Site Map

CHURCH COMMITTEE REPORTS

IMPROPER SURVEILLANCE OF PRIVATE CITIZENS BY
THE MILITARY
CONTENTS
1. Introduction and Summary _
A. Traditional and legal restraints _
B. Summary of improper surveillance activities _
1. Collecting information about the political activities of
private citizens and private organizations in the late
1960S ~---------------
2. MoSntaittoersing private radio transmissions :'11 the United_
3. Investigations of private organizations considered
"threats" by the military _
4. Assisting law enforcement agencies in surveilling
private citizens and organizations _
C. Effect of 1971 departmental directive _
D. Issues presented _
E. Conduct and scope of investigation _
F. Organization of report _
II. The Collection of Information About the Political Activities of Private
Citizens and Private Organizations: 1965-1970 _
A. Legalauthorities _
B. Orpigriongsraamnd development of the Army's domestic surveillance_
1. Limited beginnings _
2. The Army's involvement intensifies _
C. The Army's domestic surveillance program -- _
D. Questionable activities on the part of Army agents _
1. The covert penetration of civilian groups _
2. Posing as newsmen/covert photography _
3. Harassment/disruptive conduct _
4. MaoirngtaeD~lazna~tteoonfs files on private citizens and private_
E. Termination of the Army's civil disturbance collection program_
III. M1o9n7it0oring Private Radio Transmissions in the United States: 1967_-
A. Legal authorities and restrictions _
1. Mission of the Army Security Agency _
2. Section 605 of the Communications Act of 1934 _
B. Origins of domestic radio monitoring by ASA _
C. Domestic radio monitoring by ASA: 1967-1970 _
1. The march on the Pentagon _
2. The King assassination riots _
3. The poor people's campaign in Washington, D.C _
4. The national political conventions of 1968 _
5. The Huey Newton trial _
6. Cafe Zipper ~ _
D. The termination of domestic radio intercepts _
(785)
Page
787
787
788
789
789
790
791
791
791
792
793
793
793
794
794
795
798
800
800
801
802
803
804
806
807
807
807
807
808
808
809
810
811
812
813
813
786
IV. InvAesctoignatitninuginCgipvrioligarnamGroups Considered "Threats" to the Military_;
A. Investigations of civilian groups within the United States _
1. Investigations undertaken prior to the 1971 directive.
2. Invdeirsetcigtiavteions of civilian groups after the 1971_
a. Antiwar group in San Diego, California _
b. Peace group to HanoL _
c. UnFdoerrcgeroBuansde newspaper near Travis Ai_r
d. Peace group in San Diego, California _
e. Antiwar group in Charleston, South Carolina_
f. WhCiaterolirnaacist group in Charleston, South_
g. Dissident group in Long Beach, California _
h. Serviceman's Counseling Center in San Diego_
i. AnCtiamroilliitnaary group in Charleston, South_
B. Investigations of civilian groups overseas _
1. Army operations in West Germany and West Berlm_
2. Navy operations in Japan _
V. Assisting Law Enforcement Agencies in Surveillance of Private
Citizens and Organizations _
A. Legal authority _
B. Nature of assistance _
1. Collection and exchange of information _
2. Transfer of money and equipment. _
3. Participation in law enforcement operations _
4. Participation in interagency intelligence projects _
VI. CurrAen. tCDuerpbainrgtmpeansttaalbRuessetsraints Upon Surveillance of Civilians __
1. Preparing for civil disturbances _
2. Monitoring domestic radio transmissions _
3. Investigating "threats" to the military _
4. Assisting law enforcement agencies _
B. Prev1e.ntSincgopseurveillance in the future __
2. Permitted exceptions _
a. Covert surveillance _
b. Overt surveillance _
c. Electronic surveillance _
d. Retention of files _
3. Implementation and enforcement _
4. Prospects for the future _
VlT. Current Statutory Restrictions Upon Military Surveillance _
Palf8
814
815
815
816
816
816
817
817
817
817
818
818
818
818
819
821
822
822
823
823
824
824
824
825
826
826
827
827
828
828
828
829
829
830
830
830
831
832
833
IMPROPER SURVEILLANCE OF PRIVATE CITIZENS
BY THE MILITARY
I. INTRODUCTION AND SUMMARY
The Department of Defense maintains agents and investigators
abroad and within the United States to gather foreign intelligence and
to perform a variety of investigative tasks.! This report describes how
these agents and investigators have been used in the past to gather
information on the political beliefs and activities of "private citizens"
2 in violation of their rights or in violation of the legal and traditional
restraints which separate the military and civilian realms. It
does not cover the monitoring of international communications by the
National Security Agency.3
A. Traditional awl Legal Restraints
The authors of the American Constitution sought to establish and
preserve a clear separation of the military from the civilian realms.
An express provision of this effect was suggested by one of the delegates
to the Constitutional Convention,· but it was not included in the
final version since the Founders considered separation assured by other
provisions, such as those which made the Armed Forces subordinate to
a popularly-elected President,5 and left it to a popularly~elected legislature
to "raise and support" them.6 As James Madison later wrote:
"The Union itself, which [the proposed Constitution] cements and
secures, destroys every pretext for a military establishment which
could be dangerous." 7
1 Within the United States, the Select Committee estimates that there are
approximately 5000 DOD personnel involved in the conduct of security clearance,
~riminal, and counterintelligence investigations. For a discussion of the organization
and activities of DOD foreign intelligence and investigative elements, see
the Select Committee's Foreign and Military Intelligence Report, Department of
Defense, pp. ~9.
• The term "private citizen," as used in this report, refers to persons and groups
of persons, who are neither military nor civilian employees of the Department of
Defense, nor employees of civilian contractors of the Department of Defense.
How the constitutional rights of this special group of citizens are infringed by
the intelligence activities of the Department is, however, a matter deserving of
congressional attention and the Select Committee, by this omission, does not intend
to discourage such an inquiry in the future.
• The use of military personnel to monitor international communications to
obtain information on civilians and civilian organizations is discussed in the
Select Committee's Report on National Security Agency Surveillance Affecting
Americans.
• Recommendation of Charles Pickney, submitted August 20, 1787, printed in
The Records of the FederaZ Convention Of 1787, ed. by Max Farrand (New Haven:
Yale University Press, 1966), Vol. 2, p. 340.
• Article II, Section 2, Constitution of the United States.
• Article I, Section (12), Constitution of the United States.
• James Madison, No. ,+1, Federalist Papers (New York: Mentor Books, 1961),
p.258.
(787)
788
The Bill of Rights to the Constitution, adopted in 1791, established
additional restraints ap,I?licable to all government authority, including
the military, by forbiddmg any exercise of govermnental power which
infringes upon certain rights of the people,8 among them, the ri~ht to
privacy and the rights to freedom of speech, of the press, of relIgion,
of association, and the right to petition the government.9
Despite the separation of the military and civilian realms secured
by the Constitution and the guarantee of personal liberties found in
the Bill of Rights, Congress has enacted no statute which expressly
provides how the military may be used in the civilian community,
or more specifically, whether it is (>rohibited from investigating private
citizens and private organizatIOns. Congress did enact the Posse
Oomitatus Aot in 1878 10 which forbade using the Army to "execute the
law," but this was done to prevent federal marshals from commandeering
military troops to help enforce the law, and not to prohibit investigations
of civilians by the military.ll Apart from the P088e Oomitatus
Aot, only the Privacy Act of 1974 12 appears to serve as a restraint upon
military investigators, but even the impact of this statute is uncertain.13
It prohibits all federal agencies, includin~ the military, from maintaining
records which reflect "how any mdividual exercises rights
guaranteed by the First Amendment." 14 While the Act does not prohibit
investigations per 8e, its proscription against maintaining records
may, as a practical matter, inhibit them.
This report describes certain past investigative activities of the
military which may have exceeded these limitations. It also identifies
instances in which military investigators may have violated s'p'ooific
statutes because of the tactics employed in investigations of ciVIlians.
It does not attempt to evaluate the foreign intelligence and other investigativeactivities
of the Department of Defense in terms of their
efficiency or usefulness.
B. Summary ofImproper Surveillance Aotivities
After conducting an investigation of both the foreign and domestic
intelligence and investigative activities of the Department of Defense,
the Committee identified four types of surveillance, or investigative
activity, which have involved the collection of information on the activities
of private citizens and private organizations and which may
have violated the traditional and legal restraints mentioned above:
(1) the collection of information on the polit~cal activities of \lrivate
citizens and private organizations in the late 1960s; (2) momtoring
of domestic radio transmissions; (3) investigations of private organizations
which the military considered "threats"; and (4) assistance to
other agencies engaged in surveillance of civilian political activities.
In each case, the Committee attempted to focus upon those activities
which are improper in themselves, and those which are improper because
it is the military which is engaging in them.
• Amendments I-X, ~nstitutlonof'the United States.
• Amendment I, Constitution of the United States.
10 18 U.S.C. 1385.
11 For a brief history of the P088e Comitatu8 Act, see Edward S. Corwin, T'JI,e
Pre8ident: Office and POW€r8 1787-1957 (New York: New York University Press,
1957), pp.I30-138. See also the discussion at pp. 822-823.
12 Pub. L. 93-579.
11 The application of the Privacy Act of 1974 is discussed in detail at pp. 833834.
u l5 U.S.C. 552a(e) (7).
789
1. Oollecting Information about the Political Activities of Private
Citizens a1Ul Private Organizations in the Late 1960s.-The President
is authorized by statute to use the militia (the National Guard), the
Armed Forces, or both, to "suppress" domestic violence.1. Prior to
~he 19608, the President's exercise of this authority had been relatively
rnfrequent.
In the early 1960s, however, the Army and National Guard were
called upon with increasing frequency to control civil rights demonstrations,
prompting the Army to prepare for possible future
disturbances and to begin systematic collection of information concerning
civilians and organizations who might be involved.
Initially the Army relied, for the most part, on obtaining information
from local police authorities, the FBI, and the news media,
rather than assigning its own personnel to investigate. However, as
the frequency and severity of urban riots and antiwar demonstrations
grew in the late 1960s, the Justice Department and the White House
pressed the Army to obtain informatIOn on individuals and groups,
and the Army's resJ;l0nse was to direct its investigators to report on
civilian political actIvities throughout the country.
Elaborate collection plans were issued, calling for the collection
of information on the most trivial of political dissent within the
United States.16 As part of this collection program, massive
operations were undertaken by Army intelligence agents to penetrate
major protest demonstrations. In addition, political dissent was
routinely investigated and reported On in virtually every city within
the United States. These reports were circulated, moreover, to law
enforcement agencies at all levels of Government, and to other agencies
with internal security responsibility. In all, an estimated 100,000
individuals were the subjects of Army surveillance. The number of
organizations which were the subjects of an Army file was similarly
large, encompassing "virtually every group engaged in dissent in
the United States." 17
Techniques employed to carry out this surveillance included the
covert infiltration of private organizations by military agents at
demonstrations and meetings; Army agents posing as newsmen;
covert photography; and use of civilian informants.
The Department of Defense ended the nationwide collection program
as a matter of policy in 1971, after the program had been
exposed in the press, and on the eve of a congressIOnal investigation.
2. Monitoring Private Radio Transmissions in the United States.Section
605 of the Communications Act of 1934 prohibits anyone from
intercepting and publishing the content of a private radio transmission.
Despite this statutory prohibition the Army Security
Agency, primarily a foreign intelligence-gathering agency, moniu
10 U.S.C. 381-334.
.. One of these plans called for "the identification of all personalities Involved
or expected to become involved, in protest activities." It furthermore tasked
military investigators to provide "details concerning the transportation arrangements"
of such individuals as well as "detllils concernine: (their) housine:
facilities." United States Army Intelligence Command Collection Plan, April
23,1969.
11 Testimony of Rll lnh Stein. form"!' Arm.v intelligen<>e llnaly-st. Senate .Tlldi..,illry
Subcommittee on Constitutional Rights Hearings. "Federal Data Banks, Computers,
and the Bill of Rights," p. 264. See footnote 21, p. 792.
790
tored and recorded domestic radio transmissions of U.S. citizens on
six occasions in the late 1960s.
Some of the radio monitoring was done during demonstrations or
urban riots where Army troops had been committed. On occasion,
it was undertaken in advance of, or in the absence of, any troop
commitment.
After its radio monitoring activity had begun, the Army sou~ht
approval from the Federal Communications Commission. The FCC,
after receiving an opinion from the Attorney General, advised the
Army that such monitoring was illegal. Neve.rtheless, the Army continued
its domestic radio monitoring without informing the FCC until
1970, when the Department of Defense ordered the Army to disContinue
such monitoring.
3. Investigations of Private Organizations Oonsidered "Threats"
by the Military.-Although they are not expressly authorized by law,
each of the military services investigates civilian groups, both within
and without the United States, which it considers "threats" to its
personnel, installations, and operations.
In the late 1960s all of the services were engaged in monitoring
civilian antimilitary groups within the United States. This activity
was conducted concurrently with the civil disturbance collection effort
described above and continued after it stopped. Most of the information
gathered about these antimilitary groups was collected from law
enforcement agencies and the news media, but the services also quite
commonly inserted their own undercover agents and informants into
the groups.
Penetrations of groups which are hostile, or might be hostile, to the
military continues today in the United States, although it has been
greatly reduced. Overseas, military intelligence is more active, largely
because it does not have civilian law enforcement agencies to rely upon.
In West Germany and West Berlin, the Army has actively conducted
surveillance of activities of American citizens and groups of
American citizens whom it considered "threats" since World War II.
