit the Agency from exercising law enforcement powers. NSA does not have a charter prohibiting such activity, but recognizes that it has no law enforcement function. 742 sages. Only after an analyst determines that the content of a message meets a legitimate requirement will it be disseminated to the interested intelligence agencies. In practically all cases, the name of an American citizen, group, or organization is deleted by NSA before a message is disseminated. Internal NSA guidelines ensure that the decision to disseminate an intercepted communication is now made on the basis of the importance of the foreign intelligence it contains, not because a United States citizen, group, or organization is involved. This procedure is, of course, subject to change by internal NSA directives. In short, NSA's pUrsUIt of international communications does result in the incidental interception and dissemination of communications which the American sender or receiver expected to be kept private. This issue of the latitude NSA should be given in disseminating incidental intercepts must be dealt with if we are to resolve the dilemma between the need for effective foreign intelligence and the need to protect the rights of American citizens.24 O. /strUes and Questions Pursuant to its mandate, the Committee has studied whether NSA's jurisdiction and operations should be governed and controlled by a legislative charter. The facts discovered by the Committee with respect to NSA's programs and ca{>abilities suggest that the following questions should be posed for legxslative resohltion: 1. Should NSA, which like the CIA has vast powers intended for "foreign" purposes, be barred from using those powers domestically'? 2. Should NSA, hke the CIA, be prohibited from exercising "law enforcement powers" or "internal security functions'''~ 3. Should NSA be permitted specifically to target the international communications of Americans? If so, for what purposes and should a warrant be required? 4. Should NSA be permitted to disseminate information derived from the "incidental" interception of Americans' mes- .. The establishment of guidelines relating directly to this issue poses an ongoing problem. Some may argue that NSA's current policy to disguise the identity of an American corporation in a communication is misguided. It could be held that, in the case of companies, their right to privacy does not extend as far as with individual citizens. For example, if an intercepted communication indicates that an American company executive is negotiating with a foreign government for the sale of large quantities of a crucial material, should the Federal Government be entitled to know the identity of the company? If NSA discovered that an American firm is exporting material to a foreign country that is prohibited by law, should the Government be allowed to know the name of that company? Or, does NSA violate the Fourth Amendment rights which protect Americans from unreasonable searches and seizures by disseminating such messages without deleting the names? Should special procedures be instituted-such as approval of the Attorney General or acquisition of a warrant-before messages containing U..S. names can be disseminated? A discussion of these issues of interception and dissemination occurred in an open session of the Committee between Attorney General Edward H. Levi and Professor Philip B. Heymann. Levi supported the dissemination by NSA of incidentally intercepted foreign intelligence information involving Americans without a warrant; Heymann maintained that dissemination should require a warrant. See Edward H. Levi and Philip B. Heymann testimonies, 11/6/75, Hearings, Vol. 5. pp. 6&-143. 743 sages obtained by monitoring an international communications link for foreign intelligence purposes? If so, to whom, for what use, and under what controls? II. NSA'S MONITORING OF IN'J.1ERNATIONAL COMMUNICATIONS A. Summary of the Watcn List Activity Lists of words and phrases, including the names of individuals and groups, have long been used by the National Security Agency to select information of intelligence value from intercepted communications. These lists are referred to as "watch lists" by NSA and the agencies requesting intelligence information from them, such as the Federal Bureau of Investigation, Central Intelligence Agency, Bureau of Narcotics and Dangerous Drugs, Secret Service, and Department of Defense. The great majority of names on watch lists have always been foreign citizens and organizations. The Committee examined two types of watch lists which included Americans. One focused on domestic civil disturbances, the other on drug trafficking. Messages selected on the basis of these watch lists were analyzed and forwarded to other Federal agencies, including the FBI, CIA, BNDD, and DOD. The Secret Service also received information from NSA regarding potential threats to persons under its protection. Between 1967 and 1973, NSA received watch lists from these agencies which included the names of Americans as well as foreign citizens and organizations. These lists were used to select messages from intercepted traffic and to discover whether there was foreign mfluence on, or support of, domestic antiwar and civil rights activities. From 1970 until 1973, similar lists were used to gather intelligence on international drug traffic. NSA itself added names to the watch lists to enhance the selection criteria used to support the requirements levied by other agencies.25 NSA's Office of Security also added names to the lists for counterintelligence and counterespionage purposes.26 Between 1969 and 1973, NSA disseminated approximately 2,000 reports (e.g., the text or summaries of intercepted messages) to the various requesting agencies as a result of the inclusion of American names on the watch lists.27 No evidence was found, however, of any significant foreign support or control of domstic dissidents. .. General Lew Allen, Jr. said this process "was a martter of adding aliases . . . of adding addresses in some cases where an organization had been specified, and it would assist picking up messages of that organization, the names of officials of the organizations [were thus] added to enhance the selection process." Allen, 10/29/75, Hearings, Vol. 5, p. 27. Another NSA official later advised the Committee that names were added by NSA in its amplification of watch lists and that this "was usually done either by adding the name of an executive officer of an organization, or by adding the organization name associated wirth a person who was placed on the watch list by another agency." (Letter from NSA to Senate Select Committee, 11/6/75.) .. NSA response to Senate Select Committee interrogatories, 8/22/75, pp. 3-6. (Cited hereinafter as XSA Response, 8/22/75.) See pp. 781-782. 27 The material collected between 1007 and the fall of 1969 was destroyed by NSA which only retains documents less than five years old. The approximately 2,000 reports are only for the post-1969 period. 744 Information generated by the watch list activity was the product of collection conducted against channels of international communications ("links") with at least one terminal in a foreign country. Neverthe~ less, the messages NSA intercepted and disseminated were sometimes between two American citizens, one in the United States and one abroad. With one exception, NSA intercepted messages only from "l~~" it was already monitoring as part of its foreign intelligence mISSIon. This exception occurred in 1970, when the Bureau of Narcotics and Dangerous Drugs asked NSA to provide intelligence on international drug trafficking. NSA began to monitor certain international communications links between the United States and South America to acquire intelligence on drugs entering the United States. The BNDD also supplied NSA with the names of Americans suspected of drug trafficking for inclusion on a wat{lh list. Reports on drug-related activities of American citizens were disseminated to both the BNDD and CIA. Both the drug and "nondrug" watch lists of United States citizens were discontinued in 1973 as a result of questions concerning their legality and propriety, raised by the Justice Department and by NSA itself. B. History 1. Early Period: 1960-1967 The exact details of the origin of the watch list activity are unclear. Testimony from NSA employees indicates that the early 19608 marked the beginnin~of watch lists and the inclusion of names of American citizens. Accordin~ to a senior NSA official, ''the term watch list had to do with a list of names of people, places or events that a customer would ask us to have our analysts keep in mind as they scan large volumes of material." 28 Originally these lists were used for two purposes: (1) monitorin~ travel to Cuba and other communist countries; and (2) protectin~ the President and other high Government officials. According to NSA, neither of these tasks involved a regular .program for including American names on the lists: requests from other agencip.s were infrequent and generally ad hoc.29 Prior to 1962, NSA did not have an office specifically in charge of interagency dealings, which also limited the number of requests for information from other agencies. In the parly 1960s requesting agencies, usuallv the FBI, submitted names of United States citizens and business firms having dealings with Cuba to NSA. In turn, NSA provided the FBI with intelli~nce on American commercial and personal communications with Cuba. A May 18, 1962, internal FBI memorandum from Raymond Wannall, Chief of the Nationalities Intellig-ence Section of the Domestic Intelli~ ence Division. to Assistant Director William Sullivan reported' on a meeting with NSA officials concernin~ Cuba. The purpose of the meeting was to devise a way for the FBI to make better use of NSA intercepts relating to "commercial and personal communications be- .. Senior NSA official No.1 testimony, 9/16/75, p. 47. "Ibid., pp.47-49; senior NSA official NO.2 testimony, 9/18/75, p. 13. 745 tween persons in Cuba and in the United States." 30 The memorandum stated: of the raw traffic now available, the material which would be most helpful to us would consist of periodic listing of firms in the U.S. which are doing business with individuals in Cuba and the Cuban government.... \Vith regard to personal messages, we feel that those relating to individuals travelling between Cuba and the U.S. would be the most significant.... We will furni8h NSA a li8t of persons in WMm we have an irvvestigative or an intelligence interest. [~mphasis added.pI The second area of concern in the early 1960s was protection of the President. According to NSA, the Secret Service submitted the names of the Presidents and others under its protection, possibly as early as 1962.32 This activity, however, was not instituted for the purpose of acquiring the communications of the protectees, but to determine possible threats to their well-being. After President Kennedy was assassinated in November 1963, interest in presidential protection naturally intensified, and NSA's joint efforts with the Secret Service were expanded. This early activity was not directed against American citizens; no intelligence program called for the systematic inclusion of American citizens on a watch list. The evidence indicates, however, that NSA did intentionally monitor certain international activities of some American citizens as early as 1962. These objectives, which began as legitimate concerns for the life of the President, expanded when the watch list activity intensified in 1967. f3. Systematic Inclusion of American Names: 1967 The major watch list effort against American citizens began in the fall of 1967. In response to pressures from the White House, FBI, and Attorney General, the Department of the Army established a civil disturbance unit. An area of special interest was possible foreign involvement in American civil rights and antiwar gToups. General William Yarborough, the Army Assistant Chief of Staff for Intelligence (ACSI), directed the operations of this unit.33 III Memorandum from Raymond Wannall to William Sullivan, 5/18/62. at Ibid. Wannall testifif'd that names were. in fllct, sent to NSA by the FBI in the early 19608. Raymond Wannall testimony, 10/3/75, p. 18. 32~SA Response 8/22/75, p. 12. .. William Yarborough testimony, 9/10/75, p. 8. "Que8tion: Did you ever have the feeling that these instructions were coming from the President or somebody else in the White House? "General YARBOROUGH: There was a lot of evidence to indicate that the President was deeply interested, as were the Attorney General and the Director of the FBI. There was a great deal of public interest. In other words, the interest was not just within the military at all. "Que8tion: But you don't have any evidence or knowledge of a direct order from the President to the Secretary of Defense with regard to setting up a civil disturbance unit within the Department of the Army? "General YARBOROUGH: I would not have a way to know about that direct relationship unless I found it out by chance. I did not know. A complete examination of the U.S. military's participation in collecting intelligence on domestic dissidents is contained in the Committee's Report: "Improper Surveillance of Private Citizens by the Military." 746 On October 20, 1967, Yarborough sent a message to the Director of NSA, General Marshall Carter, requesting that NSA provide any available information concerning possible foreign influence on civil disturbances in the United States. Yarborough specifically asked for "any information on a continuing basis" concerning: A. Indications that foreign governments or individuals or organizations acting as agents of foreign governments are controlling or attempting to control or influence the activities of U.S. "peace" groups and "Black Power" organizations. B. Identities of foreign agencies exerting control or influence on U.S. organizations. C. Identities of individuals and organizations in U.S. in contact with agents of foreign governments. D. Instructions or advice being given to U.S. groups by agents of foreign governments.34 A senior NSA official knowledgeable in this area testified that such a request for information on civil disturbances or political activities was "unprecedented. . . . It is kind of a landmark in my memory; it stands out as a first." 35 The initial request was also vague; it did not discuss the targeting of American citizens, or what specific organizations or groups were of interest. The Army was "interested in determining whether or not there is evidence of any foreign action to develop or control these anti-Vietnam and other domestic demonstrations." 36 The following day, Carter sent a cable to Yarborough, Director of Central Intelligence Richard Helms, and each member of the United States Intelligence Board, informing them that NSA was "concentrating additional and continuing effort to obtain SIGINT" in support of the Army request.31 Although USIB members were notified of this new requirement, there is no rerord of disclission at USIB meetings of the watch list, nor did USIB ever validate a requirement for monitoring in support of the civil disturbance unit.38 'Vatch list names were submitted directlv to NSA bv the FBI, Secret Service, Defense Intelligence Agency, the mIlitary services, and the CIA. These same agencies received reports of intercepted communications pertaining to their areas of interest. The State Department also received some reports on international terrorism and drug activities, but it is unclear whether they submitted any American names.39 Between 1967 ancl1973, a cumulative total of about 1.200 American names anpeared on the civil disturbance watch list. The FBI submitted the largest proportion, approximately 950. The Secret Serv- •• Cahle from Yarborough to Carter, 10/20/67. Hearings, Vol. 5, Exhibit No.1, pp. 145-146. .. Senior official No. I, 9/16/75, pp. 57. 54. 36 ('ahle from Yarborough to Carter, 10/20/67; Hearings, Vol. 5, Exhibit No.1, pp. 145-146. lIT ('ahie from Carter to Yarborough, 10/21/67, Hearings, Vol. 5, Exhibit No.2, pp. 147-148. .. Allen, 10/29/75. Hearings, Vol. 5, p. 28. .. Senior NSA official No.1, 9/16/75, p. 76. 