Until 1968, the authority to target such individuals and ~ouns for
surveillance rested solely with the commanders of occupying Amiy
forces, and authorized techniques included opening mail, wiretaps,
and covert penetrations. In 1968, the West German Government placed
restrictions on the use of mail opening and wiretaps. and forbade the
Army from employing such techniques any longer. The use of covert
penetmtions, however, was not affected by the new restrictions and
continued to be employed. Furthermore, the new restrictions did not
apply to West Berlin, where an Army commander governs the American
sector of the city as part of a special tripartite agreement with the
British and French. Here, mail opening and wiretaps continued to be
employed after 1968 against Americans and groups of Americans considered
to be "threats" to the military without the Army's having to
obtain the approval of the West Germ'an Government.
In Japan, the Navy has carried out similar operations in three cities
against groups of American civilians thought to pose "threats" to
the Navy, employing covert penetrations and informants, but not mail
opening or wiretapping.
791
"Threat" investigations are still conducted at present, but under
internal controls of the Department of Defense.
4. Assisting Law Enforcement Agencies in Surveilli'ng Private Oitizens
and Organizations.-The Posse Oomitatus Act (18 U.S.C. 1385)
prohibits the military from "executing the law." 18 Nevertheless, military
intelligence has frequently provided assistance to civilian law
enforcement agencies. In Chicago during the late 1960s, military
intelligence agents turned over their files on civilians and civilian
organizations to the Chicago police, were invited to participate in
police raids, and routinely exchanged intelligence reports with the
police. In Washington, D.C. Army intelligence participated in an
FBI raid in a civilian rooming house and provided funds for the
police department's intelligence division.
The military was also called upon by the Justice Department to
assist in analyzing intelligence information received during the 1972
national political conventions. Further, i,t joined other intelligence
agencies ill drafting the so-called Huston Plan in 1970, and later
participated in the Intelligence Evaluation Committee, an interdepartmental
committee established by the Justice Department to analyze
domestic intelligence information.1s'
O. Effect of 1M1 Departmental Directive
In March 1971, during congressional hearings on the Army's civil
disturbance collection program, the Department of Defense announced
the issuance of a new directive to govern the collection and retention of
information by the military on "unaffiliated" persons and organizations.
19
In general, the new directive prohibited, as a matter of policy, the
collection of any information whatsoever on "unaffiliated" persons and
organizations, except for limited "military" purposes. It also established
the policy that any information which was collected by the military
would be obtained through liaison with law enforcement agencies
rather than through military operatives. Finally, it required the destruction
of all current holdings of the department which were found
to violate the provisions of the directive.
This directive is discussed later in this report as it bears on issues
regarding possible legislative restraints upon future investigative activities
of the department.2o But an awareness of its existence and a
general understanding of its impact is crucial to the case studies which
follow. '
D. Issues Presented
Each of the four types of activity summarized above involve investigations
by military intelligence of the political activities of private citizens,
and thus, to the extent they survive today, threaten to violate the
traditional and legal restraints which govern the use of military forces
in the civilian community. This situation gives rise to two major ques-
18 The P088e ComitatU8 Act originally applied only to the "Army." It was later
amended to include the Air Force, and has been interpreted by the Department
of Defense as applying to all the military services.
18, See the Committee Report, "National Security, Civil LibertieJ'l, and the
Collection of Intelligence: A Report on the Huston Plan."
18 DOD Directive 5200.27.
,. See pp. 825-833.
792
tions: First, should these activities in the civilian community be permitted
at all ~ If so, should they be restrained to prevent their overstepping
traditional and legal bounds ~ Second, are the present DOD
directives sufficient for the task ~ Should Congress enact new
legislation ~
Beyond these basic questions is the matter of what the restraints
which govern these activities should be:
(1) Should the military be prohibited from collecting or maintaining
any information regarding "private citizens~" If not, where
should the line between permissible and impermissible information be
drawn¥
(2) Should the military be prohibited from using its own operatives
to collect information in the civilian community ~ Are there collection
techniques that might be authorized for some federal agencies (e.g.,
wiretaps) that should be denied to the military ~
Finally, there are issues of oversight and control:
(1) Should there be a special mechanism established to control and
oversee activities by the military within the civilian community ¥
(2) How should congressional oversight of this area be achieved ~
E. OoruiuotandSoope of Investigation .
The Committee's inquiry, as summarized above, is divided into
four parts. One recoWlizes at the outset that the first of these-the
Army's domestic surveillance pro~m of the late 1960s-has heretofore
been the subject of a congressional investigation.21 The Select
Committee determined, however, that it could not iWlore this largest
of military intelligence aibuses, even though its inquiry must necessarily
overlap the previous investigation in some respects. The Army
program of the late 1960s, besides being the worst intrusion that military
intelligence has ever made into the civilian community, resulted
in new departmental restrictions being drawn, and other intelligence
activities against American citizens being curtailed or eliminated.
Thus, current use of military intelligence agents in the civilian community
can not be fully understood without some knowledge of the
Army program and how it was curtailed.
The Select Committee inquiry does go well beyond the earlier
inquiries. In particular, it represents the first attempt to analyze the
origins and termination of the Army program. The Committee had
access to former Army intelligence officers, who were not permitted
to testify in the earlier investigations, and it had access to documents
not previously available to Congress.
• The Senate Judiciary Subcommittee on Constitutional Rights, chaired
by Senator Sam J. Ervin, Jr., held two series of hearings and published two
committee reports on the subject of military surveillance of civilians: 1) "Federal
Data Banks, Computers and the Bill of Rights," Hearings before the Subcommittee
on Constitutional RightR, Committee on the Judiciary. United States
Senate, 92nd Cong., 1st Sess. (1971) (cited hereinafter as 1971 Hearings);
2) "Military Surveillance," H{'arings before the Subcommittee on Constitutional
Rights, Committee on the Judiciary, U.S. Senate, 93rd Cong., 2d Sess.• (1974)
(cited hereinafter as 1971, Hearings) ; 3) "Army Surveil1ance of Civilians: A
Documentary Analysis." A 'Staff Report of the Subcommittee on Constitutional
RiA'bts. Committee on the Judicillry, United States Senate. 92nd Cong.• 1st Sel's.•
(1972) (cited her{'inafter as 197! Report) ; and 4) "MilitarySuTveillance of
Civilian Politics." A Report of the Subcommittee on Constitutional Rights. Committee
on the Judiciary, United States Senate, 93rd Cong., 1st Sess., (1973)
(cited hereinafter as 1978 Report).
793
After initial briefings from pertinent elements within the Department
of Defense, the Committee staff interviewed 35 past and present
employees of the Department, and 13 other individuals regarding
some aspect of this inquiry.
The investigation generally covered the period from 1967 through
1975, although some events of prior years are described to provide
historical background.
F. Organization of Report
Parts II through V of the following Report describe in detail the
activities which have been summarized above. In Parts VI and VII,
the issues posed above are considered. The effect of recent Departmental
restrictions and the effect of the Privacy Act of 1974 are given
particular consideration.
II. THE COLLECTION OF INFORMATION ABOUT THE POLITICAL ACTIvrrIES OF
PRIVATE CITIZENS AND PRIVATE ORGANIZATIONS: 1963-1970
A. Legal Authoritie8
There is no statute which authorizes military intelligence to collect
information on the political activities of private citizens and private
organizations, but the Army claimed in 1971 that it needed such information
in the late 1960s to enable it to prepare for situations in
which it was called upon to put down civil disturbances.22
Article IV, Section 4 of the United States Constitution provides
that "the United States shall ... protect each [State] ... against
domestic violence."
Congress first passed a statute to implement this constitutional
provision in 1795,23 and, although amended, its provisions remain virtually
intact today.24 In essence, the President is authorized to use the
militia of any state, or the Armed Forces, or both, to "suppress
insurrection." 25
The President has occasionally exercised this authority and called
out the National Guard or the Armed Forces to put down unrest or
enforce the law where such enforcement proves to be beyond the capability
of civil authorities. According to a 1922 study by the War
Department, the President exercised this authority thirty times between
1795 and 1922.26 In recent times, while commitment of federal
troops in the civilian community has been more frequent,28
an extraordinary exercise of executive authority.28
There is no explicit authority in sections 331-334 of title 10, United
States Code, for the National Guard, or the Armed Forces, to make
any "preparations" for future deployments upon order of the President.
In 1971, however, the Department of Defense argued before
II Testimony of Robert F. Froehlke, Assistant Secretary of Defense (Administration),
1971 Hearing8, p. 376.
"1 Stat. 424 (1795) .
.. 10 U.S.C. 331-334.
06 10 U.S.C. 331.
.. Results of this study were quoted in the testimony of Robert F. Froehlke,
1971 Hearing8, pp. 376--377.
~ Froehlke,1971 Hearings, pp. 377-378.
lIS DOD General Coumel J. Fred Buzhardt told Senator Ervin that only "drastic
circumstances" necessitate the deployment of federal troops. See 1971 Hearing8,
p. 412.
794
Congress that such authority could be implied, and would justify thl'
collection of information on persons and organizations in the civilian
community:
In order to carry out the President's order (under the statute)
and protect the persons and property in an area of civil
disturbance with the greatest effectiveness, military commanders
must know all that can be learned about the area
and its inhabitants. Such a task obviously cannot be performed
between the time the President issues his order and
the time the military is expected to be on the scene. Information
gathering on persons or incidents which may give rise
to a civil disturbance and thus commitment of Federal troops
must necessarily be on a continuing basis. Such is required
by sections 331, 332, and 333 of title 10 of the United States
Code, since Congress certainly did not intend that the President
utilize an ineffective Federal force.29
The Senate Subcommittee on Constitutional Rights subsequently
rejected this assertion, however, stating that it was "unwilling to imply
the authority to conduct political surveillance of civilians from the
role assigned by statute to the military in the event of civil disturbance."
30 It cited the traditional separation of the military and civilian
realms as a reason for refusing to imply such authority,3! and it qnestioned
the use of military rather than civilian authorities to gather
information about pending civil disturbances.32 Finally, it observed
that even if the military had implied authority to collect some information
on areas of potential civil disturbance, this authority did not
include the collection of information on how citizens exercise their
First Amendment rights,33
B. Oriqim and Development of the Army's Domestic Surveillance
Program
Army intelligence began collecting information on private citizens
and organizations in the early 1960s as part of furnishing information
to military commanders whose units were dispatched to control racial
situations in the South. In the late 1960s, however, as the volume of
civil disturbance and protest demonstrations grew, the Army came
under increasing pressure from civilian authorities to provide information
on persons and organizations involved in domestic dissent.
It responded by sending over 1200 of its investigators into civilian
communities to report on all vestiges of political activity.
(1) Limited Beginnings.-Despite the lack of clear legal authority
to "prepare" for deployments in civil disturbance situations, the Army
in the early 1960s initiated formal efforts to plan for its troops being
committed in future civil disturbances. Prompted by a rash of troop
commitments to control racial situations and enforce court orders in
20 Froeblke, 1971 Hearing8, pp. 884--885.
eo 1978 Report, p. 106.
III Ibid.
.. Ibid., p. 108.
• Ibid., p. 109.
795
the South,S4 the Joint Chiefs of Staff in 1963 designated the Chief of
Staff of the Army as its "Executive Agent" for civil disturbance matters,
and the Continental Army Command was made responsible for
the selection and deployment of Army troops in such situations.85
Formal contingency plans were drawn.
It was at this time that Army intelligence began collecting information
on individuals and organizations, without any express authorization,
as part of its overall mission to support military commanders
with information regarding possible deployments in civil
disturbances.s6 The Army's collection, however, was ordinarily confined
during this period to those areas where civil disturbances were
likely or had already taken place, and information on civilians was
ordinarily obtained through liaison with law enforcement and use
of public media.37 Any covert use of military intelligence agents within
the civilian community still had to have the approval of the Department
of the Army,SS
In the following three years, the number of riots and disorders within
the United States increased dramatically. In 1965, there were four
major riots, including Watts, California; in 1966, there were 21 major
riots and disorders; and in 1967, there were 83.39 These had necessitated
the deployment of National Guard forces 36 times during this
period.40
The Army, while being deployed only once during the period,41 was
nevertheless affected by events. Frequently, Army troo~s had been
alerted, and occasionally, they had been "pre-positioned" in the event
they were called upon.42 Army' intelligence stepped up its own collection
efforts in support of mIlitary commanders still relied, for the
most part, on their contacts with local police and the public media,43
Army investigators in the United States were still spending most of
their time doing security clearance investigations for Army
employees,44
(2) The Army's Involvement Intensifies.-In 1967, the character
of the investigative program began to change. In .July of that year, the
Army was placed on alert for riot duty in Newark, New Jersey, and
later in the month was actually deployed for eight days in Detroit,
Michigan.45 It was the most extensive use of Army troops since 1962.
.. In 1957, federal forces were used in connection with the integration of Central
High School in Little Rock, Arkansas. In 1962, 20,000 Army troops were
sent to Oxford, Mississippi, in connection with the integration of the University
of Mississippi. In 1963, federal troops were dispatched to Tuscaloosa and HuntB~
ville, Alabama, to enforce federal court orders. See 1971 Hearings, pp. 377, 1291.
.. Froehlke.1971 Hearing.~, p. 377.
"Ibid., p. 381. This information was also confirmed by former Army Chief of
Staff, General H'lrold K. Johnson. Staff summaly of Gen. Harold K. Johnson
interview, 11/18/75.
lIT Froehlke, 1971 Hearings, p. 381.