747 ice's list included about 180 American individuals and groups active in civil rights and antiwar activities. The DIA submitted the names of 20 American citizens ,vho tra,-c]cd to Xorth Vietnam, and the CIA submitted approximately 30 names of alleged American radicals. The Air Force Office of Special Investigations, the Naval Investigative Service, and the Army Assistant Chief of Staff for Intelligence all submitted a small number of names to NSA. In addition, NSA contributed about 50-75 names to support the watch list activity. At its height in early 1973, there were 600 American names and 6,000 foreign names on the watch lists.40 According to NSA, these lists produced about 2,000 reports that were disseminated to other agencies between 1967 and 1973. NSA estimates 10 percent of these reports were derived from communications between two American citizens.41 3. Increa8ing Se1cwity and Concealment of Program.'j Involving A l1u!7ican Citizens The watch list activity was always a highly sensitive, compartmented operationY The secrecy was not due to the nature of the communications intercepted (most were personal and innocuous) but to the fact that American citizens were involved. NSA requested that some of the agencies receiving watch list product either destroy the material or return it within two weeks.43 This procedure was not followed with even the most sensitive of NSA's legitimate foreign intelligence product. When NSA intercepts, analyzes, and disseminates a foreign com· munication, the regular procedure is for the communication to be classified, given a serial number, and filed. From 1967-1969, much of the watch list material was treated in this manner, and given the same classification as the most sensitive NSA intercepts. As a senior NSA official testified: During the 1967-1969 period, communications that had a U.S. CItizen on one end and a foreigner on the other were given [a high level security classification] ... and went out as serialized product, through a limited by name only distribution. 44 Other material was even more highly classified. Whenever communications between two Americans ,vere intercepted, they were classified Top Secret, prepared with no mention of NSA as the source, and disseminated "For Background Use Only." 45 No serial number was assigned to them, and they were not filed with regular communications .. Allen,10/29/75, Hearings, Vol. 5, p.12. 1.1 Ibid. '" In an effort to prevent disclosure of the program, NSA "compartmented" the actiVity by restricting the number of officials within the agencies Who had access to the material. General Allen stated: "in my judgment the controls which were placed on the handling of the intelligence were so restrictive that the value was significantly diminished." Allen, 10/29/75, Heurings, Vol. 5, p. 13. 4' Staff summaries of Michael Mastrovito (Secret Service) interview,10/17/75; and 'Of Philip Smith and Gerald Strickler (Drug Enforcement Administration) interviews, 10/7/75. .. Senior NSA official No.2, 9/18/75, pp. 39-40. 65 Ibid., p. .w. 69-984 0 - 76 - 48 748 intelligence intercepts. This effectively limited access to the material and prevented its use in any official study or report. As Benson Buffham, Deputy Director of NSA, testified: first it is true that we maintain permanent type records of all of our product. However, it is my understanding that this material was dealt with separately. It was not serialized and put out in regular distribution lists. These items were produced as display items, show-to items and thus the normal procedures that would be followed for our serialized product were not followed. So as best as I know, there would not be any record of this material held in other places within the Agency in the permanent files. 46 The project's sensitivity was due to a number of factors. The requirements- protection of the President, terrorism, civil disturbances, drug activities-involved sensitive subjects. NSA also wanted to ensure protection of the SIGINT source and of other intercept operations, which could be ieopardized by unauthorized release of the watch list materialY Finally, American citizens, firms, and groups were involved, and this was "different from the normal mission of the National Security Agency." 48 The faet that NSA did not serialize and file the intercepted communications between Americans indicates they did not view this activity as part of their "nonnal" mission. Buffham stated that he believed the interception and dissemination of communications betwoon American citizens to be outside NSA's mission, as defined in applicable executive directives.49 4. Project MINARET: Further Ewpamion and Increa8ed Secrecy The civil disturbance watch list program became even more compartmented in July 1969, when NSA issued a charter to establish Project MINARET. MINARET established more stringent controls over the information collected on American citizens and groups involved in civil disturbances. To enhance security, MINARET effectively classified all of this information as Top Secret, "For Background Use Only," and stipulated that the material was not to be serialized or identified with the National Security Agency. Prior to 1969, only communications between two Amencam were classified in this manner; with the adoption of MINARET, communications to, from, or mentioning United States citizens were so classified. The MINARET charter established tighter security procedures for intercepted messages which contained: a. information on foreign governments, organizations, or individuals who are attempting to influence, coordinate or control U.S. organizations or individuals who may foment civil disturbance or otherwiRe undermine the national security of the U.S. ; .. Benson Buffham testimony, 9/12/75, p. 34. .. Senior NSA official No.1, 9/16/75, p. 69. U Senior NSA official No.2, 9/18/75, p. 38. .. Bu1fham, 9/12/75, p. 73. 749 b. information on U.S. organizations or individuals who are engaged in activities which may result in civil disturbances or otherwise subvert the national security of the U.S. An e([lViay important (J)Jpect of MINABET will be to restmt the knowledge that such infor11U1tion is being collected and processed by the National Security Agerwy. [Emphasis added.] 50 This charter was prepared within NSA and issued by an NSA Assistant Director. According to testimony given the Committee, the charter was discussed with NSA Deputy Director Louis Tordella and probably with the Director, but other agencies involved in the watch list activity were not informed of the new procedures until the charter had been adopted.51 In addition to regulating the distribution and format of watch list product, MINARET also initiated a more formal procedure for submission of names. No longer were names accepted over the telephone or by word of mouth.52 According to NSA, the watch list "was handled less systematically prior to 1969 ... some watch lists entered NSA during that time via direct channels, including secure ,telephone." 53 NSA maintains, however, that the regular procedure was for agencies submitting names by secure telephone or in person to eonfirm them with written requests. A senior NSA official testified: "From 1969 on [the watch list] was handled in a very careful, reviewed and systematic way." 54 The MINARET charter was an effort both to restrict knowledge of the watch list program and to disguise NSA's participation in ~t. NSA maintains that its concern for the security of SIGINT sources, i.e., NSA's intercept operations, was the primary reason for initiating these measures.55 NSA further maintains that it was concerned with the privacy of U.S. communications and, by imposing the MINARET restrictions, sought to ensure that dissemination was made exclusively to those outside NSA who had a legitimate need for the infonnation. It is apparent that the MINARET restrictions also prot~ted NSA's role from exposure. Dissemination of foreign communications to domestic agencies was obviously a sensitive matter. It involved considerable risk of exposure which would increase if the number of people within the intelligence community who were aware of the activity grew. Therefore, NSA placed more restrictive security controls on MINARET material than it placed on other highly classified foreign intercepts in order to conceal its involvement in activities which were beyond its regular mission. O. Types of Na:mes on Walch Lists The names of Americans submitted to NSA for the watch lists ranged from members of radical political groups, to celebrities, to "'MINARET Charter, 7/1/69. Healing-s. VoL ii, Exhihit No.!J, pp. 149-150. 51 Bu1!ham, 9/12/75, pp. 50, 49; senior NSA official No.1, 9/16/75, p. 68. 53 Senior NSA official No. 9/16/75, p. 78. 53 NRA Response, 8/22/7;'). p. 12. In this written response, NSA confirmed reports the Committee had received from other agencies that prior to 1969 watch list requests were occasionallY communicated to NSA by telephone or in person. See Mastrovito (staff summary), 10/17/75; Wannall, 10/3/75, p. 32; Smith and Strickler (staff summary), 10/7/75. 50 Senior NSA official No.2, 9/18/75, p. 19. IS Senior NSA official No.1, 9/16/75, p. 69. 750 ordinary citizens involved in protests against their Government. Names of organizations were also included; some were communistfront groups, others were nonviolent and peaceful in nature. The use of names, particularly those of groups and organizations, to select international communications results in NSA unnecessarily re\' ie\Ying many messages. There is a multiplier effect: if an organization is targeted. all its member's communications may be intercepted; if an individual is on the watch list, all communications to, from, or mentioning that individual may be intercepted. These communications may also contain the names of other "innocent" parties. For example, a communication mentioning the wife of a U.S. Senator was intercepted 'by NSA, as were communications discussing a peace concert, a correspondent's report from Southeast Asia to his magazine in New York, and a pro-Vietnam war activist's invitations to speakers for a rally. According to testimony before the Committee, the material that resulted from the watch lists was not very valuable; most communications were of a private and personal nature, or involved rallies and demonstrations that were public knowledge.56 D. 01'erlapping Nature of I1ltelligen<Je Community Requests As noted above, the primary purpose of the watch Ih,ts on Americans from 1967-1973 was to collect intelligence on civil disturbances. NSA also responded to a requirement from BNDD to monitor for illegal drug trafficking from 1970-1973. In addition, NSA supplipd information to Federal agencies (FBI, CIA, Secret Service, and Department of Defense) on possible terrorist activity, and disseminated reports to the Secret Service which related to the protection of the President. The demarcations between these categories, however. was not always clear. Secret Service officials, for example, have told the Committee that presidential and executive protection includes "providing a secure environment" for the White House for foreign embassies within the United States and in areas where high Government officials travel. According to the Secret Service, this requires "information regarding civil disturbances and anti-American or anti-U.S. Government demonstrations in the U.S. or overseas, as these demonstrations may affect the Secret Service's mis:o":ion of protecting U.S. and foreig-n officials." 51 After the October 20, 1987, Yarborough cable, the Secret Service began submitting names of individuals and organizations active in the antiwar and civil rights movements to NSA. Although these individuals and groups were not considered a direct threat to protectees, it was believed they might participate in demonstrations against United States policy which would endanger the physical well-being of Government officials.58 Intercepted communications to, from, or mentioning these individuals and groups were always disseminated by NSA to the Spcret SPrvice and the CIA, and often to the FBI. /iIJ WannalI, 10/3/75, p. 13. He stated: "the feeling is that there was very little in the way of good product as a result of our having supplied names to NSA." General Allen, however, told the Committee in public session: "we are aware that a major terrorist Rl't in the U.S. was prevented. In addition, some lar/i:e drug shipments wl're prevented from enteriu2' thl' n.s. he<>ause of oU1~ efforts on international narcotics trafficking." Allen, 10/29/75, Hearings, Vol. 5, pp. 12-13. '1 NSA response, 8/22/75. " Secret Service response to Senate Select Committee. 10/12/75. 751 There was considerable overlap among various agencies in submissions for watch list coverage and requests for material. For example, the CIA was interested in : The activities of u.s. individuals involved in either civil disorders, radical student or youth activities, racial militant activities, radical antiwar activities, draft evasion/deserter support activities, or in radical related media activities, where such individuals have some foreign connection by virtue of: foreign residence, foreign travel, attendance at international conferences or meetings andjor involvement or contact with foreign governments, organizations, political parties or individuals; or with Communist front organizations. [Emphasis added.] 59 The FBI was interested in similar kinds of information, as illustrated by excerpts of two memoranda from J. Edgar Hoover to the Director, NSA: This is to advise you that this Bureau has a continuing interest in receiving mtelligence information obtained under MINARET regarding the targets previously furnished you. . . . Information derived from this coverage has been helpful in determining the extent of international cooperation among New Leftists and has been used. for lead purposes.60 The purpose of this communication is to advise of general areas of interest to this Bureau in connection with racial extremist matters and to request your assistance in such matters. There are both white and black racial eietremists in the United States advocating and participating in illegal and violent activities for the purpose of destroying our present form of government. Because of this goal, such racial eietremists are natural allies of foreign enemies of the United States. Both material and propaganda support is being given to United States racial extremists by foreign elements. The Bureau is most interested in all information showing ties between United States radal extremists and such foreign elements. [Emphasis added.] 61 These requests reflect an underlying similarity of interests among agencies, despite the differing needs which are expressed in their requirements. To some extent the DIA, FBI, CIA, and the Secret Service received information on Black activists and groups, and on the antiwar movement. All were concerned with how civil disturbances and antiwar demonstration were affecting the internal security of the United States. Although their general area of concern was the same, each agency used the information for its own particular purposes. The DIA was interested in travel to North Vietnam; the CIA kept files on alleged antiwar radicals for its Project CHAOS; 51 NSA Response, 8/22/75, p. 17. 60 Memorandum from J. Erlgar Hoover to Director, ~SA 6/3/70. 01 Memorandum from J. Edgar Hoover to Director, NSA, 11/6/70. 752 the FBI used the information to develop "leads" on new left activists, at the same time it was conducting COINTELPRO efforts against alleged radicals; 62 and the Secret Service was concerned with protecting the President. Despite slight variations in focus, the different agencies' requests reflected the overriding fear that the nation was being undermined internally and externally. It was this perception which produced the watch list program directed against Americans. E. Drug lVatch Lists: United States-South Amel'ican Intercepts 1. Initial Monitoring: 1970 An unofficial requirement to collect and disseminate international communications concerning drug trafficking was levied on NSA by the Bureau of Narcotics and Dangerous Drugs on April 10, 1970. BNDD Director John Ingersoll sent a memorandum to NSA Director Noel Gayler requesting "any and all COMINT information which reflects illicit traffic in narcotics and dangerous drugs.