.. Ibid.
.. Ibid., p. 377.
.. Ibid.
41 Ibid., p. 378.
.. In early 1965, the Army Intelli~nce Command was apparently preparing a
daily civil disturbance intelligence summary. The Secretary of the Army ordered
it di~continued in September 1965, however. Froehlke, 1971 Hearings, p. 832.
.. Ibid.
"Ibid.
.. Ibid.• p. 378.
59-984 0 - 76 - 51
796
In the post-mortems which followed the Detroit riots, the lack of
adequate intellig-ence prior to moving into the city was a sore point.
But the focus of the criticism was the lack of "physical intelligence"
about the area in which troops were being committed. Cyrus Vance,
sent by the President to make an aIter-action assessment, specifically
cited the need for this type of information:
In order to overcome the initial unfamiliarity of the Federal
troops with the area of operations, it would be desirable if
the several continental armies were tasked with reconnoitering
the major cities of the United States in which it appears possible
that riots may occur. Folders could then be prepared for
those cities listing bivouac areas and possible headquarters
locations, and providing police data, and other information
needed to make an intelligence assessment of the optimum
employment of federal troops when committed.46
The Army reacted to Vance's recommendation by appointing a special
task force in the fall of 1967 to study the civil disturbance situation
and make recommendations as to what its role should be.41
In the meantime, the Army was preparing for a unique sort of civil
disorder, one announced in advance and directed against the military
establishment. The so-called March on the Pentagon was scheduled
for late October 1967.
For the first time in its history,48 the Army authorized a massive
covert intelligence operation to be undertaken in connection with a
civilian demonstration. In all, 130 Army intelligence agents were used
in connection with the demonstration.49 Some were used to penetrate
protest groups comin~ to Washington: some were used to penetrate
the groups in Washington who were planning the March; and still
others were used to penetrate and report on the line of march.50 Army
agents, moreover, took still and motion pictures of the crowds, and
secretly monitored amateur radio bands to learn of the demonstrators'
plans.61
Even after this large covert operation, the Army apparently was
still relying primarily on civilian authorities and the media for information
on civilian "dissenters." 52 In a memorandum to the Undersecretary
of the Army from the Army Assistant Chief of Staff for
Intelligence in late 1967, the Under Secretary was told:
Army intelligence is not engaged in any concerted investigative
effort to determine the routes of domestic discontent or
.. Final Report of Cyrus R. Vance, Special ABsistant to the Secretary of Defense,
Concerning the Detroit Riots, July 28 through August 2, 1967; Department
of Defense Press Release No. 856-67, 9/12/67, p. 01.
"Froehlke,1971 Hearings, p. 379.
.. See Memorandum. Department of Army, "U.S. Army Intelligence Role in
Civil Di!'turbances." 1971 Hearings, p. 1292.
.. Froehlke, 1971 Hearings, p, 440.
.. Ibid, p. 378.
11 IMd. Sl'e pp. 808-809.
.. It should be noted that Army Assistant Chief of Staft' for Intelligence. Major
Genl'ral William Yarhorough, in Od~bf>r 1967 requested that the Nlltional Security
Agency provide the Army with any information it might have. or obtain,
regarding the foreign connections of domestic political groups. See Select Committee
report "National Security Agency Surveillance Affecting Americans."
797
the channels it will follow. The quantity and quality of third
agency reports is sufficient to allow proper and timely analysis
of the domestic situation so that commanders in the field will
be properly informed at all times.53
But if the Army had refrained from widespread use of its own
operatives, it was nonetheless increasingly relied on by the White
House and the Justice Department to provide information on civil
unrest. In a meeting at the 'Vhite House on .Tanuary 10, 1968, for
example, Attorney General Ramsey Clark told those present 54 that
"every resource" must be used in the domestic intelligence effort and
he criticized the Army for not being more selective in the reports that
it was sending to the Justice Department.55 According to former Army
Chief of Staff Harold K. Johnson, this was but one of several meetings
at the White House where the Army was urged to take a greater role III
the civil disturbance collection effort.56
The Army was looked to, first, because it had approximately 1200
agents scattered across the country who were young and could easily
mix with dissident young groups of all races.57 Second, the Army
was virtually the only agency apart from the FBI which had an independent
teletype network nationwide which could be used to transmit
data on civil unrest.58 The FBI had such a network but it was used for
other purposes, and could not handle the voluminous amount of data
generated by civilian political protests.
The pressure on the Army to produce information was rapidly
mounting in the winter of 1967, and it began to have its effect.
The Army task force, appointed to study the Army's role in civil
disturbances, recommended among other thin~, that "continuous
counterintelligence investigations are required to obtain factual information
on the participation of subversive personalities, groups or
organizations and their influence on urban populations to cause civil
disturbances." 59 It also recommended that the Army develop new
criteria to apply to the collection of domestic intelligence which would
"serve to indicate potential areas of civil disturbance." 60
Chief of Staff Harold K. Johnson approved these recommendations
in late November 1967, and directed that It plan be prepared
.. Quoted in Memorandum for Record from Army General Counsel Robert E;
Jordan III, for the Under Secretary of the Armv, undated, 1974 Hearingll, p. 288.
.. Attending the meeting were White House aides Joseph Califano and Matthew
Nimitz, Deputy Secretary of Defense Paul Nitze. Drputy Attorney General Warren
Christopher, and Army General Counsel Robert Jordan.
.. Memorandum for the Under Secretary of the Army, Subject: Civil Disturbane"
Planning Meeting in Mr. Califano's Office, 1/10/68.
.. .Tohnson (staff summary). 11/1~/7!,).
'" See staff summary of General William Blakefield interview, 7/11/75; staff
summary of General William Yarborough (ret.) interview, 7/18/75; staff summary
of Col. Arthur Halligan (ret.) interview, 7/15/75; staff summary of Col.
Millard Daughtery interview, 11/20/75; staff summary of General Harold K.
John!'lon interview, 11/18/75.
.. Ibid.
III Memorandum from Army Generlll Couns!'l Rohert E. Jordan III, for the
Secretary of the Army. Subject: Review of Civil Disturbance Intelligence History.
undated, 1974 Hearings, p. 289. The term "subversive" was not defined.
.. Ibid.
798
formally directing the Army to collect civil disturbance information
on a nationwide scale.61
O. The Army's Domestic Surveillance Program
The collection requirements were set out in an annex to the Department
of Army Civil Disturbance Plan, promulgated on February 1,
1968.62 The plan identified as "dissident elements" the "civil rights
movement" and the "anti-Vietnam/anti-draft movements," and stated
that they were "supporting the stated objectives of foreign elements
which are detrimental to the USA." 63 It furthermore directed Army
commands to provide information on the "cause of civil disturbance
and names of instigators and group participants," as well as
information on the "patterns, techniques, and capabilities of subversive
elements in cover and decention efforts in civil disturbance
situations." 64 The terms "civil disturbance," "instigators," "group
participants," and "subversive elements" were not defined.
While this new collection plan was being implemented across the
country, the Army was in the midst of planning its second concerted
domestic operation in preparation fora civilian demonstration-the
so-called Washington Spring Project. Martin Luther'King, Jr. had
announced his intention of bringing the nation's poor to Washinfrton
in April 1968 in a massive protest demonstration. Antiwar groups had
also indicated their intent to use the occasion to protest the war.
The Washington Spring Project did not proceed as scheduled, however,
because Dr. King was assassinated in Memphis on April 4th. Extensive
rioting broke out in numerous cities across the country causing
simultaneous commitments of Army troops in Washington. D.C., Baltimore,
and Chicago. Other Army troops were placed on alert in Pittsburgh
and Kansas City.65
This had never happened before, and it had a profound effect upon
the Pentagon. In a meeting with the Secretary of Defense on April 10,
1968, it was agreed that the Army would set up a permanent "task
force" to plan for civil disturbances, and that it would operate upon
the theory that the Army may have to deploy as many as 10,000
soldiers in 25 cities simultaneously.66
Three days later. the Under Secretary of the Army directed the
Chief of Staff to establish the Directorate of Civil Disturbance
Planning and Operations (DCDPO) which he instructed to "maintain
an around-the-clock civil disturbance operations center to monitor
incipient and on-going disorders ... and develop intelligence reporting
procedures to provide information on civil disturbances occurring
or imminent." 67
... See Memorandum for Record from Milton R Hyman. Office of the General
Counsel, to the Army General Counsel. Subject: Army Civil Disturbance Intelligence
Activities. 1/23/71. 1971, Hearings, p. 302.
"1971 Hearitt.gs, pp. 1119-1122.
... Ibid., pp. 1120-112l.
.. Ibid., pp. 1121-1122.
.. New York Times, 4/9/68, p. 36.
M Memorandum for Record from Secretary. General Staff, MG Elias C. Townsend.
SUbject: Debrief of SECDEF Meeting, 1100 hrs., 4/10/68, 1971 Hearings,
pp. 1281-1282.
• f Memorandum from David E. McGiffert. Under Secretary of the Army. for the
Chief of Staff. U.S. Army, Subject: Civil Disturbances, 4/13/68, 1971 Hearings,
pp. 1283-1284.
799
Two other changes were brought on by the King assassination riots.
The Secretary of the Anny was formally designated Executive Agent
for the DOD on civil disturbance matters,68 and it was decided that the
intelligence requirements of the Army Civil Disturbance Plan of
February 1 were inadequate for the Army's purposes.
A new, more detailed, collective plan, classified CONFIDENTIAL,
was thus issued on May 2, 1968.69 The new plan expanded the criteria
to be used for collecting information and directed that information on
political activities be gathered in cities where there was a "potential"
for civil disorder.70 Former Assistant Secretary of Defense Froehlke
told the Ervin subcommittee that demands of the collection plan for
infonnation were sweeping:
The requirements of the pbn were bath comprehensive and
detailed, and, in the light of experience, substantially beyond
the capability of military intelligence to collect. They reflected
the all-encompassing and uninhibited demand for infonnation
directed at the Department of Army.... So comprehensive
were the requirements levied in the civil disturbance
information collection plan that any category of infonnation
related even remotely to people or organizations active in a
community in which the potential for a riot or disorder was
present, would fall within their scope. Information was sought
on organizations by name or by general characterization.
Requirements for infonnation were even levied which required
collection on activities and potential activities of the
public media, including newspapers and television and radio
stations.n
The May 2nd Collection Plan was distributed to the White House,
the Department of Justice, the Federal Bureau of Investigation, and
the Department of Defense, among others.72 While it is not clear
whether officials in any of these agencies actually read the plan, it is
clear that they had begun to press the Anny by this time for infonnation
on indiVIduals and organizations involved in domestic dissent.7~
While the Army was routinely disseminating its intelligence reports
to the FBI, it also frequently received verbal tasking from high-ranking
officials on the outside for information on particular incidents or
individuals.a Their d~mands were insistent, and were conveyed down
the Army chain of command with a similar degree of intensity.75
According to former Army intelligence. officials, this led to a situation
where restraints on collection in the civilian community were ignored.
76 Lower-ranking intelligence officers considered the fact that
os DOD Directive 3025.12,6/8/68,1971 Hearings, p. 1272.
eo 1971 Hearings, pp.1123-1138.
'·1971 Hearings, pp.1123-1138.
n Froeblke te!<timony, 1971 Hearings, p. 384.
ft 1971 Hearings, p. 1137.
•a Froehlke tf'stimony, 1971 Hrarirl,fls, p. 388. This statement WAS also
confirmed in the staff interviews with General Harold K. Johnson; Gen. William
Blakefield; MG William Yarborough (ret.), Robert E. Jordan III; Col. Arthur
Halli~n (ret.), and Col. Millard Daugherty (ret.)
.. Ibid. .
.. Blakefield (staff summary). 7/11/75; Halligan (staff summary). 7/15/75;
Dangberty (staff summary). 11/20/75.
"'Ibid.
800
demands were coming from their superiors as sufficient authority to
obtain it by whatever means necessary.77 Secondly, it led Army intelligence
agents in the field to collect as much information as possible so
they would not be caught short when demands for timely and comprehensive
information came down through channels.18
Thus, there de\ eloped, as former Assistant Secretary of Defense
Robert Froehlke described it, "a practical inconsistency between the
level of demand for information imposed and the methods of collection
authorized." 19
Army agents were dispersed into civilian communities across the
country and tasked to report on any vestige of political dissent.
D. Questionable Activities on the Part of Army Agents
About 1500 Army intelligence agents were engaged in monitoring
civilian protests in 1968.80 These agents routinely monitored civilian
political activities in the communities to which they were assigned,
and occasionally were used as part of concerted intelligence operations
undertaken by the Army during the major political protests of the
late 19608. The following discussion thus encompasses aetivities undertaken
both under "routine" circumstances and during major protest
demonstrations.
(1) The Oovert Penetration of Oivilian Group8.-Army agents covertly
penetrated the organizational structure of civilian political
groups, attended their meetings, and participated in their private and
public activities. They also were inserted into public demonstrations of
all dimension!:'. A sampling of these activities follows:
-Army agents penetrated the Poor Peoples' March to Washington
in April, 1968, as well as the subsequent encampment which became
known as "Resurrection City;" 81 .