~' NSA initiated its monitoring in .June 1970, but a general requirement to obtain foreign intelligence on drug trafficking was not validated by the United Stat€s Intelligence Board until August H171. The Ingersoll memorandum specified that BNDD was interested in individuals and organizations involved in illegal drug activities, information on production centers, and all violations of United States laws pertaining to narcotics and dangerous drugs. In order to assist NSA in fulfilling the requirement, BNDD stated that they would provide NSA lists of individuals and organizations which had a history of involvement with illegal drug activities. According to the Ingersoll memorandum, "this watch list will be updated on a monthly basis and andaddi-tions/deletions will be forwarded to NSA." 63 NSA implemented this request by monitoring international communications traffic. The first intercepts began in June 1970:64 Telephone traffic carried on circuits between the United States and certain South American cities was first monitored in September 1970. Unlike other watch list monitoring, the United States-South American effort required NSA to devote additional resources to intercepting communications over this specifically targeted link.65 This link included the telephone circuits between New York City and a South American city. BNDD was initially concerned about drug deals that were being arranged in calls from public telephone booths .. For a detailed discussion of the Bureau's program against the New Left, see the Committee's report on COINTELPRO. .. Memorandum from John Ingersoll to Noel Gaylor, 4/10/70, Hearings, Vol. 5, Exhibit No.4, pp. 158, 154. •• XSA was coyprin~ links for international traffic prior to and during the drug watch list activity. However, the monitoring of certain United StatesSouth American circuits for telephone traffic was initiated in September solely to coyer drug traffickers. Senior NSA official No.2, 9/18/75, pp. 107, 108. Although NSA collected intelligence from communications intercepted in other areas of the world to support the drug watch list, the Committee's investigation centered on the United States-South American monitoring due to the specific tar~eting of American citizens. .. Senior NSA official No.2, 9/18/75, p. 99. 753 in New York City to South America. According to a senior NSA official: BNDD had some information that led them to believe that arrangements were being made by telephone from New York City, a Grand Central Station telephone booth, to some individuals in [a South American city] .66 BNDD felt that it could not legally tap the public telephones and thus enlisted NSA's help to cover the international link that carried these telephone calls. At BNDD's request, NSA began to intercept telephone conversations carried over this link in September 1970. Additional United States-South American links were soon added. BNDD also supplied NSA with code names for drugs and names of individuals, including American citizens. The telephone monitoring was conducted from one NSA site until December 1970, when that intercept station was closed. An NSA East Coast facility, operated by the military, began monitoring United States-South American links in March 1971. According to NSA, 19 united States-South American links were monitored for voice traffic at the two sites between 1970 and 1973.67 Six South American cities were of primary interest, in addition to New York and Miami.68 During this period, BNDD submitted 450 American names to NSA for inclusion on the drug watch list. At the high point, in early 1973, 250 Americans were on the active list. Of the calls intercepted at the East Coast site, le$ than 10 percent were sent to NSA headquarters, and less than 10 percent of these were disseminated.69 Yet it is clear that many personal and business calls of Americans were reviewed during this operation. This results from the lack of an effective method for avoiding the incidental interception of calls involving American citizens when a link with one terminal in the United States in monitored. 93. OIA/NSA Drug Activity In October 1972, NSA requested CIA assistance in monitoring United States-South American communication links to collect intelligence on illicit drug traffic. According to Buffham, NSA made this request because we fe.Jt that this was a sensitive matter, and that greater security would be achieved bll 1ttilizing the ca:reer intercept operator·s of the OIA to perform the activity, and, "'Ibid. ... Senior NSA official No.2, 9/18/75, p. 106. mAccording to ITT, many of these cities are transit points-ealls are routed throu~h thpm to othpr citieR. For example, by monitoring one New York-South American city link, NSA could pick up calls originating in other South American cities to other cities in the United States. The call would simply be routed through New York and the South American city. Senior NSA official No.2, 9/18/75, pp. 108-109. :.\Iost telephone calls from the United States to South America are, in fact, rontert throu~h Xew York City. • Senior NSA official No.2, 9/18/75, p. 113; senior NSA official No.1, 9/16/75, p. 33. 754 in addition, they could be more selective in providing items because we would be able to give the CIA operators the specific names on the watch list, and we did not feel that we could or should provide those names to the [East Coast military station]. [Emphasis added.] 70 NSA's concern about the security of American names being provided to the East Coast station stemmed from the fact that the operators were young military personnel on short tours of duty. They were not professional intelligence officers, and NSA felt that monitoring American citizens was too sensitive a task for them. The use of CIA career operators satisfied NSA that targeting of American citizens would not be disclosed. The Rockefeller Commission also investigated this activity, but found no evidence that the CIA directly targeted American citizens. The Rockefeller Commission report stated : For a period of approximately six months, commencing in the fall of 1973 [sw], the Directorate monitored telephone conversations between the United States and Latin America in an effort to identify foreiJ{Il drug traffickers. . .. A CIA intercept crew stationed at an East Coast site monitored calls to and from certain Latin American telephone numbers contained on a "watch list" provided by NSA. While the intercept was focused on foreign nationals, it is clear that American citizens were parties to many of the monitored calls. . . . The Commission's in'oestigation disclosed that, from the outset of the Agency's involvement in the narcotics control program, the Director and other 01A officials instructed invol'oed personnel to collect only foreign intelligence and to make no attempt-either within the United States 01' abroadto gather information on American citizens allegedly trafficking in narcotics. [Emphasis added.] 71 The evidence examined by the Select Committee directly contradicts this finding. An internal CIA memorandum of November 17, 1972, to the Director of Commlmications from the Chief. Special Programs Division, reveals that the CIA was receiving the names of U.S. citizens. NSA had tasked [the East Coast site] with this requirement [to monitor for drug traffic] but were unwilling to provide the site with the specific names and U.S. telephone numbers of interest on security/sensitivity grounds . . . to get around the problems mentioned above NSA requested the Agency undertake intercept of the long lines circuits of interest. They have provided us with all information available (including the "sensitive") and the [OIA] facility is 100rking on the requirement. [Emphasis added.] 72 ,. Btrlfham, 9/12/75, p. 20. 11 Report to the President by the Commission on CIA Activities Within the United States (Rockefeller Commission Report), June 1975, PII. 222-223. .. Memorandum from Chief, Special Programs Divisions (CIA) to the Director of Communications, 11/17/72. 755 This memorandum and subsequent testimony by NSA officials revealed that the CIA was monitoring these circuits to intercept the calls of American citizens suspected of illegal drug trafficking. During this period, NSA continued to monitor the same circuits at its East Coast site, but that site did not have the specific BNDD "sensitive" watch lists of American names which were supplied to the CIA. Thus, the conclusion reached by the Rockefeller Commission-that CIA intercepts were not undertaken for the purpose of gathering intelligence on American citizens-is not supported by the evidence. 3. Termination 01 Drug Activity Three months after the CIA monitoring was initiated, CIA General Counsel Lawrence Houston issued an opinion which stated that the intercepts may violate Section 605 of the Communications Act of 1934.13 This law, as amended in 1968, prohibits the unauthorized disclosure of any private communication of an American citizen to another party, uniess undertaken pursuant to the President's constitutional authority to collect foreign intelligence which is crucial to the security of the United States.74 Since intercepted messages were provided to BNDD, Houston concluded that the activity was for law enforcement purposes, which is also outside the CIA's charter. As a result of this memorandum, the CIA suspended its collection. NSA, which has no charter, continued to monitor these links for drug information. NSA officials have testified that they were told in early 1973 that the CIA was terminating collection because it was concerned about operating an intercept station within the United States. This concern is completely different from the one expressed in Houston's memorandum. NSA officials have told the Committee that questions concerning the legality of the activity were either not mentioned by the CIA,75 or else mentioned secondarily.76 NSA Deputy Director Buffham testified that after the CIA decided to stop the United States-South American drug monitoring, NSA began to review the legality and appropriateness of its efforts in support of BNDD. Although NSA is not prohibited by statute or executive directive from disseminating information that may pertain to law enforcement, it has always viewed its sole mission as the collection and dissemination of foreign intelligence. A senior NSA official testiva Memorandum from Houston to Acting Chief, Division D, 1/29/73. "18 U.S.C. 2511 (Omnibus Act, 1968) states: "nothing contained in ... Section 605 ... shall limit the constitutional power of the President to take such measures as he deems necessary to protect the nation against actual or potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information deemed essential to the security of the United States...." However, the Keith case (407 U.S. 297 (1972» held that the Omnibus Act was simply a congressional recognition of the President's constitutional powers to protect the nation's security and did not grant the Executive additional powers. The Act did not further define the 1934 statute or provide the Executive with any additional authority to conduct foreign intelligence. .. Senior NSA ofticial No.2, 9/18/75, p. 117. .. Buffham, 9/12/75, PP. 23. 71. See also former NSA Deputy Director Louis Tordella's testimony of 9/21/75, p. 77: "It was in their General Counsel's opinion beyond CIA's charter to monitor radio communication~ on e.s. soil and I was told that if they could move a group of Cubans up to Canada it would be quite all right, but they would not do it in the United States." 756 fied: "We do not understand our mission to be one of supporting an agency with a law enforcement responsibility." 11 Although BNDD clearly was a law enforcement agency, NSA initially held that the intelligence it was supplying BNDD was a part of a legitimate USIB-approved effort to prevent drugs from entering the United States.18 This international aspect of the requirement was interpreted by NSA as sufficient justification for classifying the activity as part of its "foreign intelligence" mission. After discussions with the General Counsel's office at NSA and within the Office of the Secretary of Defense, the Director of NSA terminated the activity in June 1973,19 All of NSA's drug materialsproduct, internal memoranda, and administrative documents--were destroyed in late August or early September 1973. Ordinarily, NSA keeps matedal for five years or more. According to a senior NSA official: "it wasn't thought we would get back into the narcotics effort anytime soon. There didn't seem to be any point in keeping them." 80 4. Oontinuation of NSA'8 United State8-South American Monitoring In June 1975 the Committee received information that NSA continued to monitor United States-South American telephone calls after the June 1973 terminatjon of the drug watch list activity. NSA officials confirmed that the same links targeted for the purpose of curbing illegal drug traffic were monitored by NSA for foreign intelligence after June 1973. Certain of these links were monitored until July 9,1975.81 According to NSA, this activity was terminated when. "it did not prove productive." 82 While this effort was underway, NSA states that i.t did not collect or disseminate any information on narcotics traffic from the United States-South American links. A Eenior NSA official stated: "Nothing ever came. No by-product. The problem was dead." 83 5. Ourrent Internal Policy Ooncerning Telephone Monitoring No statute or executive directive prohibits NSA's monitoring a telephone circuit with one terminal in the United States.84 An internal NSA instruction was issued on August 7, 1975, that requires the personal approval of the chief of a major element within the Agency before monitoring of voice communications with a terminal in the United States is initiated. According to Deputy Director Buffham, "It is obvious that no such collection will be undertaken unless it is extremely important and is properly reviewed within the Agency." Il5 F. Termination of the Oivil Duturbance Watch Lut Activity The watch list activity involving civil disturbances was officially terminated in the fall of 1973. This was due to a combination of fac- .,., Senior NSA official No.1, 9/16/75, p. 10. 'If Senior NSA official No.1, 9/16/75, p. 10; Banner, 9/15/75, pp. 49-50. 'If Anen, 10/29/75, Hearings, Vol. 5, pp. 14-15. 1IO Senior NSA official No.2, 9/18/75, p. 91. •, Ibid., p. 125. .. Ibid,. Bul'fham. 9/12/75. p. 2fl. .. Senior NSA official No.2, 9/18/75, p. 126. .. Ibid., pp. 127-128. .. Butrham, 9/12/75, p. 30. 757 tors: growing concern within NSA regarding the program's vulnerability and propriety; the fact that courtE were beginning to require the Government to reveal electronic surveillance conducted against particular cri 'uinal defendants; and the questions, raised by the drug watch list aCllvity, about NSA's authority to engage in monitoring for law enfort ;t,ment purposes. What follows is a description of events leading to the termination of the watch lists. The only Supreme Court case addressing the issue of electronic surveillance puri'ortedly undertaken for national security purposes is United States v. United States District Oourt, commonly referred to as the Keith case.85a The Supreme Court's decision was handed down on June 19, 1972, over a year before the watch list activity was terminated. The case involved warrantless wiretaps on three U.S. citizens who were subsequently indicted for conspiracy to destroy Government property. There was no evidence of foreign participation in the alleged conspiracy. After examining logs of the wiretaps in camera, t.he District Court judge had held that the surveillance on the defend>ants was unlawful and required oth8it the overheard conversations be disclosed.85b The Supreme Court affirmed the District Court's ruling. While recognizing the President's oons6tutional duty to "protect our Government against those who would subvert or overthrow it by unlawful means," 85e the Court held that the power inherent in such a duty does not extend to the authorization of warrantless electronic surveiUance deemed necessary to protect the nation from subversion by domestw organizations. The Court declared that the Fourth Amendment warrant requirement for electronic surveillance developed in two 1967 cases 86 applied, and that the electronic surveillances employed in the instant case were found to be unlawful. The Court did not reach the issue of whether the Executive has the constitutional power to authorize electronic surveillance without a warrant in cases involving the act'ivities of foreign powers or agents. Although the Keith ruling involved wiretaps and did not apply specifically to NSA, it did have a bearing on NSA's activities. Operation MINARET did entail warrantless electronic surve'illance against certain domestic organizations. If there was no evidence to show that these domestic organizations were acting in concert with 11 foreign power, the Keith case would seem to oast doubts upon the legality of intercepting their messages without a warrant. The watch list activity was never disclosed in a court proceeding; thus its legality has never been judicially determined. A 1973 criminal case did result in the Government's disclosure that some of a defendant's communications had been subject to a "foreign intelligence intercept." Some of tile defendants in this 1973 case were members of 'a group which had been included on an NSA watch list by the Secret ... 407 U.S. 297 (1972). 84·444 F. 2d 651 (1971). 84·407 U.S. at 310. .. Katz v. United States, 389 U.S. 347 (1967) and Berger v. New York, 388 U.S. 347 (1967). These two decisions deal with wiretaps, Mt with activities inVQlving XSA. For further diSCUSSion, see the Committee's report on Warrantless Electronic Surveillance. 758 Service land FBI in mid-1971, and NSA had distributed some of their internationaJ communications to these agencies.87 The propriety of these actions was never considered by the court" because the Government moved to dismiss the case rather than reveal the specifics of the watch list activity. General Lew Allen, Jr. became the Director of NSA on August 15, 1973. In the course of familiarizing himself with his new responsibilities, he was fully briefed on the watch list activity. According to Allen, the BNDD watch list activity had been terminated just prior to his arrival at NSA because the Agency feared ''that it might not be possible to make a clear separation between requests for information submitted by BNDD as it pertained to legitimate foreign intelligence requirements and the law enforcement responsibility of BNDD." He also stated that the activity in support of the FBI, CIA, and Secret Service was suspended when NSA "stopped the distribution of information in the summer [August] of 1973." 88 Deputy Director Buft'hamtold the Committee this dissemination was terminated due to three concerns: (1) NSA could not he certJain as to what uses were being made of the information it was providing other agencies; (2) it fearedthwt broad judicial disoovery procedures might lead to the disclosure of sensitive intelligence sources and methods; and (3) NSA wanted to be "absolutely certain that we are providing infonnation only for lawful purposes and in accordance with our foreign intelligence chavter." 89 During July and August 1973, meetings were held between NSA and Justice Department representatives. According to NSA, these discussions 'influenced the Agency's decision to suspend the dissemination of watch list materia1.90 As Buft'ham testified: I believe although I am not positive, that Dr. Tordella, the Deputy Direct.or, had discussions with people at Justice re~ arding the legality of our aotivities, and that these could have influenced then the determination in NSA to cease the activities in August, even though we had not yet received any formal statements from Justice.91 Ata meeting on August 28, 1973, NSA officials informed Assistant Attorney General Henry Petersen that communications involving the defendants in the 1973 criminal case had been intercepted and that NSA opposed "any disclosure of this technique and program." 92 PEtersen apprised Attorney General Richardson of these events in a memorandum of September 4, 1973. On September 7, 1973, Petersen sent a memorandum to FBI Director Clarence Kelley, requesting to be advised by September 10 of: the extent of the FBI's practice of requesting information intercepted by the NSA concerning domestic organizations 8: Mt'morandum from Henry Pl'tel'Sen to Elliot Richardson, 9/4/73, p. 6. .. Allen, 10/29/75, Hearings, Vol. 5, p. 15. so Buffham, 9/12/75, p. 67. DO Lew Allen..Jr., testimony, 9/15/75, p. 55. 01 Buffham, 9/12/75, p. 67'- II Petersen to lUchardson memorandum, 9/4/73, p. 6. 759 or persons for intelligence, prosecutorial, or any other purposes ... ['and] any comments which you may desire to make concerning the impact of the Keith case upon such interceptions. . . .113 Kelley responded three days later that the FBI had requested intelligence from NSA "concerning organizations and individuals who are known to be involved in illegal and violent ·aotivities 'aimed at the destruction and overthrow of the United States Government." 94 He continued that the FBI did not view the materials Sllpplied it by NSA, or the watch list activity in general, as inconsistent with the Keith decision: the information "cannot possibly be used for any prosecutive purpose" and "we do nO't consider the NSA information as electronic surveillance information in the sense that was the heart of the Keith decision." The FBI's position was that the information supplied by NSA did not result from specific targeting of an individual's communications in the same sense as a wiretJap; therefore, it was not "electronic surveillance." Kelley maintained : We do not believe that the NSA actually participated in any electronic surveillance, per se of the defendants for any other agency of the government, since under the procedures used by that agency they are unaware of the ident~ty of any group or individual which might be included in the recovery of national security intelligence information.9s [Emphasis added.] This position is difficult to defend since intelligence agencies, including the FBI, submitted specific American names for watch lists which resulted in the interception of Americans' international communications. On September 17, Allen wrote FBI Director Kelley ·and the heads of other agencies receiving information from NSA regarding continuation of the watch list activity. Noting that ''the need for proper handling of the list and rel'ated information has intensified, along with ever-increasing pressures for disclosure of sources by the Congress, the courts,and the press," Allen requested, "at the earliest possible date," that Kelley and the other agency heads "review the current list your agency has filed with us in order to satisfy yourself regarding the appropriateness of its contents...." 96 After receiving Kelley's September 10 memorandum, Petersen ad· vised the Attorney General that the current number of individuals .. Memorandum from Henry Petersen to Clarence Kelley, 9/7/73, p. 1. .. Memorandum from Clarf'nce Kelley to Henry Petersen, 9/10/73, p. 2. Kelley is clearly overstating his case when he says Americans are "known" to be involved in illegal activities. Many of the individuals were protesters speaking out agaInst tlle G1>vernment's policIes, not urging the over'throw of the Government. J. Edgar Hoover discusses the necessity of obtaining information "determining the extent of international cooperation among New Leftists" in a memorandum to NSA of June 5, 1970, which is much broader than targetin~ individuals who are attempting the violent overthrow of the Government. .. Kelley memorandum, 9/10/73. pp. 3-5. .. Letter from Lew Allen, Jr. to Clarence Kelley, 9/17/73, Hearings, Vol. 5, Exhibi,t No.6, pp. 158-159. 760 and organizations on NSA watch lists submitted by the FBI W'llS "in excess of 600." 97 Petersen pointed out many legal problems arising from this progrllJIIl and recommended that the FBI and Secret Service be immedi'ately advised to cease and desist requesting NSA to dissemiITllite to them information concernmg individuals and organizations obtained through NSA electronic coverage and that NSA should be informed not to disclose voluntarily such information to Secret Service or the FBI unless NSA has picked up the information on its own initiative in pursuit of its foreign intelligence mission.98 He also recommended that the stJandardsand procedures which applied to "cases where the FBI seeks to acquire foreign intelligence or counterespionage information by means of its own listening devices" be extended to apply to the watch list activity.98a These procedures included obtaining prior written approval by the Attorney General. On October 1, Richardson sent memomnd'a to FBI Director Kelley and the Director of the Secret Service, instructing them to cease requesting information obtained by NSA "by means of electronic surveillance." 99 The Attorney General also requested that his approval be sought prior to· either agency's renewing requests to NSA for foreign intelligence or counterespionage information. On the same day, Richardson sent a le'tJter to Allen, stating that he found the watch list activity to be of questionable legality in view of the Keith decision, and requesting that NSA "immediately curtail the further dissemination" of watch list information to the FBI and Secret Service. Althou~h Richardson specified that NSA W'aS not to respond to "a request from another -agency to monitor in connootion with a matter that can only be considered one of domestic intelligence," he stated that "relevant information a~uired by you in the routine pursuit of the collection of foreign intellIgence information may continue to be furnished to appropriate Government agenices." 100 Kelley responded to Richardson's memorandum on October 3 and agreed to comply with the Attorney Geneml's "instructions to discontinue requests to NSA for electronic surveillance inform'aJtionand to obtain approval prior to any future inquires to NSA for such information." 101 There was apparently some confusion at this point whether Richardson's instructions meant that NSA was prohibited from disseminating any information to FBI. After further consultations~ it was determined that the caveats Richardson placed on dissemination 'applied only to information on American citizens and organizations, and not to foreign intelligence and counterespionage matters. Allen replied to Richardson's letter on October 4, stating that he had "directed that no further information be disseminated to the VI Memorandum from Henry Petersen to Elliot Richarson, 9/21/73, p. 1. III Pocersen to Richardson memorandum, 9/21/73, p. 3. oo. Ibid. .. Memorandum from Elliot Richardson to Clarence Kelley. 10/1/73. 100 Letter from Elliot Richardson to Lew Allen, Jr., 10/1/73, Hearings, Vol. 5. Exhibit No.7, pp. 160, 161. 101 Memorandum from CIarenee Kelley to Elliot Richardson, 10/3/73. 761 FBI and Secret Service, pending advice on legal issues." 102 Although Allen had agreed to suspend dissemination, NSA's position remained that these communications had always been collected "as an incidental and unintended act in the conduct of the interception of forei~ communications." Allen thus asserted that NSA's "current practIce conforms with your [Richardson's] guidance that, 'relevant information acquired [by NSA] in the routine pursuit of the collection of foreign intelligence information may continue to be furnished to appropriate government agencies.' "103 As a result of these and other exchanges between officials at NSA and Justice, the Agency officially terminated its watch list activity involving American citizens and organizations in the fall of 1973. It would no longer accept such names from other agencies for the purpose of monitoring their international communications. To a substantial degree, this decision was prompted by the legal implications of the Keith case and by NSA's fear that criminal prosecutions of persons on the watch lists would inevitably lead to disclosure of its intelligence sources and methods. Indeed, the 1973 criminal case referred to above posed the threat that the watch list activity might have to be disclosed for the first time in a public forum. It is important to note that the decision to terminate the watch list was ultimately the administrative decision of an executive agency. There is no statute which expressly forbids such activity, and no court case where it has been squarely at issue. Without legislative controls, NSA cOuld resume the watch list activity at any time upon order of the Executive. G. Autlwrization Authorization of the watch list activity must be viewed in the context of how NSA operates. It is a service agency which provides foreign intelligence information at the request of consumer agencies. Specific requirements are levied on USA, although the Agency also engages in collection activities that are not responsive to specific tasking. For example, many USIB requirements-such as those aimed at terrorist activities, gathering economic intelligence, or discovering foreign links to civIl disturbances-were so broad that NSA was given wide discretion for selecting not only the communications channels to be monitored, but also what information was disseminated.loi While this is often appropriate because only NSA has the knowledge and eXJ.>ertise to make these decisions, it also allows NSA considerable flexibilIty in carrying out its mission. NSA also responds to specific requests from other Federal agencies. lBdeed, it is no exaggeration to state that NSA's operations are undertaken almost entirely to satisfy the intelligence needs of other agencies. The watch list activity was no exception. 1" Letter from Lew Allen, Jr. to Elliot Richardson, October 4, 1973, Hearings, Vol. 5, Exhibit No. 8, p.l63. 103 Allen letter, October 4, 1973, Hearings, Vol. 5, Exhibit No.8, pp. 162, 163. 10& Wannall (FBI), October 3,1975, p. 12: "I would say that by far the majority of the product that I saw would have been information that would have been disseminated to us by NSA, based upon the knowledge of that Agency of our responsibilities, as opposed to a specific request for any information that might come to NSA's attention, that we ourselves initiated." 762 1. Knowledge and Authorization Outside NSA In the case of the 1967-1973 watch list activity, NSA clearly received instructions from the Army in 1967 to look for possible foreign influence on, or control of, American peace and Black power activists. NSA subsequently received the names of American and foreign citizens and groups from other intelligence agencies. This activity was not formally approved by USIB. Although NSA notified USIB members that it was responding to the Army's request, the inclusion of American names on an NSA watch list was never discussed at subsequent USIB meetings. Although there were official USIB requirements for information concerning international drug activity, presidential protection, and terrorism, there was no approval or discussion of targeting American citizens. NSA officials contend that the submission of American names by USIB members constituted approva1.105 The desire for tight security over the watch list program resulted in limiting participation to those "with a need to know." Therefore, it was not in NSAs best interests to have formal USIB approval of a requirement since knowledge would have been more widely spread. According to documents supplied to the Committee and testimony of NSA officials, Defense Secretaries Melvin Laird and James Schlesinger, as well as Attorneys General John Mitchell and Richard Kleindienst, were informed that NSA was monitoring Americans. Former NSA Director, Admiral Noel Gayler sent a Top Secret "Eyes Only" memorandum to Laird and Mitchell on January 26, 1971, which outlined ground rules for "NSA's Contribution to Domestic Intelligence." In this memorandum, Gayler refers to a discussion he had earlier that day with both men on how NSA could assist them with "intelli~ence bearing on domestic problems." The memorandum mentioned the monitoring for drug trafficking and foreign support of subversive activities, but did not discuss "watch lists" s:pecifically.loe NSA Deputy Director BufIham supplied the CommIttee with a Memorandum for Record which indicated that he had personally shown the Gayler memorandum to Mitchell and had been told by the Military Assistant to Secretary of Defense Laird that the Secretary had read and agreed to the memorandum.loT In a handwritten note 1"; Allen,10/29/75, Hearings, Vol. 5, p. 28. 108 Memorandum from NSA Director Noel Gayler to the Secretary of Defense and the Attorney General, "NSA Contribution to Domestic Intelligence," 1/26/71, Hearings, Vol. 5, Exhibit No.5, pp.156--157. This memorandum responded to the interfflts of the Intelligence Evaluation Committee (IEC), a Justice Department working group set up to carry out domestic intelligence-gathering activities. The IEC was an outgrowth of the Huston Plan and is detailed in the Committee's report on the Huston Plan. Suffice it to say that NSA sent a representative to that group and Gayler was providing them with a statement of NSA's capabilities and procedures for supplying intelligence. 107 Mpmorandum for the Record, Bpnson K. Bu1l'ham, 2/3/71. When questioned by the 'Committee, neither Mitchell. Laird. nor Klpindienst recalled the watch list activity. Mitchell dnes not recall NSA's involvement in monitoring the communications of American citizens or the meeting with Bu1l'ham. He stated, howpver, that "he may have" had such a meeting, but cannot recall. John Mitchell testimony, 10/2/75, pp. 47-48. 