-Army agents were also inserted into groups coming from Seattle,
Washington to the Poor Peoples' Campaign; 82
-Army agents infiltrated the National Mobilization Committee; 83
-The Army monitored protests of a welfare mothers organization
in Milwaukee, Wisconsin; 84
-Army agents infiltrated a coalition of church youth groups in
Colorado Springs, Colorado; 85
-Army agents were routinely used to penetrate antiwar groups in
Chicago; 86
'I'Ilbld. Retired intelligence Colonel Millard F. Daugoberty pointed out that the
approval authority for operations in the civilian community was usually the same
authority making demands for information. Daugherty (staff summary),
11/20/75.
'IS Ibid.
.. FrOf>hlk~. 1971 Hearings, p. &.'*1.
80 See 1973 Report, p. 10.
St Ralph M. Stein, formpr Armv agent, testimony, 1971 Hearingtt, p. 253:
ChriRtophpr H. Pyle testimony. 1971 Hearinfls.p. 185.
.. Department of Army Memorandum, "U.S. Army Intelligence Role in Civil
Disturbances," 1971 Hearings, p.l293.
... Pyle, 1971 Hearin,gs, p. 201.
.. Rtein. 1971 Hearings. p. 273.
.. Oliver A. Pierce testimony, 1971 Hearingfl, p. 306.
.. John O'Brien, former Army intelligence agent, testimony, 1971, Hearings,
p.101.
801
-Army agents attended a Halloween party for elementary school
children in Washington, D.C., where they suspected a local "dissident"
might be present; 87
-Army agents posed as students to monitor classes in "Black Studies"
at New York University, where James Farmer, former head of
the Congress on Racial Equality, was teaching; 88
-58 Army agents were inserted into the demonstrations which took
place in Chicago during the Democratic National Convention of
1968; 89
-Army agents attended the October 1969 and November 1969 Moratorium
marches in various locations around the country; 90
-Army agents attended a conference of priests in Washington, D.C.,
which had convened to discuss birth control measures; 91
-Army agents were routinely assigned to cover speeches made at
the major universities in New York City from 1968 to 1970; 92
-Army agents attended meetings of a sanitation workers' union in
Atlanta, Georgia, in 1968; 93
-An Army agent infiltrated the Southern Christian Leadership
Conference in 1968; 9' .
-Army agents infiltrated a Yippie commune in Washington, D.C.,
prior to the 1969 Inauguration; 95
-Army agents wttended an antiwar vigil at the Chapel of
Colorado State University; 96
-Army agents monitored the weekend activities of college fraternities
in White, South Dakota, which allegedly had been responsible for
previous damage to town property; 97
-An Army agent attended an antiwar meeting at St. Thomas Episcopal
Church in Washington, D.C. ; 98 and
-107 Army agents monitored the protest activities surrounding the
Presidential inauguration in Washin~on,in January 1969.99
(2) Posing a8 Newsmen/Oovert Pliotography.-Army intelligence
ag-ents frequently posed as newsmen in order to photograph and interVIew
"dissident" personalities. Photographing participants in political
activities itself became a widely used intelligence technique.
During the Democratic National Convention of 1968, the Army, for
the first time, sent undercover agents, disguised as television news reporters
from a nonexistent television news company, to videotape
Interviews with leaders of the demonstrations.10o This technique was
.., Quentin I,. Burgess, former Army intelligence agent, testimony, 1971
Hearings, p. 285.
88 Joseph J. Levin, Jr., forlllf'r Army intelligence agelllt, testimony, 1971
Hearings, p. 290.
SI Froehlke,1971 Hearings, p. 440.
'" Pyle, 1971 Heal'ings, pp. 204-205; Peirce, 1971 IIearings, p. 305.
'" Burgess, 1971 Hearings, p. 286.
"'levin, 1971 Hearings, p. 293.
... Stein, 1971 Hearings, p. 274.
M Ibid.
.. Pyle, t971 Hearings, p. 201.
.. Laurence F. Lane, former Army intelligence agent, testimony, 1971
Hearings, p. 314.
P7 ~tein, 1971 Hearings, p. 255.
OR Burgess, 1971 Hearings, p. 285.
• Froehlke, 1971 Hearings, p. 440.
100 Froehlke, 1971 Hearings, p. 387. See also, Pyle, 1971 Hearings, p. 154.
802
repeated during subsequent demonstrations in Atlanta, Washington,
D.C., San Francisco, and Baltimore.lOl
A representative of the Reporter's Committee on Freedom of the
Press also stated in congressional testimony that Army agents, posing
as newsmen, interviewed H. Rap Brown and Stokely Carmichael in
New York in 1967 ; interviewed staff of the Southern Christian Leadership
Conference in 1968; and covered the 1969 Inaugural parade.102
The Army began using photographers to take still and motion pictures
of the participants in political demonstrations in 1967 during
the March on the Pentagon.lOS This rapidly became an accepted collection
technique for Army agents across the country.l04
(3) Harassment/Disruptive Conduct.-Army agents generally refrained
from aggressive activities against civilian protestors, but occasionally
they engaged in conduct designed to harass or confuse such
groups. Typically, this sort of activity was carried out at the "grass
roots" level by lower-level military intelligence agents, who neither
sought nor received authorization for such activity. The Committee
found no evidence of any concerted program of harassment, analogous
to the COINTELPRO operations of the FBVOG Nonetheless, some of
the techniques employed by Army agents were similar.
A former intelligence agent stated that he had posed as a bus driver
during a demonstration in Chicago, collected the bus tickets of departing
demonstrators, and then sent them off to find a nonexistent bus.l06
This same agent also recalled having posed as a parade marshal during
the 1969 Inaugural, and, as such, provided misinformation to demonstrators.
lO?
Another recalled making harassing telephone calls and sending
orders of fried chicken to the offices of the Chicago 7 defense team.lOS
Another admitted having torn notices of rallies and demonstrations
from school bulletin boards/09 and still another recalled agents having
heckled speakers in order to cause a disruption. 110
Another former agent stated in a newspaper account that he was
given blank postcards which had been confiscated by the FBI from
the headquarters of a protest group in Washington, D.C. The cards
were to 00 sent in by Washington residents who were willing to house
demonstrators during the inaugural demonstrations. The agent stated
101 Lane,1971 Hearings, p. 314.
101 Fred P. Graham, testimony, "Freedom of the Press," Hearings before the
Subcommittee on Constitutional Rights, Committee on the Judiciary, United
States Senate, 92nd Cong., 1st Sess. (1971), p. 260.
... Memorandum, Department of Army, "U.S. ATmy Intelligence Role in Civil
Disturbances." 1971 Hearings. p. 1292.
1lH Pyle, 1971 Hearings, p. 155 (photographing demonstrations at the University
ot Minnesota); O'Brien, 1971 Hearingl/, p. 113 (photographing dissidents in
Chicago) ; Stein,1971 Hearings, p. 273 (photographing demonstrators in Seattle) ;
Peirce, 1971 Hearings, p. 807 (photographin~ demonstrators in Colorado Springs).
,.. For a tull description of the FBI's COINTELPRO operations, see the Select
Committee report on this subject.
,oo Richard Norusis, former Army intelligence agent, testimony, 6/23/75.
10'1 Ibid.
tOO O'Brien testimony, 1971 Hearing.,. p. 114. Also. "Government Spied On
ChiC1llto 7; U.S. AttemptR in '69. '70 Told," Chicaoo Tribull('. 11/13/73.
'n00. SSttaatteemmeenntt ooft fCoornmneerr AHremnyryi,nftoelrlmigeernAcermagyenint,teClaUs~peenrc,eWIIylroenmt.ing, Field Office
ot the 113th Military Intelligence Group (anonymous). in files of Select Committee.
803
that he filled out the cards with the names of fictitious persons and sent
them in.11i
The Select Committee also investigated the relationship of military
intelligence with a right-wing terrorist group in Chicago known as
the Legion of Justice. Former members of the terrorist group told the
COmIIllttee that from 1968 until 1970 "military intelligence" had directed
and helped finance their activities against left-wing groups in
Chicago.112 They also alleged that the Army had supplied tear ~as,
grenades, and bugging devices to be used against left-wing groups.l1S
Finally, they suggested that Army intelligenc~ had received a ~m
and various documents stolen by the LegIon from left-wmg
organizations.114
The Committee's investigation did not substantiate any of these al·
legations.ll5 It did, however, show that Army intelligence agents had
been in contact with the leader of the LelPon on several occasions in
regard to obtaining information on left-wmg groUps.ll6 Army agents
inSIsted, however, that they did not realize that their source was a
leader of the terrorist group, nor that the information he was offering
the Anny had been stolen.H7
(4) Mainte1ULnce of Files on Private Oitizens and Private Or~anizations.-
All of the information collected by Army agents on civilIan
political activity was stored in "scores" 118 of data banks throughout
the United States, some of which the Army had computerized.l19 The
reports were routinely fed to the FBI, the Navy, and the Air Force,
and were occasionally circulated to the Central Intelligence Agency
and the Defense Intelligence Agency.12o
In all, the Army probably mamtained files on at least 100,000
Americans from 1967 until 1970.1.21 Among them were: Dr. Martin
Luther King, Jr., Whitney Young, Julius Hobson, Julian Bond, Arlo
Guthrie, Joan Baez, Major General Edwin Walker, Jesse Jackson,
Walter Fauntroy, Dr. Benjamin Spock~ Rev. William Sloane Coffin,
Congressman Abner Mikva, Senator Adlai Stevenson III,122 as well as
U1 See "Break-In by FBI Alleged Before 1969 Inauguration," New York Times,
5/31/73, pp. 1,6; "FBI Was Given Key for Search in 1969," New York Time8,
6/1/13, p.14.
The Select Cvmmittee was unable to locate the source of this news report;
hOwever, FBI records made available to the Committee indicate that such searches
were made in the Washington D.C. area in advance of the presidential
inauguration.
11JI Sta:tr summaries of Stephen Sedlacko and Tom Stewart interviews, 5/28/75.
ill Ibid.
110 Ibid.
11lI The allegations that Army intelligence furnished the Legion with bugging
deVices and tear gas grenades appears improbable since these items were not
in the inventory of Army intelligence units. Approval of fund expenditures also
had to come from intelligence group headquarters, and there were no records
of such expenditures being approved. The remainder of the allegations were not
sU'p'PQrted by testimony received from Army witnesses.
Richard Norusis, 6/23/75; Thomas Filkins testimony, 10/21/75; and Robert
Liesik, 6/27/75, former members of the 113th Military Intelligence Group.
n. Norusis, 6/23/75, and Filkins, 10/21/75.
11lI 1979 Report, p. 4.
no The Army maintained computerized files at Fort Holabird, Fort Monroe,
Fort Hood, and the Pentagon. See 1979 Report, pp. 59-83.
uo Froehlke, 1971 Hearings, p. 423.
121197Z Report, p. 57.
1JlI Stein, 1971 Hearing8, p. 266.
804
"clergymen, teachers, journalists, editors, attorneys, industrialists, a
laborer, a construction worker, railroad engineers, a postal clerk, a
taxi driver, a chiropractor, a doctor, a chemist, an economist, a historian,
a playwright, an accountant -an entertainer, professors, a radio
announcer, business executives, and authors" 1.23 who became subjects
of Army files simply because of their participation in political protests
of one sort or another.
In addition, one witness told the ErV'in subcommittee thwt "it was no
exaggeration to state that (the Army's files) covered virtually every
group engaged in dissent in the United States." 124 Cited as examples
were the American Civil Liberties Union. the Nat-ional Association for
the Advancement of Colored People, the 'Ku Klux Klan, the Congress
on RacJial Equalitv, the Urban League, the Women's Strike for Peace,
the American Friends Service Commit/tee, the Citizen's Coordinating
Committee for Civil Liberties, the Southern Christian Leadership
Conference Ramparts, The Natimuil Review, Anti-Defamation League
of B'nai B'rith, National Committee for a Sane Nuclear Policy, the
John Biroh SocieJty, Young Americans for Freedom, Clergy and Laymen
Concerned About the War, Business Executives Move to End the
War in Vietnam, and ,the National Organization for 'Vomen, among
others.125
E. Termi'lULtion 01 the Army's Oivil Disturbance Oolleetion Program
The Army did not decide to terminate its domestic collection program
until the summer of 1970, aftedt had been exposed in the press
and Congress had '8JlllOunced its intentions to invesbigate. There had,
nevertheless, been reservations within the Army regarding the scope
of its domestic effort as early as the fall of 1968.
The first indication tha.t anyone at the Department of Defense had
qualms about the Army's domestic program came in Sepltember 1968,
when Deputy Secretary of Defense Paul Nitze disapproved an Army
request for 167 additional spaces for Army intelligence It#5ents citing
"reservations regarding the extent of Army involvement III domestic
intelligence adtivities." 126
Three months later Army Under Secretary David McGiffert also
expressed concern that the Army's domestic collection program might
not be "worth the effort," and expressed his desire that the "civil disturbance
collection effort be more sharply focused on essential requirements
and the mission be more precisely delineated.121
This concern apparently led McGiffert in February 1969 to attempt
to curtail the Army's program. In a memorandum to the Vice Chief
of Staff, he expressed concern that the Army' was, in furtherance of
the civil disturbance mission, collecting detaIled information on persons,
organizations, and movements. Citing expediency rather than
principle, he stated that "our limited assets should not be expended in
developing such detailed information on these matters as part of the
U11197S Reporl, p. 57.
UI Stein, 1971 Hearings, p. 264.
UII Ibid.
us Quoted in Memorandum from Army General Counsel Robert E. Jordan, for
the Secretary of the Army. Subject: Review of Civil Disturbance Intelligence
History, 197~ Hearings, p. 293. (Cited hereinafter as Jordan memo).