763 made available to the Committee, Gayler recalls that he personally showed the J anual'y 26, 1971, memorandum to Kleindienst on July 1, 1972. Finally, former NSA Deputy Director Tordella testified that he accompanied General Samuel C. Phillips, Gayler's successor as Director of NSA, to brief Secretary of Defense Sohlesinger on the watch list in the summer of 1973.108 In summary, a number of Federal agencies were aware of NSA's watch lists and used them. It is clear that the United States Intelligence Board, which ordinarily set the intelligence requirements to which NSA responded, never gave its formal approval for the watch list activity. It also appears that at least two Attorneys General and two Secretaries of Defense were generally aware that NSA was monitoring the international communications of American citizens, but none took measures to halt the practice. ~. KnowZedge and Approval Within NSA There is a discrepancy in the testimony of knowledgeable NSA staff members and a former NSA Director with regard to his knowledge of the watch list activity. When asked whether NSA had included the names of American citizens or organizations on its watch lists, Admiral Noel Gayler (who was Director of NSA during the height of the activity) responded: I don't know that I even knew that in that specific way. I knew that communications of one foreign terminal sometimes concerned doings of interest of people, including American citizens, yes. And when I became aware of that, I can't tell you, I guess it was a year or so after I got there.lo9 Gayler became NSA Director in August 1969. He maintains that he first became aware of the watch list activity about the time of the June 1970 Huston plan for domestic surveillance, ten months after his arrival and eleven months after the MINARET Charter was issued. Gayler was one of the original participants in the Huston plan deliberations and in the Intelligence Evaluation Committee (early 1971). Both of ,these efforts were designed to use the resources of NSA and other intelligence agencies to gather information on internal security matters. In fact, part of the Huston plan called for the expansion of the watch list activity. Buffham told the Committee that if the plan had been implemented he assumed "other intelligence agencies would then increase the numbers of names on their lists" and NSA would possibly target specific communications channels to obtain the international traffic of American citizens.u° NSA was par- 108 Tordella, 9/21/75, p. 74. 100 Noel Gayler testimony, 6/19/75, p. 64. 110 Buffham, 10/29/75, Hearings, Vol. 5, p. 45. In addition, the Huston Plan report sent to the participants was classified "Top Secret, Handle Via COMIXT Channels Only," the classification placed on NSA intercept information. This caveat was designed to limit the distribution of the report and prevent disclosure of the illegal activities suggested by Tom Charles Huston. For a further explanation, see the Committee's report, "National Security, Civil Liberties, and the Collection of Intelligence: A Report on the Huston Plan," 69-984 0 - 76 ~ 49 764 ticularly concerned that the executive branch directives would have had to be changed to permit such an expansion. The alternatives outlined in the Huston plan included the recommendation that the controling NSCID and the relevant DCID be changed to allow NSA to targe~ inte~~ational communications links carrying the messages of AmerIcan CItIzens. NSA was already engaged in watch list activity which although it did not involve targ-eting- of specific communications links, did involve targeting Amencans by name. The Huston Plan states: NSA is currently doing so on a restricted basis, and the information it has provided has been most helpful. Much of this information is particularly useful to the White House....111 As discussed earlier, the July 1, 1969, MINARET charter was designed to restrict knowledge of the watch list activity. It was released about a month before Gayler arrived at NSA and, according to a senior NSA official, Gayler "knew everything that was in it, what was going on, and endorsed it." 112 Gayler recalls that his first knowledge of the watch list came during the Huston Plan deliberations, almost a year later. Another senior NSA official testified that Gayler "review every piece of MINABET prodU<Jt" and maintained that "the Director kept a close eye on this activity and reviewed the requirements." [Emphasis added.] 113 This employee also testified that Gayler was shown the product of the watch list activity and was kept fully informed. H. OonclU8i0n8 NSA's monitoring of internatIonal communications oomprises only a portion of its total mission, but the examination of this capability to intrude on the telephone calls and telegrams of Americans represents a major part of the Committee's work on NSA. The watch list activities and the sophisticated technological capabilities that they highlight present some of the most crucial privacy issues facing this nation. Space age technology has outpaced the law. The secrecy that has surrounded much of NSA's activities and the lack of Congressional oversight have prevented, in the past, brin˘ng statutes in line w\th NSA's capabilities. Neither the courts nor Congress have dealt with the interception of communications using NSA's highly sensitive and complex technology. The analysis presented here of the deliberate targeting of A~erican citizens and the associated incidental interception of their communications demonstrates the need for a lewslative charter that will define, limit, and control the signals intelligence activities of the National Security Agency. This should be accomplished both to preserve and protect the Government's legitimate foreign intelligence operations, and to ensure that the constitutional rights of Americans are safeguarded. 111 Memonmdum from Tom Charles Huston to H. R. Haldeman, 7(7 "Operational Restraints on Intelligence Collection," p. 1, Hearings, Vol. 2, Exhibit No. 2, p. 193. 11JSenior NSA official No.2, 9/18/75, pp. 43-44. m Senior NSA official No. I, 9/16/75, pp. 63, 62. 765 The next section describes a recently terminated NSA collection program which also involved United States citizens--Operation SHAMROCK. This program did not require any special technology; international telegrams were simply turned over to NSA at the offices of three cable companies. III. A SPECIAL NSA COLLECTION PROGRAM: SHAMROCK SHAMROCK is the codename for a special program in which NSA received copies of most international telegrams leaving the United States between August 1945 and May 1975. Two of the participating: international telegraph companies-RCA Global and ITT World Communications-provided virtually all their international message traffic to NSA. The third, Western Union International, only provided copies of certain foreign traffic from 1945 until 1972. SHAM ROCK was probably the larg-est governmental interception program affecting Americans ever undertaken. Although the total number of telegrams read during its course is not available, NSA estimates that in the last two or three years of SHAMROCK's existence, about 150,000 telegrams pel' month were reviewed by NSA analysts.115 Initially, NSA received copies of international telegrams in the form of microfilm or paper tapes. These were sorted manually to obtain foreign messages. When RCA Global and ITT World Communications switched to magnetic tapes in the 1960s, NSA made copies of these tapes and subjected them to an electronic sorting process. This means that the international telegrams of American citizens on the "watch lists" could be selected out and disseminated. A. Legal Restrietionfj 1. The Fourth Ameruiment to the OO'lUJtitution of the United States Obtaining the international telegrams of American citizens by NSA at the offices of the telegraph companies appears to violate the privacy of these citizens, as protected by the Fourth Amendment. That Amendment guarantees to the people the right to be "secure . . . in their papers ... against unreasona;ble searches and seizures." It also provides that "no Warrants shall issue, but upon probable cause." In no case did NSA obtain a search warrant prior to obtaining a telegram. 13. Section 605 of the GommunicatioruJ Act of 1934 (4'7 U.S.G. 605) As enacted in 1934, eleven years before SHAMROCK began, section 605 of the Communications Act provided: No person receiving, assisting in receiving, transmitting, or assisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, substance, purport, effect, or meaning thereof.... Section 605 was amended in 1968 by the addition of the phrase: "Except as authorized by chapter 119, Title 18, no person ...." UGStaff summary of interview with senior N'SA official No.3, 9/17/75, p. 3. 766 The import of this 1968 addition, however, is not clear, and the Supreme Court has yet to rule on the point.116 The relevant provision in chapter 119, section 2511 (3), provides that "nothing contained in this chapter or in section 605 of the Communications Act of 1934 ... shall limit the <0nstitutional power of the President ... to obtain foreign intelligence information deemed essential to the security of the United States...." 111 Yet the Supreme Court, in the Keith decision (1.972), held that this section "confers no power" and "merely provides that the Act shall not be interpreted to limit or disturb such power as the President may have under the Constitution." 118 . It is thus uncertain what the phrase in the 1968 amendment to section 605-"except as mutlwrized by chapter 119, title 18" [Emphasis added.]-means. The Supreme Court has held that the relevant section of chapter 119 does not atdhorize any activity. The applicability of section 605 to the interception of international telegrams for foreign intelligence purposes is therefore unclear. It would appear that where such telegrams are intercepted for other than foreign intelligence purposes (e.g., the watch list activity) , section 605 would be violated. 3. The Controlling National Security Council Intelligence Directive Since 1958, this executive directive has authorized NSA to conduct communications intelligence activities.ll9 These have been defined as excluding "the intercept and processing of unencrypted written communications." It would appear that if copies of international telegrams are "written communications," NSA has exceeded its authority under the executive's own internal directives. B. The Oomun.ittee's InvestigatiO'n The SHAMROCK operation was alluded to in documents furnished to the Committee by the Rockefeller Commission in May 1975. They indicated that CIA had provided "cover" for an NSA operation in New York where international telegrams had been copied.J20 In early June 1975, an oral inquiry regarding the operation was made to NSA officials, but no confirmation of the project was forthcoming. In July, the Committee sent written interrogatories to NSA, and was told that this subject was so sensitive that it would be disclosed only to Senators Church and Tower. No such briefing was immediately arranged, however. In July and August, news stories were published which appeared to reveal small parts of the SHAMROCK operation.l21 The Committee continued to press the matter with NSA, and in early September the agency gave the Committee its first detailed 118The u;s. Court of Appeals for the Third Circuit did rule, in. U.S. v. Butenko, 494 F.2d 593 (3d Oir. 1974), cert. denlied sub nom. Ivanov v. United States, 419 Uo'S. 881 (1974), that section 605 did not render unlawful electronic surveillance conducted solely for foreilPl intelligence purposes. 117 18 U.S.C. 2511(3). 111 United States v. United States DU/trict Oourt for the Eastern District of Michigan, et al., 407 U.S. 297 (1972). See pp. 757, 759-760. 119 See pp.737-738. 12) Commission on CIA Activities Within the United States, interview with senior CIA officials, 3/11/75, pp. 14-16, in Select Committee files. 121 See Frank Van Riper, "Find U.S. Agents Spy on Embassies' Cables," New York Daily News. 7/22/75; iltem., "FCC Terms Cable-Tapping Illegal, Will Investigate FBI," New York Daily News, 7/23/75; Nicholas Borrock. "National Security Agency Reported Eavesdropping on Most Private Cables," New York Time8, 8/l/75, p. 1. 767 information. This briefing was followed by interviews with present and former NSA employees who had been responsible for the program and by examinations of documents at NSA and the Department of Defense. NSA assured the Committee at the time that it had examined all NSA documents which pertained to SHAMROCK. On September 23, the full Committee was briefed by an NSA official in executive session. Following this briefing, the Committee interviewed officials in the telegraph companies which had participated in the SHAMROCK program. On the basis of this investigation, the Committee prepared a report which it submitted to NSA for review. NSA had no specific comments regarding the accuracy of the report, but expressed its general objection to public disclosure of the operation on the grounds that the report was based on classified information.122 On November 6, 1975, in a public session of the Committee, Chairman Frank Church read the report on SHAMROCK into the record. Due to the refusal of the executive branch of provide witnesses in public session, no other public record was made.122 ' At this point, the Committee's active investigation ceased. The Committee presumed that it had exhausted all sources of information about SHAMROCK. On March 25, 1976 as the Committee was about to send this report to press, it was informed by the Department of Defense that NSA had "discovered" a file containing various documents and memoranda about SHAMROCK. An NSA official explained that the file had been held by a lower-level employee at NSA until around March 1, 1976, when he brought it to the attention of his superiors. Since this occurred several months after the Committee's public report, and, in the opinion of NSA, did not substantially alter the Committee's findings, it was not immediately reported to the Committee. After examining the documents, the Committee decided that the final NSA report should incorporate this new information. Although it does not alter the basic findings reported in November 1975, it does change some of the details.'23 C. The Origim of SHAMROOK During World War 1I, under the wartime censorship laws,124 all international message traffic was made available to military censors.125 Copies of pertinent foreign traffic were turned over to military intelligence. With the cessation of the War in 1945, this practice was to end. In August 1945, the Army sought to continue that part of the wartime arrangement which had allowed military intellIgence access to certain foreign traffic.'26 At that time, most of this traffic was still conveyed via the facilities of three carriers.127 On August 18, 1945, two representatives of the Army Signal Security Agency were sent to New York to make the necessary contacts with the heads of the Commercial Communications Companies in New York, secure their 122 Letter from NSA to the Select Committee, 10/29/75, Hearings, Vol. 5, p. 51. 122, Hearings, Vol. 5, pp. 57--60. l2lI Ibid. m 47 U.S.C. 606. 125 See the testimonies of: Senior NSA official No.4, 9/23/75, pp. 45-46; Tordella, 99/21/75, pp. 6-7; senior officer, ITT World Communications, Inc., 10/15/75, p. 4. 120 Letter from an Army intelligence officer to the Commanding General, Signals Security Agency, Army Service Forces, "Report on New York Trip," 8/24/45. 121 Stair summary of an interview with Senior NSA official No.3, 9/17/75, p. 3. 768 approval of the interception of all Governmental traffic entering the United States, leaving the United States, or transiting the United States, and make the necessary arrangements for this photographic intercept work.128 They first approached an official at ITT, who "very definitely and finally refused" to agree to any of the Army proposals. The Army representatives then approached a vice president of Western Union Telegraph Company, who agreed to cooperate unless the Attorney General of the United States ruled that such intercepts were illegal.~29 Having succeeded with Western Union, the Army representatives returned to ITT on August 21, 1945, and suggested to an IT!' vice president that "his company would not desire to be the only non-cooperative company on this project." The vice president decided to reconsider and broached the matter the same day with the president of the company. The ITT president agreed to cooperate with the Army, provided that the Attorney General decided that the program was not illegal.130 • These Army representatives also met with the president of RCA on August 21, 1945. The RCA president indicated his willingness to cooperate, but withheld final approval until he, too, had heard from the Attorney General.l3l After their trip, the Army representatives reported to their superiors that the companies were worried about the illegality of their participation in the program: Two very evident fears existed in the minds of the heads of each of these communications companies. One was the fear of the illegality of the procedure according to present FCC regulations. In spite of the fact that favorable opinions have been received from the Judge Advocate General of the Navy and the Judge Advocate General of the Army, it was feared that these opmions would not hold in civil court and, as a consequence, the companies would not be protected. If a favorable opinion is handed down by the Attorney General, this fear will be completely allayed, and cooperation may be expected for the complete intercept coverage of this material. The second fear uppermost in the minds of these executives is the fear of the ACA which is the communications union. This union has reported on many occasions minor infractions of FCC regulations and it is feared that a major infraction, such as the proposed intercept coverage, if disclosed by the Union, might cause severe repercussions.133 Later memoranda by another Army representative who was present indicate, that the companies had consulted their corporate attorneys during these three days of discussions, and that their attorneys uniformly advised against participation in the proposed intercept program. 134 The company executives were apparently willing to ignore this advice if they received assurances from the Attorney General that he would protect them from any consequences.~35 120 Army intelligence officer letter to Commanding General, 8/24/45. ll!II Ibid. '''' Ibid. lJl1 Ibid. 188 Ibid. 13< Memorandum from Record, Armed Forces Security Agency, "SHAMROCK Operations," 8/25/50. ,., Ibid. 769 The new documentary evidence made available to the Committee did not reveal that the Attorney General at that time, Tom C. Clark, actually made the assurances that the companies desired. It is clear, however, that the program began shortly after the August meetings: I'IT and Western Union began their participation by September 1,136 and RCA by October 9,1945.137 In a letter from the Army Signals Security Agency to the Army Chief of Staff on March 19, 1946, the writer indicates that SHAMROCK was well underway, but that concerns about its legality had not vanished: It can be stated that both [Western Union and RCA] have placed themselves in precarious positions since the legality of such operations has not been established and has necessitated the utmost secrecy on their part in making these arrangements. Through their efforts, only two or three individuals in the respective companies are aware of the operation.138 April 26, 1976, while this report was being printed, DOD informed the Committee that nine additional documents relating to SHAMROCK had been found in the National Archives. The documents revealed that the Office of Secretary of Defense James Forrestal attempted unsuccessfully in June 1948 to have Congress pass an amendment to relax the disclosure restrictions of Section 605 of the Federal Communications Act of 1934. Agencies designated by the President would have been allowed to obtain the radio and wire communications of foreign governments. If the amendment had passed, the SHAMROCK program, as it was originally conceived, would have been authorized by law. The proposed amendment sought to allay concerns of the companies on the legality of their participation in SHAMROCK. The companies were demanding assurances in 1947 not only from the Secretary of Defense and the Attorney General, but also from the President that their participation was essential to the national interest and that they would not be subject to prosecution in the Federal Courts. Secretary Forrestal, who stated he was speaking for the President, gave ITT and RCA representatives these assurances at a December 16, 1947, meeting in Washington, D.C.IsD Forrestal warned, however, that the assurances he was making could not bind his successors in office.140 Representatives of Western Union were not 'present at this meetin~. Documents made available to the Committee mdicate that the PresIdent and Operating Vice President of Western Union were briefed in January 1948 on the earlier meeting with RCA and IT1'.1.41 In early June 1948, the Chairmen of the Senate and House Judiciary 1... Army intelligence officer letter to Commanding General, 8/24/45. The armistice ending hostilities between the United States and Japan was signed in .Tapan on September 2,1945 (September 1 in the United States). . 137 Letter from a senior official at RCA Global, Inc., to the Army Signal Security Agency, 10/9/45. 188 Letter from Assistant Chief of Staff, Army Signals Security Agency, to the Army Chief of Staff, "Letters of Appreciation," 3/19/46. This letter transmitted letters of appreciation that were to be forwarded to two of the participating companies. 1llO Apdrews, 9/23/75, p. 34 (referring to documents in his possession). These documents were examined by the Commitlee. Select Committee memorandum, 9/17/75, "Review of Documents at DoD Regarding LPMIDDLEY." HO Andrews, 9/23/75, p. 40. H1 Select Committee memorandum, 11/5/75, "Persons at 1947 and 1949 SHAMROCK Meetings" (describing a handwritten note to this effect). 770 Committees were informed of the Government's need for a relaxation of Section 605 and of its position with the telegraph companies. The delicacy of the problem and the top secret nature of the information were made clear to these two Chairmen. The amendment was considered in an executive session of the Senate Judiciary Committee on June 16, 1948, and approved. Since support for the bill was not unanimous, however, the Committee voted to leave it to the Chairman's discretion whether or not to release the bill to the Senate floor. The representative of the Secretary of Defense then told the Senate Judiciary Chairman that "we did not desire an airing of the whole matter on the Floor of the Senate at this late date in the session." The bill apparently was not reported out. A Defense Department official expressed the view that the thought a great deal had already been accomplished and that the administratIOn had sufficient ammunitIOn to be able to effect a continuation of the present practices with the companies. Apparently no other statutory attempts were made to authorize the companies' participation in SHAMROCK. The companies sought renewed assurances from Forrestal's successor, Louis Johnson, in 1949. Johnson told them that the President and Attorney General had been consulted and had given their approval.'" To the knowledge of those interviewed by the Committee, this was the last instance in which the companies such assurances from the Department of Defense.'" Dr. Louis Tordella, who was NSA Deputy Director from 1958 until 1974 and the NSA official with chief administrative responsibility for SHAMROCK, testified that to the best of his knowledge, no President since Truman knew of the program. He "was not sure" whether any Attorney General since Tom Clark had been informed of it, or if succeeding Secretaries of Defense were aware of it. Tordella stated he briefed former Secretary of Defense Schlesinger about the SHAM ROCK operation in the summer of 1973.146 The Army Signals Security Agency controlled the collection program until 1949, when the Armed Forces Security Agency was formed. Responsibility for the program passed from AFSA to the National Security Agency when it was created in 1952.141 D. The Participation of the Oompanies None of the telegraph companies could find any record of an agreement with NSA or its predecessors wherein the companies would provide copies of telegrams to the Government,148 or which reflected anything about arrangements with NSA. No one interviewed by the Committee had any recollection or knowledge that the Government had '" Andrews, 9/23/75, p. 34. '" IWd., p. 40. 1.. Ibid., p. 34. 146 Andrews, 9/23/75, p. 40 ; Tordella, 9/21/75, p. 12. "0 Tordella, 9/21/75, pp. 32-34. Tordella did state that 'he thought former NSA Director Noel Gayler had informed Attorney General John Mitchell about SHAMROCK in 1970 (Ibid., p. 33); Mitchell, however, did not recall being informed about the Q!I)eration (Mitchell, 10/2/75, pp. 47-48). Tordella stated that he was "quite sure" former Secretary of Defense Laird had known of the SHAMROCK program (Tordella, 9/21/75, pp. 33--84) . 101 Tordella, 9/21/75, p. 34; senior NSA official No.4, 9/23/75, p. 47. 1<8 Staff summaries of interviews with Counsel, RCA Global, Inc., 10/9/75, p. 3; Counsel, ITT World Communications, Inc., 10/9/75, p. 1; Counsel, Western Union International, Inc., 10/10/75, p. 1. 771 given the companies specific assurances to ensure their cooperation in 1945,1947,1949, or at any time thereafter.149 Apparently only a few people in each company-apart from those who physically turned over the materials-had any knowledge of the NSA arrangement.150 These were primarily mid-level executives charged with the operational aspects of the companies' business. All assumed that the arrangement was valid when it was made and thus continued it. No witness from the telegraph companies recalled that there had ever been a review of the arrangements at the executive levels of their respective companies. Furthermore, none of the participating companies was apparently aware that information other than foreign traffic was extracted from the messages they were providing.m Yet no official at any of the three companies could recall his company asking NSA what it was doing with the information it was furnished and, specifically, whether NSA was reading the telegrams of the companies' American customers.152 Finally, both the telegraph companies and NSA deny that the companies ever received anything for their cooperation in SHAM ROCK, whether in the form of compensation or favoritism from the Gov~rnme!1t. All claim they were motivated by pu~y patriotic conslderatlOns.153 . If there were similarities as to their involvement in SHAM ROCK, the participation of each company varied in practice. 1. 90A Global According to a memorandum prepared by Anny representatives, RCA (the parent company of RCA Global) agreed in August 1945 to allow Army personnel, who were to be dressed in civilian clothes, to photograph foreign traffic passinp; over its facilities in New York, Washington, and San Francisco. The memorandum further provided that "only the desired tmffic will be filmed." ai The company official at RCA Global who was charged with implementing the SHAMROCK program testified that several alternatives were discussed with Anny representatives. He stated that the Anny had first- proposed tapping into the company's overseas lines, but the official rejected this idea as U1lfeasible. The Army representatives then proposed that company employees sort out pertinent traffic and turn it over to them; the official rejected this because he did not want company employees involved. The RCA official finally agreed to provide paper tapes of all international message traffic. It was understood that these messages would be sorted manually by persons from the Anny Signals Security Agency on the company's premises, and that only 1" Testimonies of former vice president, ROA Global, 10/9/75, PP. 17-18, and senior officer, ITT World Communications, Inc., 10/15/75, p. 6; and affidavit of senior officer, Western Union International, 10/19/75, p. 1. 1SO Counsel, RCA Global, 10/9/75, p. 2; counsel, ITT World Communications, 10/9/75, pp. 1-2; and counsel, Western Union International, 10/10/75, p. 3 (staff summaries). 1lIl Former vice president, RCA Global, 10/17/75, p. 13; senior omcer, ITT World Communications, 10/15/75, p. 12. 111 Senior omcer, ITT World Communications, 10/15/75, p. 12. See also testimony of senior officer, RCA Global, Inc., 10/19/75, p. 19. RCA Global and ITT World 'Communications were, by the mid-I960s, providing NSA all of their outgoing telegraph tramc on magnetic tapes. 1" Senior omcer, RCA Global, 10/19/75, p. 23; senior omcer, ITT World Oommunications, 10/15/75, p. 14; counsel, Western Union International, 10/10/75, p. 2 (staff summary) . IN Army intelligence omcer letter to Commanding General, 8/24/45. 772 certain foreign traffic would be selected. There was never a written agreement to this effect, however, ,according to the former official.155 In New York, Army representatives were given office spac~ in the area where the paper tapes of RCA Global's international message tra.ffic were sorted manually for foreign traffic. Messages of interest were transmitted over teletype machines located in that office sJ?lWe.156 In Washington and San Francisco, Army agents were permitted to pick up copies of foreign messages, which they took to another office for microfilming.157 By 1950, a Recordak (microfilm) machine was placed in the New York office and was used to film messages of intelligence interest.1sB This arrangement continued without substantial disruption nnW 1963, when RCA Global began to store its message traffic on magnetic tapes. NSA made arrangements to obtain copies of these tapes from the RCA Global facilities in New York-they were taken "on loon," copied, and returned, the same day if possible. Gradually, magnetic tapes began to supercede paper tapes and microfilm as a means of storing messages. By 1966, the New York office was turning over only magnetic tapes to NSA.159 The offices in Washington and San Francisco, however, continued to furnish copies of international message traffic for microfilming by NSA. RCA Global emplo;rees in Washington, D.C. were under the impression they were prOVIding information only to the FBI.160 ~. ITT World OommwnicatWna In August 1945, ITT agreed to allow the Army access to all incoming, outgoing, and transiting messages passing over the facilities of its subsidaries involved in international communications. It wasagreed that "all traffic will be recorded on microfilm, that all Governmental traffic will be recorded on a second microfilm in addition to the original one, that these films will be developed by the SSA [Signals Security Agency], and the complete traffic will be returned to ITT." 161 It is not clear whether these arrangements, agreed to at the outset, were actually implemented in the manner described. The ITT o1licial with the earliest recollections of the program could recall only that by the early 19508, ITT World Communications was providing NSA representatives with copies of the company's international message traffic, which NSAthen sorted and microfilmed.162 When lIT World Communications began to use paper tapes to transmit its messages, these were turned over to NSA as well.l68 It is not clear whether these tapes were transmitted from the premises of ... Former vice president, RCA Global, 10/17/75, pp. 5-7. "" IMd., pp. 7-8, 11. ,.., Telegram from an AFSA officer to an AFSA officer, "RCA SHAMROCK," 6/24/51. 1M Senior officer, RCA Global, 10/19/75, p. 4. "'"IMd. 110 Van Riper, "Find U.S. Agents Spy on Embassies' Cables," New York Da.il1l News, 7/22/75. 118.1 Army intelligence officer letter to Commanding General, 8/24/45. Senior officer, ITT World CommunicatioDll,10/15/75, pp. 7-8. "Ibid., p. 8. A senior officer of ITT World Communications stated that be bad no personal knowledge tbat paper tapes bad been turned over to NSA; bowever, NSA confirmed that it bad received paper tapes from ITT (testimony of Senior NSA official No.4, 9/23/75, pp. 49-51). Counsel for ITT World Communications also told the Committee tbat bis investigation bad revealed tbat tbe company was providing paper tapes to NSA. (Counsel, ITT World Communications, 10/9/75, p.l (&taff summary).) 