127 Froehlke, 1971 Hearings, p. 393.
805
process of assigning priorities to particular metropolitan areas." 128
He expressed the opinion that such information, to the extent it was
necessary, could be gathered from civilian law enforcement agencies.
The memorandum also required that he be apprised on a quarterly
basis of all covert and overt collection activities.
The Under Secretary's memorandum met with stiff resistance from
the Army staff and was not fully implemented.l29 The Under Secretary
did not press his demands, in part because he was about to leave, and
in part because the Army General Counsel had initiated negotiations
with the Department of Justice to reach an agreement which would
relieve the Army of its domestic intelligence-gathering role.lao However,
the agreement which eventually resulted from these discussionsthe
Interdepartmental Action Plan on Civil Disturbances-left the
domestic role of Army intelligence as ambiguous as before.l3l Nevertheless,
the initiative of the General Counsel had served to forestall
the implementation of McGiffert's memorandum until his successor
had taken office,and could be prevailed upon to continue the Army's
collection activities.
McGiffert's successor, Thaddeus R. Beal, did nonetheless retain
the requirement that the Army's collection activities be reported to
him on a quarterly basis. In the first of these renorts, filed on April 15,
1969, the Army indicated that 35 percent of its 3219 intelligoence reports
were based on operations conducted by Army ag-ents.182 This figure
caused some alarm at the Department of Army level,133 but did not
engender any formal attempts to limit such operations.
It was only in ,January uno, when a former Army intelligence officer,
Christopher H. Pyle, wrote an article for the W(J)JhingtOlJtMO'nthly
exposing the extent of the Army's dompstic program, that serious efforts
to curb the Army's domestic activities 'Were undertaken.134 Pyle's
article drew substantial attention in the press, and two congressional
committees in the spring of 1970 announced their intentions to hold
hearings on the matter.las
In response to the growing public pressure, the Army on June 9,
1970, rescinded its May 2, 1968 collection plan and issued an order
stating that:
Under no circumstances will the Army acquire, report,
process, or store civil disturbance information on civilian individuals
or organizations whose activities cannot, in a reaus
M('morandum from David E. McGiffert. Under Secretary of the Army, for
the Yice Chief of Staff, Subject: Army IntelUg('nce Mission and Requirements
Related to Civil Disturbances, 2/5/69, 1971 Hearings, p. 1139.
1JIII See Memorandum from the DCDPO to the Army General Counsel, Subject:
Army Intellill'ence Mission and Requirements Related to Civil Disturbances,
3/4169,1971 Hearings, pp. 1289-1292.
130 Jordan memo,1974 Hearings, p. 296.
m The final version of the plan stated that "raw intelligence data pertaining
to civil disturbances will be aequired from such sources of the Government as
may be available." See 1974 HeariJngs, pp. 346-353.
181 Jordan memo, 1974 Hearings, p. 298.
Dll Ibid.
... Christopher H. Pyle, "CONUS IntelUlrence: The Army Watches Civilian
Politics," WaJlhington Monthly (January 1970), pp. 4-16.
.. Senate Subcommittee on Conmitutional Rights and the House Armed Services
Committee.
806
sonably direct manner, be related to a distinct threat of civil
disturbance exceeding the law enforcement capabilities of
local and State authorities.136
The matter did not end there, however. Congressional hearings were
still in the offing,137 and in December, NBC News reported that the
Army had had files on Illinois Senator Adlai Stevenson, III and Congressman
Abner Mikva.138
These disclosures brought on renewed criticism which led Secretary
of Defense Melvin R. Laird on December 23, 1970, to direct that new
regulations be proposed which would ensure that "these [intelligence
activities] be conducted in a manner which recognizes and preserves
individual human rights." 139
On March 1, 1971, the day the Senate was to begin hearings on the
Army surveillance program, DOD formally issued the new regulation
called for by Secretary Laird.1
{Q The new directive in general prohibited
military personnel from collecting information on "unaffiliated"
persons and organizations, except where "essential" to the military
mission. It also required that all information which violated the
new directive, and was currently being held by the military, must be
destroyed. While as a practical matter implementation of the directive
did not occur immediately,Hl the Army's nationwide collection effort
against civilians had officially come to an end.
III. MONITORING PRIVATE RADIO TRANSMISSIONS IN THE UNITED STATES:
1967-1970
During the late 19608, when the Army was being called upon to
control civil disturbances, an element of the Armv, the Army Security
Agency (ASA) , normally used to intercept international communications
for foreign intelligence purposes, was used to monitor radio
transmissions in the United States. At times it was authorized not
only to monitor radio transmission, but to "jam" radio broadcasts
or transmit false information over the air, if such techniques w(',re
thought necessary.
At first, ASA conducted its monitoring activity in support of Army
troops committed in civil disturbances. Later, however, ASA mom-
,.. Letter from Robert E. Lynch, Acting Adjutant General of the Army, to
subordinate commands, Subject: Collection, Reporting, Processing, and Storage
of Civil Disturbance Information, 6/9/70, 1971 Hearing8, pp. 1099-1102.
ur Although the House committee had conducted its own investigation, it had
decided against holdin~ public hearin~. The Senate subcommittee, while cancelling
hearings seheduled for October 1970, announced its intention of seheduling
them in early 1971.
,.. NBC News, First Tuesday, 12/1/70.
110 1971 HearinfJ8, p. 1299.
148 DOD Directive 5200.27, dated Ma,rch 1, 1971, SUbject: The Acquisition of
Information Concerning Persons and Organizations Not Affiliated with the Department
of Defense. The provisions of this directive are discussed in detail at
pp. 825--833.
HI. Several penetrations of civilian groups, begun 'before the directive, continued
after it was issued, Qn the grounds that exceptions WQuid later be sougbt
under the terms of the directive. Also, it required months for the Army and other
services to dispose of old files being held in violation of the directive.
807
tored radio communications in situations where Army troops had
not been deployed, and were not expected to be. Indeed, on two occasions,
ASA ordered its units, in violation of standing instructions, to
conduct general searches of the radio spectrum without regard to the
source or subject matter of the transmissions. ASA did not report
these incidents to the Army, even when specifically asked to do so as
part of the Army's preparations for the Ervin subcommittee hearings
in 1971.
In this report, the domestic use of the Army Security Agency is
treated separately from the Army's civil disturbance collection program
for several reasons. First, ASA is an agency whose primary mission
is to gather foreign intelligence. In this respect, it differs from
the other Army collectors in the field in the late 1960s, who were there
primarily to conduct security clearance investigations. Second, ASA
has unique capabilities for surveillance that other Army investigators
do not possess. The fact that these capabilities were turned inward
upon private citizens is uniquely ominous. Finally,this type of surveillance
activity is bound by particular legal restraints which do not
apply to other types of investIgative activity.
A. Legal Authoritie8 and Re8tricti01t8
(1) Mission of the Army Security Agency.-ASA carries out communications
intercepts for both national and tactical intelligence purposes.
H2 It also develops techniques of electronic warfare--"jammmg"
and "deceptive transmitting"-to support tactical Army operations.H3
While it does maintain operational units within the United States-in
both mobile and fixed-station configura.tions--the domestic mission
of these units is limited primarily to support of Army training exercises
and to determine the vulnerability of Army tactical communications
to interception by hostile intelligence agents.l44
(2) Section 605 of the 1934 Oommunications Act Prohibit8 Monitoring.-
Section 605 of the 1934 Communications Act provides, in
pertinent part :
No person not bein~ authorized by the sender shall intercept
any radio commUnIcation and divulge or publish the exist~
nce, contents, sUbsta;nce1 purport,. effect, or meaning of such
mtercepted commUnICatIOn to any person.H5
The statute thus makes the interception and publication of radio
transmissions a crime. While anyone with the appropriate radio
receiver may intercept the radio communication of another, Congress
has decided that the interceptor must not publish it. The law thus
assures persons using radios to communicate that their transmissions
will not be intercepted and divulged.
B. Origins of Dome8tic Radio Monitoring by ASA
Prior to 1963, there had been no explicit Army policy which had
either authorized or prohibited domestic use of the ASA. In 1963,
however, the Army was forced to decide the issue when it received
1<2 Army Regulation 10-22(C).
m Ibid.
•" Ibid.
"'47 U.S.C; 605.
808
requests for ASA support from two Army task forces assigned to deal
with civil disturbances brewing in Alabama and Mississippi. The
commander of one of these task forces requested on June 7, 1963,
that ASA units be used to monitor police, taxi, amateur, and citizens
band radio, and that ASA be authorized to "jam" transmissions
emanating from a Ku Klux Klan net in Tuscaloosa, Alabama, if such
action were found desirable.146
But the Department of Army said "no." In a message to the task
force commander, it prohibited the domestic use of ASA resources:
United States Army Security Agency· organizations or
elements thereof are prohibited from engaging in USASAtype
operational roles (e.g., monitoring or jamming of civil
and amateur telecommunications) in support of U.S. Army
forces committed to maintain or enforce law and order during
civil disturbances and disorders within the states and territories
of the United States of America.w
This policy remained in effect for the next four years, until the
pressure of events caused the Army to reverse its position.
O. Dome8tW Radio Monitoring by ASA: 1967-1970
(1) The March on the Pentagon.-In October 1967, preparations
were underway for the so-called March on the Pentagon, scheduled
for late in the month. As part of this planning, a "high level" decision
was made in the Army to 'allow ASA units to support Army units
which would be used to control the demonstration.14s Accordingly, on
October 14, 1967, a message went from the Army to ASA expressly
rescinding the 1963 ban, and directing that ASA participate in "Task
Force Washington," the Army force created to handle the demonstration!
49 The Arm;r directed not only that ASA monitor civilian communications
durmg the March, but that it have the capability to
"jam" radio transmissions and to undertake "deceptive transmitting,"
in the event that either became necessary.150
1" Message from Commanding General, Third Army, to the Commanding General,
Continental Army Command, 6/7/63.
1<, Message from the Department of Army to subordinate commands, 6/11/67,
Subject: Monitoring Civil and Amateur Telecommunications during Civil Disturbances
in U.S.
148 None of the documents examined by the staff identified the particular individual
who approved the ASA deployment in connection with the March on
tbe Pentagon. In a report made by the Army Inspector General to the Secretary
of the Army, 1/3/72, Subject: Report of Investigation into the Failure to Provide
Mr. Froehlke with Full and Accurate Information Prior to his Appearance
Before the Ervin Subcommittee, the Inspector General simply refers to this
decision as having been made "at a high level." (p. 25.)
This investigation of the Army Inspector General was undertaken because
ASA had failed to provide Assistant Secretary of Defense Robert F. Froehlke,
the DOD witness at the Ervin subcommittee hearings, with information regarding
its orders, issued without Army approval, to conduct general searches
of the radio spectrum in connection with the Republican National Convention
of 1968 and the Huey Newton trial in September 1968. See pp. 812-813.
,. Message from the Department of Army to the Army Security Agency,
10/14/67, Subject: Use of ASA's Resources in Civil Disturbances. I" Ibid.
809
According to an after-action report later filed by ASA after the
March, this was the first time that ASA resources had ever been used
in support of the Army domestically.15l
During the weekend of the March, ASA units monitored citizens
band, police band, taxi band, and amateur radio bands from a total
of 36 listening posts.152 Twenty-three of these were located at the
Pentagon; nine at ASA headquarters in Arlington, Virginia; and four
at an ASA fixed station facility near Warrenton, Virginia.153 The
after-action report of ASA also recites the fact that while it did have
the capability to "jam" and undertake "deceptive transmitting" during
the March, none was actually carried out.154
Despite its participation in the "March," ASA's potential usefulness
in civil disorders was not widely recognized, even in the Army. The
Army's Civil Disturbance Collection Plan of February 1, 1968, contained
no mention of ASA's role in such .activities. Moreover, the message
of October 14, 1967, which had rescinded the 1963 ban, had been
sent only to ASA.15O Presumably, the rest of the Army was not on
official notice of ASA's potential support capability.
On March 31, 1968, official notice was provided in a classified message
sent to all domestic commands of the Army.156 The message stated
that ASA would participate in the Army's Civil Disturbance C~llection
Plan and could be used to monitor domestic communications lina-conduct
jamming and deception in support of Army forces committed
in civil disorders and disturbances. All such operations were required
to have the approval of the Army Chief of Staff. It also provided that
ASA personnel were to be "disguised" either in civilian clothes or as
members of other military units. None were permitted to be used as
liaison with civilian authorities. The 1963 ban was expressly rescinded.
(2) The King A88assination Riot8.-Four days after the messa~
was sent authorizing use of ASA units in civil disturbances, Dr. Martm
Luther King, ,Tr. was assassinated in Memphis, and rioting erupted in
Washington, D.C. On April 5, even though Army forces had not
officially been brought on the scene, ASA units were directed by the
Army to begin monitoring civilian radio transmissions as part of the
riot control operation.107 They were instructed to report directly to
the Army Operations Center until an Army Task Force had been
officially committed. On April 9, in anticipation of further demonstrations
in Atlanta, the site of the King funeral, ASA elements were
again requested to conduct radio monitoring operations, in advance
of any troop commitment.ls8
181 Annex A (Intelligence Summary) to USASA Task Force Washington After
Action Report, Army Security AgencY,1/5/68, p. 4.
1.62 Letter from Col. Robert R. Brust, Chief of Staff, Army Security Agency, to
Robert E. Jordan, III, Army General Counsel, SUbject: Radio Monitoring Activity,
12/15/70 (cited hereinafter as Brust Letter).