773 ITT World Communications to another location (as with RCA Global) or whether they were simply transported to NSA for sorting. When ITT World Communications began to use magnetic tapes to store its incoming and outgoing messages-the best recollection of this change places it around 1965 164-the magnetic tapes were turned over to NSA for duplication. They were returned to the company on the same day. By 1968, ITT World Communications was turning over only its magnetic tapes to NSA.I65 The Washington and San Francisco offices of ITT World Communications participated in a similar fashion. In Washington, however, company officials believed that they were providing the telegrams to the FBI, rather than NSA. 166 It is clear from the information made available to the Committee that the Washington messages were sent to NSA.167 3. Western Union International At the August 1945 meeting between Army representatives and the Western Union Telegraph Company (the parent company of Western Union International), the company stated that it desired that Western Union personnel operate the [microfilm] camera and do all the actual handling of the messages. It was agreed that [the Army Signal Security Agency] would furnish the necessary cameras and film for the complete intercept coverage of Western Union traffic outlets. The film, after exposure, will be delivered [to the office of a company vicepresident], at which place an officer from the Signal Security Agency, in civilian clothes, will pick it Up.16S The company a~d to implement this arrangement at its New York, San FranCISCO, Washington, and San Antonio facilities.189 This arrangement was apparently implemented as originally agreed. In New York, at least, company employees segre~ted such messages and processed them through a microfilm machme on the transmission room floor.170 At approximately 4:00 each morning, an NSA courier would come to the floor to pick up the microfilm cartridge. In San Antonio, an Army signal officer from Ft. Sam Houston was tasked with picking up the microfilm each day.l7l It appears that Western Union turned over to NSA only its telegraph traffic to one foreign country. Approached in 1959 by persons who identified themselves as being from Ft. Holabird, Maryland (Army intelligence), Western Union agreed to allow them to duplicate the traffic going to a particular country.172 In 1970, the company also began to provide copies of messages going to a particular city with~n that country which were not being duplicated as part of the preVIOUS arrangement.173 These messages were apparently sorted by "" Senior officer, ITT World Communications, 10/15/75, p. 8. ,'" Letter from an NSA courier to an NSA official, 1/23/68. 1M Counsel, ITT World Communications, 10/9/75, p. 2 (staff summary). 1M Tordella, 9/21/75, pp. 36-37. ,.. Army intelligence officer letter to Commanding General, 8/2f/45. ,.. Ibid. ""Counsel, Western Union International, 10/10/75, p. 1 (staff summary). 11, Memorandum for Record, Armed Forces Security Agency, "SHAMROCK Operations," 8/25/50. ,.. Counsel, Western Union International, 10/10/75, p. 2 (!ltaff summary). tTl Ibid. 774 NSA personnel in space provided by Western Union at its New York officesY4 Western Union International (which was formed in 1963) continued to microfilm certain foreign traffic for NSA until about 1965, when a company executive discovered the existence of the microfilm machine on the transmission room floor. After ascertaining its purpose, he demanded that NSA renew its request to have this information in writing. He recalled that instead of submitting such a request, NSA simply had the machine removed.175 This recollection, however, was not borne out by documents furnished by NSA. The documents showed that on February 2,1968, a company vice president (not the one referred to above) had discovered the existence of NSA's Recordak (microfilm) machine in the Western Union transmission room. The machine was reported to the company president, who directed his employees to find out to whom the machine belonged and what the basis for the arrangement was. The NSA courier, when asked these questions by a Western Union International official on February 9, 1968, replied that he was from the Department of Defense and did not know what the basis for the arrangement was or what was being done with the microfilm being furnished.176 Yet the documents do not reflect whether the Recordak machine was removed, either in 1965 or in 1968. It is clear that NSA continued to receive duplicates of all messages to the foreign country referred to above until 1972 ; when again as a result of "discovery" by company officials, this procedure was halted. Although the original request for this intercept procedure had been made by "Holabird people" (Army intelligence), when the company attempted to contact someone regarding its termination, it was ultimately referred to NSA.177 Finally, Western Union International, unlike its competitors, never utilized magnetic tapes to store its message traffic. Accordingly, none was ever provided NSA.178 In effeCt, Western Union International's participation in SHAM ROCK ended by 1972.179 H. NSA's Participation 1. Origins and Early Developmem From 1952 (when NSA first inherited the SHAMROCK sources) until 1963, microfilm and paper tapes originating with the sources were brought to NSA's headquarters at Ft. Meade, Maryland several times a week.180 As noted above, some of these had undergone initial screening, either by NSA operatives or company employees. Even with this preliminary screening, however, the volume of messages which reached NSA daily was apparently quite large.l8l 176 Ibid. ... Affidavit of senior officer, Western Union International, Ine., 10/16/75, p. 1. 178 Letter from an NSA courier to an NSA official, 2/9/68. 1'" Counsel, Western Union International, 10/10/75, p. 2 (sta1f summary). 178 Ibid., p. 3. 1.. Tordella, 9/21/75, p. 53. w Tordella, 10/21/75, p. 17. 181 A former NSA official testified that NSA had received "literally miles and miles and miles of punched tape." 10/23/75, p. 49. 775 Several witnesses have told the Committee that during this period the sheer volume of traffic would have likely prohibited the selection of messages on the basis of content.182 Messages which were selected out were passed on to NSA analysts, who screened them further. fJ. The Switch to Magnetic Tape The character of the SHAMROCK operation changed markedly with the use of magnetic tape. RCA Global was the first company to begin using such tape in the early 1960s.183 NSA was notified of the changeover in early 1963 and, by 1964, was able to sort electronically the information provided by RCA Global against its selection criteria. This is significant because it meant that the telegrams of citizens whose names were on NSA's "watch list" could be selected for processing by NSA analysts. From 1964 until 1966, magnetic tapes from RCA Global were brought to Ft. Meade daily and returned to New York the same day.184 By 1965, ITT World Communications had also begun its changeover to magnetic tapes and was beginning to provide traffic in this form to NSA messengers.l85 3.0IA Oover Support To alleviate the administrative burden entailed by these daily roundtrips, NSA in 1966 sought to find a place in New York City where the tapes could be duplicated.186 NSA Deputy Director Tordella requested that the CIA provide "safe" space where this operation could be conducted. The CIA agreed to rent office space in lower Manhattan, under the guise of a television tape processing company, where the tape duplication process could be carried out.187 CIA designated this project "LPMEDLEY." The cover support began in Novem'ber 1966 and lasted until August 1973, when CIA terminated its part of the program.188 Tordella was told that the CIA General Counsel was "concerned about anI kind of operation in which the CIA was engaged in the continental United States. Regardless of whether CIA was doing anything so small as renting an office, he said 'get out of it.' " 189 NSA subsequently moved its duplicating operation to new office space in Manhattan, where it remained until SHAMROCK was terminated in 1975.190 4. Oontrol of the Program Numerous NSA employees were aware of SHAMROCK, but responsibility for its conduct rested only with the Director, Deputy Director, and one lower-level managerial employee.1s1 Throughout the program's existence, only two individuals occupied this lower-level 1111 See Tordella, 10/21/75, p. 20; testimony of former NSA o1llclal, 10/23/75, pp.49-50. - Staff summary of interview with NSA o1llcial No. 5,10/24/75, p.1. 1116 Ibid. ... Ibid. 181 Tordella, 10/21/75, pp. 23-24; Senate Select Committee memorandum, "Review of CIA Documents re LPMIDDLEY," 9/17/75. 181 Ibid. ... Letter from an NSA courier to an NSA o1llcial, 11/27/66. 181 Tordella, 10/21/75, p. 38. 1110 Ibid. 101 Ibid., p. 41. 776 managerial position: the first between 1952-1970; the other from 19701975.192 The manager was instructed to report directly to the Deputy Director of NSA regarding any problems with the companies. As a routine matter, this individual was in charge of the NSA couriers who traveled between New York and Ft. Meade; he usually received information regarding the SHAMROCK operation from these couriers rather than from the companies. The individual who held this position between 1952-1970 told the Committee that he met with company officials on only two occasions during this time, and both meetings were perfunctory. 193 Both of the NSA employees who acted as liaison with the companies confirmed to the Committee that the companies had never asked what NSA was extracting from the materials provided, and that NSA had never volunteered this information. Neither of the· lower-level employees knew what NSA did with the materials; they stated that the messengers who worked under them also had no knowledge of what was sorted from the telegrams.19• It seems clear, therefore, that the companies never learned that NSA sorted anything except foreign traffic from the telegrams that the companies provided NSA. Since none of the companies (treating them as separate from their parent corporations) engage in domestic communications, they could not have provided NSA with domestic traffic. The Committee has no evidence to show that NSA has ever received domestic telegrams from any source. 5. Oonside:ration of SHAMROOK in OO'Yllltection with the HU8tonPlan Former NSA Deputy Director Tordella told the Committee that in 1970, in connection with the Huston plan,m the principals involved in this projectr-Helms of CIA, Sullivan of the FBI, Bennett of DIA, and Gayler of NSA-discussed the feasibility of the FBI's taking over the SHAMROCK program in order to obtain more information on internal unrest. The FBI did not want the responsi'bility, according to Tordella, and NSA did not want to jeopardize its own working relationship with the companies.19G The Idea was therefore dropped. F. Termination of SHAMROOK Operation SHAMROCK terminated on May 15, 1975, by order of Secretary of Defense James Schlesinger.19T NSA claims that the program was terminated because (1) it was no longer a valuable source of foreign intelligence, and (2) the risk of its exposure had increased.198 :1M Staff summaries of interviews with NSA official No.5, 10/24/75, p. 1; and former NSA employee, 10/24/75, p. 1. m Former NSA employee, 10/2V75, PP. 1-2 (staff summary). 1.. Ibid. See also NSA official No.5, 10/24/75, p. 2 (staff summary). 1llIi The formulation and content of the Huston Plan are described in the Committee's report: "National Security, Civil Liberties, and the Collection of Intelligence: A Report on the Huston Plan." lOITordella, 10/21/75, pp. 34-35, 47-49. m Staff summary of interview with senior NSA officilal No.3, 9/17/75, p. 1. The Committee also reviewed a handwritten memorandum from the Director of NSA, Lt. Gen. Lew Allen, Jr., dated May 12, 1975, which stated that the Secretary of Defense had decided that SHAMROCK should be terminated, effective May 15, 1975. 1lI8 Senior NSA official No.3, 9/17/75, p. 3. 777 IV. NSA PERSONNEL SECURITY AND RELATED MATTERS The Committee investigated the NSA Office of Security to examine personnel security activities which may have been conducted in an overzealous and, possibly, unlawful manner. These activities are not part of NSA's two primary missions-the collection of signals intelligence and the protection of United States communications. Although this subject area is more narrow than others investigated by the Committee, there are similiarities involving the protection of both the rights of citizens and the national security. A. B{l(Jkground The NSA Office of Security is responsible for safeguarding the security of NSA facilities, operations, and personnel, and for protecting classified materials from unauthorized disclosure. This Office also administers NSA's security clearance program and investigates suspected breaches of security by NSA employees. The CIA's Office of Security performs the same functions for that Agency. Personnel in the NSA Office of Security are quick to point out that substantial intangible differences exist between the role of the CIA and NSA Offices of Security. In recent years, the NSA Office has not enjoyed the same high status within NSA that the CIA Office has had within its own organization. At least two factors appear to contribute to this difference. First, the work of an Office of Security investigator bears no similarity to that performed by the professionals conducting signals intelligence and communications security activities, which comprise the heart of NSA. Second, during the 1950s and 1960s, personnel security programs at NSA suffered some widely publicized failures, resulting in both prosecutions for espionage and actual defections to the Soviet Union by NSA employees. These factors have impelled the Office in conflicting directions. On the one hand, its personnel are not expected, and ordinarily do not tend, to take actions on their own initiative that would exceed the normal bounds of keeping the Agency reasonably secure. On the other hand, failures in personnel security have occasionally generated intense public pressure (especially from the House Committee on Un-American Activities) to take extraordinary measures to protect that security. A fair analysis of the incidents listed below, all of which are of dubious legality or propriety, requires an awareness of these dynamics. Like other Government officials, personnel in the Office of Security must be held responsible for their actions. Yet, like most people in the United States, they have been greatly sensitized 'by the Watergate scandal and the recent congressional investigations of the intelligence community to the need to protect civil liberties against dangerous encroachments in the name of "national security." In this section we disclose certain aberrations from that sensitivity, in the confidence that this disclosure will encourage its growth. B. Questionable Activities 1. NSA Office of Seaurity: Access to Files on American Oitizens From NSA's inception in 1952 until October 1974, a unit of the Agency outside the Office of Security maintained a large number of files on American citizens. At the time of the destruction of these 778 records, approximat~ly '75,000 United States citizens were included. Unlike CIA's Operatons CHAOS, these files were not created for the purpose of monitoring the activities of Americans, but for carrying out NSA's legitimate foreign intelligence mission.loo Many circumstances could contribute to the creation of such a file, perhaps the most frequent being the mere mention of an American citizen's name in a communication intercepted by NSA. The files also included reports from other intelligence agendes, such as the CIA and military intelligence units, which mentioned the name of the citizen and were routinely forwarded to NSA. Materials from open sources, such as newspapers, were also in the files. Until the files were destroyed, the Office of Security was often supplied with information from them when it was conducting background investigations on applicants for employment at NSA or when other persons were heing considered for clearances to receive intelligence gathered by NSA. In effect, this meant that the Office of Security was a beneficiary of the vast communications intelligence apparatus of the entire Agency, a resource which is on an entirely different order of sophistication than the wiretapping capability of any police or security force in the nation. (a) CIA Access to N8A Files.-The NSA files contained entrie.