"'" Memorandum from John D. Kelley, Office of the Deputy Chief of Sta1T, Security,
to the Army Chief of Staff, Subject: ASA Radio Monitoring, 2/3/71, in
Select Committee files. (Cited hereinafter as Kelley memorandum).
lIS< 47 U.S.C. 605.
1Q5 See footnote 149.
111 Department of Army messa~e to subordinate commands, 3/31/68, Subject:
Use of USASA Resources in Civil Disturbances.
1BT Department of Army message to ASA, 4/5/68, Subject: Use of Resources.
111 Department of Army message to ASA, 4/9/68.
810
In all, the monitoring lasted from April 5 until April 17, 1968.
ASA units at the Arlington, Virginia, headquarters, at the Treasury
Building in Washington, and at a fixed station facility near Warrenton,
Virginia, participated in the 'V"ashington area monitoring.159
ASA units at Fort McPherson, Georgia, performed similar tasks for
the Atlanta area. Citizens band, police band, taxi band, military band,
and amateur bands were monitored.160 On April 23, after the moni·
toring had ceased, ASA sent a message to the National Security
Agency, informing it that ASA had participated in the domestic
operations surrounding the King death. The message further advised:
"Similar tasking by DA expected in future whenever Federal troops
committed in civil disturbance operations." 161 This is the only indication
found by the Committee staff that NSA had ever been officially
apprised of the domestic activities of ASA.
After the King funeral, on April 29, 1968, persons from the Office
of the Army Assistant Chief of Staff for Intelligence met with representatives
of the FCC for the purpose of obtaining the FCC's
approval of future Army monitoring broadcasts during civil disturbances.
162
The FCC asked that the Army put its request in writing.16s
(3) The Poor People's Oampaign in Washington, D.O.-Despite its
failure to achieve any immediate approval from the FCC, the Army
proceeded with plans to monitor civilian radio communications as part
of its surveillance of the Poor People's March and Campai'!ll in Washington,
D.C. ASA began radio monitoring on May 8, 1968, although
no formal authorization of these activities appears to have come from
the Army until May 21, 1968.164 In any case, some form of radio monitoring
took place from May 8 until June 26,1968.165 Two mobile vans
were located for this purpose at the 13th Police Precinct in Washington.
166 Other locations included ASA headQuarters, the Treasury
Building, and (from .Tune 6 until June 26) the ASA fixed station
facility near Warrenton, Virginia.167
It was not until after the Poor People's Campaign that the Army
renewed its initiative to the FCC in It .June 25, 1968, letter from Actjn~
Assistant Chief of Staff MG Wesley Franklin to Rosel Hyde. the FCC
Chairman.168 The letter suggested, first of all, that the FCC itself
monitor civilian radio broadcasts in these situations to obtain information
useful to the Army. Alternatively, it was suggested that the Army
be allowed to monitor on its own.
,.. Kelley memorandum, 2/3/71.
110 Brust letter, 12/15/70.
101 Army Security Agency message to the National Security Agency, 4/23/68,
Subject: Civil Disturbance Tasking.
... See Memorandum for Record, Army Assistant Chief of Staff for Intelligence,
6/10/68, Subject: Possible Violations of Federal Communications Act in
Connection with Civil Disturbances.
1.. Ibid.
1" Department of Army message to ASA, 5/21/68, Subject: USASA Support to
DA OPLAN Washington Spring Project.
1'" Brust letter, 12/15/70.
101 Kelley memorandum, 2/3/71.
107 Ibid.
.. Letter from MG Wesley C. Franklin, Acting Assistant Chief of Staff for
Intelligence, Department of Army, to Rosel H. Hyde, Chairman, Federal Communications
Commission, 6/25/68.
$11
The FCC referred the Army's letter to the Department of Justice
for 'a legal opinion.169 However, by August 6, when the Republican
National Convention opened in Miami Beach, the FCC had taken no
formal action.
(4) The Nati0114l Political Conventions of 1968.-Senior officers at
ASA ,vere unaware of the initiative to the FCC being taken by the
Army Assistant Chief of Staff for Intelligence.l1O Thus, the fact that
the FCC was preparing a response to the Army's query with respect
to its domestic radio monitoring had no bearing on ASA deciding,
on its own, to resume radio monitoring in connection with the Republican
National Convention in Miami Beach.
On August 6, 1968, without the required approval of the Army
Chief of Staff, ASA ordered its fixed stations in Virginia and Florida
to begin general searches of the amateur radio bands to determine if
there were dissident elements which were planning to disrupt the GOP
Convention.l7l It ordered the monitoring to continue through August
10.172
ASA had no reports from its fixed stations regarding the convention,
and thus cannot state with certainty that such monitoring was, in
fact, carried out.173 The incident is significant, however, because (1) it
illustrates that such monitoring could be ordered, and was ordered,
without the required clearance of the Department of Army; 114 and
(2) it involved "general searches"-scanning of incoming radio signals
without regard for their source or subject matter.
In any case, while the Miami Beach convention had occasioned relatively
little disruption, Army intelligence predicted that the forthcoming
Democratic National Convention, scheduled to begin on
August 22 in Chicago, would occasion violent confrontations between
protestors and civilian authorities.
Prompted by fears that Army troops might have to be committed,
and that the Army Security Agency might once again be deployed,
representatives of the Army Assistant Chief of Staff for Intelligence
again pressed the FCC for a response to the earlier inquiry regarding
domestic radio monitoring. At a meeting held on August 15, 1968, the
FCC gave its reply: such monitoring would be illegal under section
605 of the Communications Act of 1934.115 FCC representatives told
the Army that the matter had been brought up with the Attorney
General and that he had disapproved the Army reqUesty6 The Fcb
agreed, however, to submit a written reply to the Army stating that
HI Staff summary of Hilburt Slosberg, former Deputy General Counsel, Federal
Communications Commission, interview, 6/17/75.
"0 Staff summary of MG Charles Denholm (ret.) interview, 6/16/75; and staff
summary of Col. John J. McFadden, ASA, interview 6/23/75.
171 Message from ASA to selected field stations, 8/6/68. Subject: Tasking in
Support of DA Civil Disturbance Operations.
1"" Ibid.
1'7S See footnote 148.
"4 The Department of the Almy did not learn of the incident until February
1971. (Kelley memorandum, 2/3/71.)
1711 Memorandum for Record, Army Assistant Chief of Staff for Intelligence,
8/16/68, Subject: Possible Violations of Federal Communications Act in Connection
with Civil Disturbances. For provisions of section 605 see page 807.
1'" This was confirmed by Sol Lindenbaum, Executive A!lsistant to the Attorney
General. Staff summary of Sol Lindenbaum interview, p. 11.
69-984 0 - 76 - 52
812
it could not "provide a positive answer" to the Army's proposal, rather
than a letter which branded the proposal as "illegal." 177
The FCC's formal reply to the Army was sent on August 19, 1968.178
By this time however, the pressures on the Department of Army to
authorize deployments of ASA in Chicago had grown. On August
12, 1968, the ASA had itself requl'sted Army approval to send
radio monitoring teams to Chicago.179 This was followed Iby a request
from the Army Commander at Fort Sheridan, on the outskirts of
Chicago, asking for ASA support.180 He anticipated his own troops
being called upon.
Thus, on August 21, in obvious disregard of the FCC's opinion
that civil disturbance radio monitoring by the Army would be illegal,
the Army ordered ASA to send momtoring teams to Chicago from
Fort Hood, Texas, and Fort Bragg, North Carolina.181 These teams
were positioned at three locations in the downtown area and, while
no Army troops were actually called out during the demonstrations,
these teams did monitor citizens, police, and commercial bands from
August 22 to August 31.182
(5) The Huey Newton TTial.-Less than two weeks after the close
of the Democratic Convention in Chicago, B1ack Panther leader Huey
Newton wafl brought to trial in Alameda, California. Again ASA,
without the approval of the Army Chief of Staff, ordered as required
by the message of March 31, 1968 its fixed stations near Warrenton,
Virginia, and Monterrey, California, to monitor domestic radio communioations
to determine if there were any groups aroulld the country
which might be planning demonstrations in support of Newton.18S The
order, in this case, called for a "general search" of all amateur radio
bands from September 6 through September 10, 1968.184 This meant
that ASA elements were given free reign to listen in on radio transmissions
across the country, without regard to point of origin or subject
matter.
11'1 Army ACSI Memorandum for the Record, 8/16/68.
I'll Letter hom Max D. Paglin, Executive Director, FCC, to Major General
Wesley C. Franklin, Deputy Chief of Staff for Intelligence, 8/19/68.
170 Message from ABA to Department of Army, 8/12/68, Subject: Force Generation
and Closure Times.
... Message from Fifth Army to the Continental Army Command, 8/16/68, Subject:
USASA Support.
181 Message from Department of Army to Army Security Agency, 8/21/68,
Subject: USASA Support.
1lD Brust letter, 12/15/70.
Press allegations were made two years afterward that during this period
ASA agents had bugged the campaign headquarters of Democratic Presidential
candidate Eugene McCarthy. (See "Military Agents Had Secret Role at 1968
Conventions," Washington Evening Star, 12/2/70.) An ASA after-action report of
the Chicago operation made no mention of the bugging, but it did mention that
the most productive of the radio nets being monitored was a radio net set up
between medical aid stations serving demonstrators in the Loop area. The net
control station, ASA learned, had been located in a room of the Conrad Hilton
Hotel, Wlhich was assigned to a member of the MCCarthy campaign staff. (See
Army Security Agoency Re[I<Jrt. 7/29/69, Subject: TJSASA Sup[I<Jrt to DA Civil
Distrubance in Chicago, Illinois.) This may have been the source of the press
story.
183 Message from ASA to subordinate field stations, 9/6/68, Subject: Operation
Rancher III.
JIM Ibid.
813
ASA could produce no record which showed what monitoring, if
any, actually took place.185 The order to monitor is, nevertheless, significant
since it was given without authorization,and in a situation
where the use of Army troops was not contemplated.
(6) Cafc Zippcr.-There is no record of any further domestic
radio monitoring by ASA until March 1969. On March 17, 1969,
during a civil disturbance exercise at Fort Hood, Texas, ASA units,
who were monitoring radio transmissions of the participating forces
to determine their vulnerability, intercepted transmissions of unidentified
persons using citizens band radios who appeared to be
monitoring the conduct of the exercise. ASA requested Army permission
to continue monitoring the net-designated Cafe Zipper
Net 2-and permission was given.18G
It was subsequently decided by ASA thrut the net was a nationwide
net probably comprised of members of the Citizens Band Radio
Opemtors of America. In a message from the Department of Army
to the Fort Hood commander, the net was cryptically described as
being "devoted to the illegal use of citizens band for hobby purposes.
lot is not believed to represent a threat to the United States Army." 187
This conclusion was reached on April 21, 1969, over a month after the
monitoring had begun.
The significance of this incident is that the monitoring was not
undertaken for any authorized purpose. Although there was never
any indication that a civil disturbance would develop, requiring the
use of Army tl'OOpS, the monitoring continued for more than a month.
D. The Termination of Dmnestu: Radio Intercepts
While there were no further domestic intercepts actually undertaken
after "CAFE ZIPPER," the Army continued to debate ASA's
support role in civil disturbance operations. The Army's civil disturbance
office proposed in the fall of 1969 that the ASA role be
formalized in regulation.188 This prompted the Office of the Army
Assistant Chief of Staff for Intelligence (ACSI) (which had been
told a year earlier that such activity was illegal) to ask for another
legal opinion from the Army Judge Advocate General.189 On October
2, 1969, Army JAG responded that such activity was probably
illega1.t90 Relying on this opinion, the ACSI "nonconcurred" in the
proposal of the civil disturbance office.19l
"'" The investigation of the Army Inspector General included searches of ASA
files and interviews with ASA operational personnel. The investigation did not
uncover any documentary evidence, however, showing the results of the "general
search" which had been ordered in connection with the Newton trial.
,.. Message from Department of Army to ASA, 4/10/69, Subject: Cafe Zipper.
"7 Message from Department of Army to Continental Army Command, 4/22/69,
SUbject: Cafe Zipper.
188 Memorandum fo.r the Record, Army Assistant Chief of Staff for Intelligence,
10/13/69, Subject: USASA Employment of Civil Disturbance Operations.
... Disposition Form, Assistant Chief of Stall for Intelligence, to the Army
Judge Advocate General, 9/15/69, Subject: USASA Employment of Civil Disturbance
Operations.
... Letter from William M. Nichols. Colonel, Judge Advocate General Corps,
to the Army Chief of Staff for Intelligence, 10/2/67, Subject: USASA Employment
in Civil Disturbance Operations.
'01 DiRpositian Form, Army Assistllnt Chief of Staff for Intelligoence to the
Directorate of Civil Disturbance Plans and Operations, 10/15/69, Subject:
USASA Employment of Civil Disturbance Operations.
814
Shortly thereafter, Army ACSI sent a memorandum to the Army
General Counsel recommending that the Army seek legislative authority
to engage in future radio monitoring.192 In the same memorandum,
however, it was stated that previous ASA operations had
been of little value:
No compromise of any covert operation has occurred to date.