<' on many prominent Americans in business, the performing arts, and politics, including members of Con,!!Tess. Althou.Q"h the Committee has no reason to believe that any person at NSA used them improperly, it has learned that for at least 13 years, one or more employees of the CIA worked full-time in these files, retrieving information for the CIA without 1tny snperdsion from NSA. One of thesl' CIA employees recalled, with varying degrees of certainty, chl'cking in these files for the names of V'arious well-known civil rights, antiwar, and political leaders. It is likely, although the Committee is not in a position to so state, that some of the information obtained from NSA found its way into Operation CHAOS.200 NSA did not develop these files for any sinister reason. They were useful in many ways to conducting successfully NSA's legitimate communications intelligence functions. Nevertheless, the fact that CIA personnel used the files without NSA supervision to gather information on American citizens-during a period when the CIA was engaged in unlawful domestic activities aimed against many of those same citizens-illustrates the danger of maintaining such files. The massive centralization of this information creates a temptation to use it for improper purposes, threatens to "chill" the exercise of First Amendment rights, and is inimical to the privacy of citizens. (b) Destruction of Files.-The Committee was informed by NSA that the files on American citizens were de-stroyed in 1974. At that time, a centralized information storage system for foreign names was set up in the intelligence community. This reorganization provided the impC'tlls for a re-evalllation of the fileR on American citizens, and It consensus was reached that their usefulness did not justify the costs in time, money, and storage space. ,.. For a detailed discussion spe the Committpe's report on Operation CHAOS. ... Testimony of a CIA employee, 7/25/75. pp. 17, 25. 779 2. Faqvre to Purge "Suitability Files" LikE> other Federal ag-encies, NSA maintains "suitability files" concerning its employees. These files, which are held by the Office of Civilian Personnel, constitute an interface between that Office and the Office of Security. The latter provides information to these files and has access to them. These files contain highly personal information which mig-ht show the kind of unreliability or vulnerability of an employee which could lead to compromises of classified information. According to NSA, the purpose of these files is to aid the Agency in providing- counseling- and other forms of assistance to individuals with personal problems, not to threaten or damage such employees. The Committee has no reason to believe that the information in these files has been misused. During its investigation. the Committee reviewed 50 of these files, selected on a random basis, with the names of all individnals deleted. Since the information stored in these files is so personal, it seems reasonable to expect that its retention would be kept to the minimum necessary for the purposes of these files. Unfortunately, this policy does not se('m to have been observed in the past. ~fnch of the information is either many years old or simply irrelevant to the suitability of an individual for employment. If a systematic effort had been made periodically to review these files and purge them of inappropriate or dated information, such notations would probably have been eliminated long ago. The establishment of such a system has now been undertaken by NSA. Although persons in sensitive positions at ll!!pncies such as NSA may be expected to sacrifice some degree of privacy to the need to protect national security, that sacrifice must be kept within reasonable bounds. A related question is the access of employees to their own files. NSA regulations provide: "In no instance will employees be given access to their own Suitability File." 201 Nevertheless, with the recent implementation of the Privacy Act, employees may ask for, and be granted, access to their files. Since the Committee fonnd that these files sometimes contain unsolicited and unsubstantiated statements from neighbors. p.powes. and others. thp Privacv Act should result in much of this information being purged. .. 3. Files on NonafRlia-tes of NSA Who Publish Writings Ooncerning the Agency The Office of Security maintained files on two individuals who have published materials describing the work of the National Security Agency. In one case, the relevant writin!!S were published in the late 1960s; in the other case, much more recently. By the time of the second case, NSA had gained some experience in dealing with pnblicity. The file on this person consisted mainly of checks with other Federal agencies to determine what information they possessed concerning the author. and the results of various internal NSA inquiries as to where the f1uthor mip-ht have obtained information. Nevertheless, the Offil'e of Secnrity did submit the author's name for inclusion on the NSA watch list. There is no evidence that this submission resnlted in the dissemination of any international messages sent or received by the author. 201NSA Personnel Management Manual (NSAPMM). Section 2-7(c) (2). 69-984 0 - 76 - 50 780 In the earlier case, the Agency appears to have overreacted. NSA had learned of the author's forthcoming publication and spent innumerable hours attempting to find a strategy to prevent its release, or at least lessen its impact. These discussions extended to the highest levels of the Agency, including the Director, and resulted in the matter being brought to the attention of the United States Intelligence Board. In the course of these discussions, possible measures to be taken against the author were considered with varying degrees of seriousness. The Director suggested planting disparaging reviews of the author's work in the press, and such a review was actually drafted. Also discussed were: purchasing the copyright of the writing; hiring the author into the Government so that certain criminal statutes would apply if the work were published; undertaking "clandestine service applIcations" against the author, which apparently meant anything from physical surveillance to surreptitious entry; and more explicit consideration of conducting a surreptitious entry at the home of the author. To the credit of those involved, none of these measures were carried out. Other steps, however, were taken. The author's name was placed on the NSA watch list and various approaches were made to his publisher. The publisher submitted a manuscript of the work to the Department of Defense, apparently without the author's permission. Despite requests from NSA to halt publication or to make extensive deletions, publication took place with only minor changes, to which the author had agreed. The most remarkable aspect of this entire episode is that the conclusion reached as a result of NSA's review of this manuscript was that it had been written almost entirely on the basis of materials already in the public domain. It is therefore accurate to describe the measures considered by NSA and USIB as an "overreaction." 4. Other Files Maintained by the Office of Security Although the Office of Security does not maintain files today on persons not affiliated with the Agency, it has done so in the past. The Agency describes these files in the following terms: The maintenance of these files began in the late 1950s. In early 1974, approximately 2800 files concerning nonaffiliated organizations and personnel were destroyed in accordance with DOD Directive 5200.27. The files consisted of reports from the FBI and other intelligence, security and federal agencies as well as state and mumcipal agencies who maintained such records. Information was also obtained from the congressional records of the House Committee on lTnAmerican Activities, and open source, commercial publicatiQns. These files were retained primarily as a reference source for security education purposes, as an aid to our personnel security process and to provide assessment regarding the vulnerability of this Agency to foreilZll intelligence activities and extremists activities which posed a threat to the NSA mission, functions and property. Of the 2800 files which were accumulated, the great majority concerned forei,gn controlled and subversive organizations cited by the Attorney General of the United States. 781 These organizations were those advocating the overthrow of the U.S. Government, and the violent disruption of the orderly process of government, etc. The small percentage of files maintained on individuals concerned suspected espionage agents, extremists, anarchists, etc. These persons were both U.S. and foreign citizens.202 DOD Directive 5200.27 was first issued in March 1971, and it greatly restricted the discretion of Department of Defense units to retain such files. The Directive stated, however, that it was "not applicable to the acquisition of foreign intelligence information or to activities involved in ensuring communications security." 203 NSA's General Counsel interpreted this language as exempting NSA from the coverage of the Directive, and was supported in this opinion by a Deputy General Counsel in the Department of Defense.204 Only in 1973 was NSA informed by the Defense Investigative Review Council (DIRC) that some of its activities were subject to the Directive. Once this was established, NSA took steps to comply, which included destruction of of the 2800 files.205 In April 1975, the DIRC conducted an unannounced inspection of the KSA Office of Security to ascertain its compliance with DOD Directive 5200.27. Although substantial compliance was found, the DIRC did note that the Office still maintained three files with some questionable entries. These files concerned "threats" to NSA functions and property; characterizations of organizations; and unsolicited inquiries and "cranks." 206 Since the time of the DIRC report, NSA has drastically reduced the amount of materials in these files. The Committee did obtain from NSA copies of the files as they existed at the time of the DIRC inspection. As the DIRC reJ?Ort noted, the first two of these files contained some questionable entrIes. At the time of the inspection, the "threat" file still contained extensive infonnation on a peaceful demonstration of less than 40 persons ne.ar NSA headquarters in 1974. Similarly, the "characterizations" file reflects the fact that in the past the Office of Security would prepare a characterization of almost any organization that an NSA employee wanted information about before joining it or otherwise becomin~ involved. The characterizations were prepared largely on the baSIs of NSA's own files and from infonnation supplied by other agencies. It appears that DOD Directive 5200.27 and its enforcement through the DIRC mechanism are functioning effectively at this time to prevent the excessive accumulation of files on American citizens. 6. Office of Security Participation in Watch List Activity. Innis testimony before the Committee, NSA Director, General Lew Allen, Jr., detailed the efforts made by the Agency to intercept communications to and from certain AmerICan citizens from the late 1960s until 1973.207 Not all of the names "watch listed" under this program ,.., NSA Response, 8/25/75, p. 4. .... DOD Dh"ective 5200.27, 3/1/71, section H.B. See the Committee's report: "Improper Surveillance of Private Citizens by the Military," for a detailed discussion of this directive. ... Ibid. ... NSA Response, 8/25/75, p. 1. ... Ibid., Tab 3, p. 6. ... Hearings, Vol. 5, pp.1-46. 782 were submitted to NSA from the outside. The Office of Security also submitted approximately 13 names for monitoring. Of these names, 11 had some present or past affiliation with NSA. Each of these 11 individuals had either defected to the Soviet Union, been convicted of espionage, were suspected of some other connection to an unfriendly power, or had made threats against NSA or its Dire0tor. Two of the names were of American citizens not affiliated with NSA. As described earlier, these two persons had published writings in this country about the Agency's activities, causing the Office of Security concern about the possible compromise of classified information. The Government does have a continuing legitimate interest in the communications of defectors and suspected enemy agents, and should be permitted to intercept such communications if the proper procedures (e.g., a warrant or approval of the Attorney General) are established. The danger in allowing the Office of Security to place names on a watch list is that the decision as to whether the activitIes of a particular individual are sufficiently suspicious to justify intrusion into the privacy of his communications is left in the hands of an interested party: the Office of Security itself. The inclusion of the names of two persons not affiliated with the Agency-neither of whom was seriously suspected of any intent to aid a foreign power and each of whom was directly exercising First Amendment freedom&-illustrates the tend.. ency of limited infringements of privacy to be extended to an everwidening scope. Only the involvement of a neutral third party can help safeguard against such extensions. 6. Oonventional Electronic Surveillance and Surreptiti0u8 Entries For many years, the Office of Security has scrupulously avoided the use of conventional electronic surveillance off NSA premises. It has neither tapped any telephones nor engaged in any bugging of rooms outside the Agency since 1958. In the late 1950s, four instances of electronic surveillance without a court order did take place. Three of these incidents transpired at the residences of present or former NSA employees. The fourth occurred in aNew York City hotel room occupied by one of those same persons. The subjects of surveillance ranged from persons convicted of espionage activities to persons friendly with diplomatic personnel of unfriendly foreign powers and/or homosexuals. The duration of the coverage varied from a few days to three months. The technology of the bugging devices used by the Office of Security in the late 1950s was such that they could only be installed by trespassory means. Each of the above instances thus involved a surreptitious entry at the place being bugged. Moreover, the devices were battery operated; in the case of a surveillance lasting three months, periodic re-entries were necessary to charge the batteries powering the device.20B In addition, the Office of Security conducted four surreptitious entries in the early 1960s which were unrelated to electronic surveillance and which did not involve warrants. The entries involved two defectors to the Soviet Union (Martin and Mitchell), an employee suspected .... Staff summary of an interview with NSA Office of Security official, 8/8/75. 783 of taking classified documents out of NSA, and an employee who had contact with an embassy of an unfriendly foreign power. With the passage of many years since these relatively isolated incidents, it is difficult to ascertain the levels at which they were approved. Both past and present Directors of Security at NSA have stated that they ·would not have taken place without the approval of the person holding that position, and that at the time of these incidents the Director of Security enjoyed such a close working relationship with the Director of NSA that the surveillance would not likely have occurred without the Director's knowledge.209 7. "External Oollection Program" In 1963, after a review of the Office of Security's counterintelligence program by the Office and the Director of NSA, several steps were taken to strengthen the program. Among these was the establIshment in October 1963 of an "External Collection Program." 210 It appears that this "program" was, from its beginning, highly informal. Office of Security personnel had only vague and conflicting recollections as to what it had consisted of or how long it had lasted. Most did recall that the program included. brief periodic visits to bars, restaurants, and other establishments in the vicinity of NSA headquarters by Office of Security personnel. These visits were made to determine where NSA employees gathered after hours, whether they discussed classified information, and whether agents of hostile intelligence services also frequented these locations. The program also involved an effort to encourage persons working in these establishments to report any suspicious incident to NSA and to make the local police aware of the sensitivity of NSA's mission. Since the revelant documents were destroyed in 1973, the Committee has been unable to establish whether the External Collection Program was used to gather information on persons other than NSA employees and foreign agents. The Office of Security, in fact, soon discovered that it lacked the personnel to carryon such a program, and it died quietly "in approximately 1966-1967." 211 20' Staft' summary of an interview with NSA Office of Security official, 8/22/75. 210 NSA response of 9/30/75 to Senate Select Committee letter of 9/3/75. 2U Ibid.
|