However, it should be pointed out that the intelligence obtained
was of mar~inal value. Existing laws prohibit monitoring
civilian radIO transmissions and for the USASA to
continue covert monitoring could prove harmful to the United
States Army if compromised. Continued use of the USASA
in this effort does not appear justified considering the risks
involved.19B
In spite of the Army ACSI's apparent decision in October 1969
that further domestic use of ASA was not justified, he took no formal
action to put -an end to such use. ASA itself sought guidance
from ACSI regarding its domestic support role on two occasions in
1970/94 but ACSI responses were ambiguous. On December 1, 1970,
for example, the Army told ASA that while it would no longer have
a formal support role in civil disturbances, "in the event intelligence
estimates of civil disturbance threats change to indicate a requirement
for ASA support in civil disturbances operations, ASA will again
be asked to provide support." 195
In fact, as was the case with the Army's civil disturbance collection
program, ASA domestic intercepts were not formally terminated
until they were exposed in the press. On December 1, 1970, NBC News
reported that ASA units had been used to monitor civilian radio
broadcasts during the 1968 Democratic National Convention.19s This
led the Army, on December 10, 1970, to rescind the March 31, 1968
message which had authorized the use of ASA resources in support
of civil disturbance operations.197
No subsequent authorization has been issued.
IV. INVESTIGATING CIVILIAN GROUPS CONSIDERED "THREATS" TO THE MILITARY:
A CONTINUING' PROGRAM
There is no express statutory authority for the military to investigate
persons or groups whom the military considers as "threats." The
services cite only the general authority of the National Security Act
of 1947 which authorizes each service secretary to undertake those
functions "necessary or appropriate for the training, operations, adtal
Memorandum from Army Assistant Chief of Sta1'l' for Intelligence to the
Army General Counsel, Subject: United States Army Security Agency (USASA)
Covert Activities in Civil Disturbance Control Operations (undated) .
... Ibid.
1M Message from ASA to Department of Army, 11/28/69, Subject: Status of
USASA Support to DA Civil Disturbance Control Operations. Message from
ASA to Department of Army, 11/30/70, Subject: USASA Support to DA Civil
Disturbance Control Operations.
... Message from Department of Amy to MIA, 12/1/70, Subject: USASA
SUDllOrt to DA Ci,i1 Disturblln<'e Control Operations.
... NBC News, First Tuesday, 12/1/70.
", Mpmorandum for Record, Army Assistant Chief of Sta1'l' for Intelligence,
12/11/70, Subject: Meeting with General Counsel.
815
ministration, logistical support and maintenance, welfare, preparedness,
and effectiveness of (their particular service) ." 198
Each of the military departments has trll,ditionally maintained that
the services required such authority in order to defend themselves.199
Their argument has been that within the United States the FBI does
not provide sufficient information for this purpose, and, outside the
United States, there is no law enforcement agency upon which they
can rely at all for such information.2°O
The restrictions, imposed by the DOD in 1971 upon the collection of
information on "unaffiliated" persons and groups, expressly excepted
the collection of information on "threats" from its general prohibition..
201 But the 1971 restrictions do not define what a "threat" is, apart
from listing examples such as "subversion of the loyalty, discipline, or
morale: of Department of Defense military or civilian personnel,"
which lend themselves to broad interpretations.202
A. In?Jestigations of Oivilian Ormlps Within the United States
(1) Investigations Undertaken Prior to the 1971 Direetirve.-In
the late 1960s and early 1970s military investigators from each of the
three services conducted investigations and maintained files on civilian
groups whose activities were directed against the military. The
Army reported. to Congress that it "maintained files" on eleven such
civilian groups during 1969 and 1970..203 Furthermore fourteen military
groups (designated as "Resistance in the Army"-RITA) were
subjects of Army investigations.204
Of particular interest to all the services were offpost coffeehouses,
operated by these civilian groups, and "underground" newspapers,
published by the same groups. Typically, both were designed to attract
military personnel. The primary means of obtaining information on
both the coffeehouses and the underground newspapers was to penetrate
them with either a military intelligence agent or a military informant,
who would report back on the group's activities. These
reports were typically shared with the FBI and local law enforcement
agencies.
Again, Army representatives told Congress that the Army had conducted
"investigations" of 17 such coffeehouses,205 and "maintwined
'""10 U.S.C. 3012 (authority for the Secretary of the Army).
See 10 U.S.C. 5031 and 10 U.S.C. 8012 for comparable provisions for the Secretary
of the Navy and Secretary of the Air Force, respectively.
,.. Testimony of David O. Cooke, Deputy Assistant Secretary of Defense (Comptroller),
1974 Hearings, p. 108.
lIOO Ibid., pp. 106, 122.
lI01 DOD Directive 5200.27, paragraph IV (A) .
... That part of the OOD Directive which permits the investigation of civilian
groups considered by the military as "threats" is discussed in detail at pp. 827828.
203 "Department of Defense Appropriations for FY 71," Hearings before a
Subcommittep of the Committee on Appropriations. House of Representatiyes,
91st Cong., 2nd Sess. (1970), Pt. III, p. 163.
The extent to which the Army was still maintaining files and conducting surveillance
activities against civilians came in the course of testimony regarding
Army expenditures for intelligence.
..,. Ibid.
... Ibid., p. 161. These included the Fun, Travel and Adventure Coffee House
near Ft. Knox, Ky. ; Sergeant Brown's Memorial Necktie near Ft. Devens, Mass. ;
Open Your Eyes near Ft. Eustis, Va.; Shelter Half near Ft. Lewis, Wash.; and
the Oleo Strut, near Ft. Hood, Texas.
816
files" on 53 "underground" newspapers 206 during 1969 and 1970; but
that as of March 1970, the number of coffeehouses, as well as the
number of "underground" newspapers, was "drastically declining." 2(07
(2) Investigations of Oivilian Groups After the 1971 Directive.As
mentioned above, in March 1971, an internal directive was issued
which genemlly limited the military's collection of information about
private groups and individuals. It allowed for the collection of information
on "threats," however, and it permitted the military to penetrate
covertly civilian groups so long as such pene.trations wereapproved
by a special DOD-level board-the Defense Investigative Review
Council (DIRC) .208 The directive set no standards, however,
. upon which the DIRC would base its decision.209
Since the date of the directive, nine requests have been made by the
milit'ury services (none of which were made by the Army) for DIRC
approval of covert penetrations directed ag-ainst civilIan groups.
Summaries of these requests follow.21O
(a) Antiwar GrQUp in San Diego, Oalifornia.-On March 25, 1971,
Navy Secretary John Warner requested DIRC approval for three
ongoing penetrations of civilian groups being carried out by agents
of the Naval Investigative Service (NIS). On May 24, 1971, he
amended the request by asking for permission to continue only one of
the three.
This entailed the penetration of an antiwar organization in San
Diego whOse membership was predominantly comprised of military
personnel. NIS reported that it had several sources within the group,
including one in the "inner circle" of the group's headquarters. DIRe
was also informed that the FBI had declined to conduct its own penetrllition,
but had been informed of the NIS operation and its plans
to continue.
DIRC approved the request on M'ay 24, 1971. In November 1971. it
revalidated the penetration ~ the request olthe Navy.
On June 30, 1972, the Navy terminated the operation on its own
initiative. It reported to DIRC that it had succeeded in identifying
189 military personnel who were members or had some contact with
the group (NIS had obtained a copy of the membership list) , and had
obtained extensive inform~tion on its financial and political connections.
NIS also indicated that it had filed a total of twenty-one reports
on the group, all of which had been distributed to the FBI, DIA, the
Air Force, and the Army. The operation terminated because 'the group
had disbanded.
(b) Peace Group to Hanoi.-The Air Force had recruited an antiwar
activist who was scheduled to go to Hanoi as palt of a. pellice group
to report on the conditions of prisoners-of-war in North Vietnam.
DIRC approval was sought since the operation involved the penetration
of a civilian group.
200 Ibid.
207 Ibid., p. 163.
.... DOD Directive 5200.27, para. V(E).
200 The deficiency in the DOD Directive is discussed in detail at pp. 828-833. It
should be noted, however, that the DIRC has issued instructions to guide the individual
services in submitting their requests for approval of covert penetrations.
Presumably, these same standards would govern the DIRC's decision.
210 All of the following summaries are the product of staff review of DIRC frIes.
817
DIRe gave ,its approval on September 24,1971, but the Air Force
source did not make the contemplated trip to North Vietnam,and no
information was obtained.
(c) Undergr(Y/Jnd New8paper Near TraviB Air F(Yf'ce Baae.-On
October 1,1971, Air Force Secretary John McLucas requested DIRe
~rmissionto penetrate the staff of an underground newspaper which
was published near Travis Air Force Base in California. He stated
thwt the newspaper had encouraged insubordination by Air Force personnel,
and that a penetration was necessary to determine whether
there was any conscious effort to disrupt Air Force activities or damage
Air Force property. DIRC approved the request on October 6,
1971.
The operation lasted until October 1972. DIRC was informed that
the Air Force Office of Special Investigations had not succeeded in
planting a source on the newspaper staff, but that it had identified
fifty Air Force personnel and fifteen civilians who were active in the
newspaper's operations. No evidence of any conscious effort to damage
Air Force property or disrupt Air Force activities was found.
(d) Peace Group in San Diego, Oalifomia.-On May 30, 1972, Navy
Under Secretary Frank Sanders requested DIRC approval for the
penetration of a second antiwar group in San Diego, California. Members
of the group were thought to have been instrumental in protesting
the deployment of certain ships to South Vietnam. DIRe was informed
that both the FBI and local police had declined to place a
source in the group.
DIRC approved the operation on June 5, 1972. A year later, NIS
filed a progress report and requested revalidation of the operation. It
cited the fact that the operation had succeeded in identifying military
personnel who were members of the group, and had learned of "discussions"
regarding plans to sabotage U.S. ships,211 to encourage insubordination
within the Navy, and to reveal military secrets. NIS also
stated that it had received warnings of public demonstrations against
the war as a result of the penetration. The DIRC revalidated the penetration.
It continued until May 1974, when the group no longer focused
upon military problems.
(e) Antiwar (}roup in Oharleston, South 0 arolina.-Dn October 20,
1972, the Navy requested DIRC approval to penetrate an antiwar
group in Charleston, South Carolina. It cited FBI reports which
showed the group planned to protest the departure of certain ships to
South Vietnam, and was contemplating acts of sabotage against a
Navy vessel. NIS reported that the FBI already had a source within
the group, but that the source did not provide sufficient information
regarding military personnel and military targets. DIRC approved
the penetration.
The operation lasted until May 1973, when it was determined that
the group no longer represented a significant threat to the Navy. NIS
reported that as a result of the penetration it had learned of one incident
in which Navy personnel had attempted to damage the boilers
on a U.S. vessel.
(f) White Racist Group in Oharle8ton, South Oarolina.-Dn
April 23, 1973, the Air Force Office of Special Investigations requested
011 The "plans" referred to in the files apparently were never carried out.
818
.DIRC approval of a penetration of a white racist group in Charleston,
South Carolina. Members of this group had apparently been re·
sponsible for encouraging racial unrest at Charleston Air Force Base.
Furthermore, the Air Force had information that the group had contacted
an Air Force sergeant for the purpose of obtaining ammunition
from the airbase. DIRC approved the penetration.
This penetration never took place because the military source was
transferred before his application for membership in the group was
approved.
(g) Dissident Group in Long Beach, Oalifornia.-Dn March 15,
1973, the Navy requested DIRC approval for the penetration of a dissident
group with antimilitary objectives in Long Beach, California.
DIRC was informed that the FBI did not have a source within this
group.
DIRC disapproved the request on the grounds that the group did
not represent "a direct and palpable threat" to the Navy. It suggested,
however, that the Navy might provide a source which could be placed
under FBI control.
In fact, a Navy agent was "loaned" to the FBI in September 1973,
with DIRC approval. It lasted until July 1974, when the FBI decided
to terminate.
(h) Ser'Vicemen's Oounseling Oenter in San Diego.-On June 7,
1974, the Navy requested DIRC approval for a penetration of a servicemen's
counseling center in San Diego, California. It stated that it
had reason to believe that the center was under communist influence
and encouraged insubordination among Navy personnel.
DIRC took no action on the request, and it was formally withdrawn
in August 1974.
(i) AntiJmilitary Group in Oharleston, South Oarolina.-On
March 14, 1975, the Navy requested DIRC approval to penetrate a
group that was offering advice to dissident sailors in Charleston, S.C.
It cited evidence it had obtained from the FBI that the group intended
to encourage a sit-down strike aboard a Navy vessel. NIS indicated that
it already had someone within the group that would cooperate.
DIRC approved this penetration to last for a period of 90 days only.
On May 1, 1975, the Navy reported that the penetration had been
terminated. NIS had learned of plans for a sit-down strike but it
never materialized because the ringleader had been administratively
discharged for drug-related reasons. Apparently, the Navy informant
had provided information which formed the basis for the discharge.
B. Investigatiffns of Oivilian Groups Overseas
Overseas, in the absence of the FBI, the military services have in
the past been more active in investigating civilian groups which they
consider "threats." In many cases, these groups have been composed
entirely or in part of American citizens living abroad.
Until August 1975, there were no departmental restrictions on
investigations of U.S. citizens living abroad.212 DOD Directive 5200.27,
2L2 On August 20, 1975, the Defense Investigative Review Council voted to
extend DOD Directive 5200.27 overseas. This change has subsequently been in·
corporated in the directive.
In a case currently pending before the United States District Court for the
District of Columbia (Berlin DrmwcraJic Club et al. v. Soh!lesinger et tU., Civil
819
which restricted such investigations in the United States, did not
apply overseas. Hence, the only restrictions which did apply
were the laws of the host country and the Status of Forces
treaties which normally govern the relationship between American
occupying forces and the host country. As a practical matter authority
to conduct operations against civilian groups has rested largely
with local military commanders.213
(1) Army Operati01UJ in West Germatny and West Berlin.-The
Army has had troops stationed in West Germany and West Berlin
since the conclusion of World War II. As part of the occupation
agreements negotiated between the United States and West Germany,
the German Government agreed to provide security for American
forces stationed in West Germany.214 In satisfaction of this obligation,
the West German government has allowed the U.S. Army to conduct
counterintelligence operations within its boundaries. While such
operations were undertaken, for the most part, to detect the activities
of hostile intelligence agents or to recruit sources for foreign intelligence
purposes, they were occasionally undertaken to identify persons
or groups which sought to undermine the discipline or morale of U.S.
troops.
Until 1968, the decision to conduct such operations rested largely
with the commanders of intelligence units scattered throughout the
country.215 They were guided for the most I?art by operational necessity.
While no figures are available for thIS period, it is clear that
American citizens were occasionally targeted by these operations, and
that relationships between foreign groups and individuals, and American
citizens were routinely scrutinized.216
A variety of intelligence-gathering techniques were employed: wiretaps,
mail opening, covert penetrations, photography, and personal
surveillances. All were performed apparently with the knowledge of
the West German authorities, and, in the case of mail and telephone
intercepts, with their cooperation.217
In 1968, the Federal Republic of Germany (FRG) brought the
most sensitive surveillance activities-mail opening and wiretapsunder
its exclusive control. It created a parliamentary commission to
Action No. 310-74, filed 2/29/74), the government does not argue that U.S.
citizens who live or travel in foreign countries lose their constitutional rights
vis-a-vis the United States Government agencies, Le., the Army, which might he
present in such countries. It does argue, however, that the Government has
additional security needs abroad against which the exercise of constitutional
rights must he balanced. The Government further argues that certain constitutional
safeguards, e.g., the warrant requirement of the Fourth Amendment, are
not applicable in foreign contexts. See Memorandum of Law in Support of
Motion to Dismiss, or, in the Alternative, for Summary Judgment, filed 6/7/74,
pp.46-48,66-76,105-107.
S10 This authority has, of course, been subject to the direction of higher military
authority.
1Il< Convention on Relations Between the Three Powers and the Federal Republic
of Germany, 5/26/52, As Amended by 'Schedule I of the Protocol on Termination
of the Occupation Regime in Germany, Signed at Paris, 10/23/54, Article
5. Printed in "Documents on Germany: 1944-1910," Committee on Foreign Relations,
United States Senate (1971), p. 250.
"6 Staff summary of DOD Briefing, Army Counterintelligence Operations in
West Germany and West Berlin, 10/24/75.
". Ibid. Also see staff summary of Col. John J. Coakley (ret.) interview, 8/14/75.
217 Ibid.
820
pass upon all requests for both mail and telephone intercepts, and
required that all such intercepts be performed by FRG authorities.218
The requirements of this law were incorporated in a supplemental
agreement to the Status of Forces Agreement, referred to above.
Thus, the Army has been required to request mail opening and wire
surveillance from the West German commission in conformity with
the requirements of the new law since 1968. On one ocoasion, in fact,
a wiretap was requested on a foreign national who was working closely
with an American political group in Heidelberg.219 It resulted in the
Army's obtaining considerable information regarding the personal
and political activities of American citizens who were living and
traveling in the Heidelberg aroo.220
Insofar as other types of surveillance are concerned-penetrations,
photographic or covert observation-U.S. Army intelligence officeI'fl
continued to have approval authority.
In fact, Army intelligence has conducted surveillance operations
against civilian groups, comprised in part of American citizens, in
West Germany since 1968. In Heidelberg, for instance, the Army in
1973 attempted to penetrate the staff of an "underground" newspaper,
Fight Back, which was directed at military personnel in the area.221
It also penetrated a civilian legal counseling troup in Heidelberg
which was offering free counsel to serviceme.n.222
In Mainz, another West German city, the principal target of Army
operations in 1973 was a meeting house jointly sponsored by the U.S.
N'ational Council of Churches, the World Council of Churches, and
the German Evangelische Kirche, which attracted servicemen allegedly
engaged in "dissident" activities within the military.;!2 3The
Army photographed persons going into the meeting house, wrote down
license plate numbers, and sent their own agents inside to report back
on the woup's activities.224
Similar operations were carried out by the Army in West Berlin
where the laws of the Federal Republic of Germany did not apply.
Hence, ,the 1968 law, which placed strict restrictions on the Army's
ability to employ unilaterally mail openings and wiretaps, had no
effect there.
In West Berlin, under a special tripartite agreement with the
British and the French called the Allied K O1TIfl1W,rulaflura, the Army
commander is made the governing authority for the American sector
... Federal Republic of Germany, Law Restricting the Privacy of Mails, Telephone
and Telegraphic Communications, 8/13/68, commonly referred to as the
"G-10" law.
219 1974 Hearings, pp. 382-389.
.,., Ibid. The summaries of wiretapped conversations indicate, in fact, that the
Army was more interested in the activities of American dissidents who were
working with the subject of the wiretap than it was with the subject himself.
"" See "Germany Expelling U.S. Student for Work on Anti-Army Newspaper,"
New York TilM.~, 9/13/73.
22. Affidavit of Carl E. Maze, Army intelligence agent, Defendants Submission
to the Court in camera, Ex Parte Berlin Demoeratic Club, et al. v. Schlesinger
Civil Action No. 310-74. United States District Court for the District of Columbia,
10/29/74.
223 1974 Hearing.~, p. 394, and "U.S. Army Is Said To Spy on Its Critics in
Germany," New York Times, 7/28/73, p. 1.
... 1974 Hearings, p. 394.
821
of West Berlin.225 The Kowmandaturoa contains no restrictions on intelligence
gathering of any kind: On the contrary, it requires each
of the three governments to provide information to the others regarding
security in their respectIve sectors of the city.226 An active intelligence
operation thus appears to have been contemplated.
In fact, such an operation has been carried out by the Army since
World War II, not simply for its own purposes, but for the other Allied
commands as well. The Army has engaged in wiretapping and mail
openings as part of this program, as well as a variety of other surveillance
techniques.227 Further, in West Berlin, as in other cities in West
Germany, the Army has occasionally turned this intelligence apparatus
against civilian groups (composed largely of American citizens) who
were considered by the Army to be "threats." 228
In August 1972, the Army focused its attention on a group called
"Americans in Berlin for McGovern," an organization which reportedly
had petitioned the National Democratic Party in the United
States for official affiliation.229 After the election, the group changed its
name to Concerned Americans in Berlin, and attempted to interest
military men in joining. Members of the group were connected to an
"underground" newspaper called FO'l'Ward, which made direct appeals
for support to military personnel in West Berlin.
As part of its surveillance of the group's activities, the Army opened
mail addressed to the newspaper, and penetrated its staff.230 It also
sent informants or agents into Concerned Americans in Berlin to report
on its activities.231 Surveillance of the group continued until 1974.
(2) Navy Operoations in Japan.232-Beginning in 1973, the Naval
Investigative Service (NIS) conducted special counterintelligence
operations (covert penetrations) in three Japanese cities-Okinawa,
I wakuni, and Yokosuka-ag.ainst targets similar to those investigated
by the Army in West Germany. In each case, the targets were private
meeting places operated by a coalition of political groups, comprised
predominantly of Americans living in Japan. The groups attempted
to attract military personnel-often they provided legal counseling
and representation; and in some cases they published newspapers
designed to appeal to the military. .
Mail opening and wiretaps were not used by the Navy against these
groups, as the Army had done in West Germany. The Navy's method
of operation in Japan was confined to using its own personnel as informants.
NIS records show that these informants made frequentrin
some cases, almost daily-reports to their case officers. Usually, the
reports described the activities of the members of each group, and
... Statement of Principles Governing the Relationship Between the Allied Kommandatura
and Greater Berlin, Signed by the Three Western Commandants, Berlin,
5/14/49. Also, Allied Kommandatura Letter, Subject: Declaration on Berlin,
to the Governing Mayor, Berlin. 5/5/55.
... Ibid., 'Para 2 (e) .
..., DOD Briefing (staff summary), 10/24/75.
... Ibid.
... 1974 Hearings, pp. 370-379.
230 1974 Hearings, pp. 364-365.
231 Maze Affidavit, Berlin Democratic Club et al. v. Schlesinger, 10/29/74; and
1974 Hearings, pp. 373-379.
m The description of these operations is based upon an examination of NIB
flles by the Select Committee staff.
822
what had taken place in discussions and programs at the meeting
places. Any military personnel who frequented the meeting places
were reported, as were any "outsiders" who came as guests. NIS frequentlY
ran FBI and DOD checks on such "outsiders," and occasionally
requested copies of passport and visa applications from U.S. and
foreign authorities.
Navy informants also obtained copies of letters and envelopes found
at the meetin~ houses, and took cOJ?ies of subscription lists, financial
records, and' contact" lists maintamed by the groups under surveillance.
In most cases, they also provided copies of photographs taken
of group members to NIS.
Information regarding the participation of Navy personnel was reported
by NIS to local Navy commanders, and on at least two occasions,
Navy personnel who became active participants in the groups
were transferred to other locations.
None of the three penetrations were coordinated with the FBI, CIA,
or DOD counterintelligence agencies as they would have been if the
agents of a hostile intelligence service had been involved. Nonetheless,
NIS did disseminate reports on the three groups to all of the agencies
mentioned.
In none of the three cases did NIS have information prior to conducting
the penetration that the groups were, in fact, engaged in, or
planning to engage in, illegal activities. The penetrations were undertaken
to determine if the groups posed any threat to the Navy, and, if
so, to enable the Navy to prepare for it.
All of these operatIons were instituted by the Director of the Naval
Investigative Service. Since they involved overseas operations, they
did not, at that time, require the approval of the Defense Investigative
Review Council.
V. ASSISTING LAW ENFORCEMENT AGENCIES IN SURVEILLANCE OF PRIVATE
CITIZENS AND ORGANIZA'I1IONS
Military intelligence is rather frequently called upon, or undertakes
on its own initiative, to provide information or support to law enforcement
agencies at all levels of ,government. as well as the Secret Service.
A. Legal Authority
The extent to which the military can legally be used to "assist" law
enforcement agencies in the performance of their duties is not clear.
On the one hand, the Posse ComitatWJ Act of 1878 prohibits the military
from "executing the law ... except in cases and under circumstances
expressly authorized by the Constitution or act of Congress." 233
One such statutory exception, which Congress recognized in its debates
on the 1878 Act,234 was the power of the President to use the
armed forces to enforce the laws, in times of insurrection.235 Such use,
however, was conditioned upon the President's issuing a formal proclamation
calling for the insurgents to disperse.236
"'18 U.S.C. 1385.
... 7 Congo Rec. 3849 (1878).
1116 10 U.S.C. 331-333.
-10 U.S.C. 334.
823
In the years following the Civil War, federal marshals had relied
on Army troops to help them enforce federal election laws in the
South.237 By enacting the Posse Oormitatus Act in 1878, Congress
sought to end the practice, or at least ensure that federal troops could
not be used without a formal proclamation from the President.238 This
suggests, therefore, that the Posse OomitatU8 Act was intended to
limit the ability of law enforcement agencies, in the absence of a
presidential proclamation, to task federal troops for support.
Insofar as military intelligence is concerned, it seems clear that the
Act would prevent its being tasked by civilian law enforcement to
perform criminal investigations of civilians. The extent to which the
military intelligence can otherwise be required to support such activity
is not so clear, but the Posse Oomitatus Act undoubtedly serves to
restrain such cooperation.
B. Nature of Assistance
(1) Oollection arul Exchange of Information.-In Chicago, Army
intelligence in the late 1960s received a copy of virtually all police
intelli~ence reports.239 The military, in turn, provided the Chicago
police with their own reports, and in some cases, with military personnel
records.240 In addition, Army intelligence frequently responded to
police and Secret Service requests for information.241
When the DOD restrictions came into effect in 1971 calling for the
destruction of all files on "unaffiliated" persons and organizations,
several Army intelligence units turned over their intelligence files on
dissident individuals and organizations to local police authorities
rather than having them destroyed: the Chicago Police Department
received the files of the 113th Military Intelligence Group; '242 the
Pennsylvania State Police obtained the files on "personalities" of the
109th Military Group; 243 the Cuyahoga County Sheriff's office received
the 109th's files on dissident organizations in the Cleveland, Ohio,
area; 244 and the Washington, D.C. Police Department reviewed and
retained certain files of the 116th Military Intelligence Group.245
In 1972, an Air Force counterintelligence unit in San Diego began
maintaining files on dissident individuals and groups in the San Diego
area. This activity was in antWipation of receiving tasking from the
Secret Service to collect such information in preparation for the 1972
Republican National Convention, which was scheduled for San Diego
at that time.246
'37 See Edward S. Corwin, The President: Office and Powers, 1187-1957, (New
York: New York University Press, 1957), pp. 137-138.
... Ibid. See also, Rankin and Kallmayr, Freedom and Emergency Powers in the
Cold War (New York: Appleton-Century-Crofts, 1964) p.220.
... Norusis (staff summary), 6/23/75.
... Ibid. Also, see "Lawyer Data Winds Up in Police Files," Chicago Daily News,
4/9/75, p. 1.
241 O'Brien. 1971 Hearings, pp. 116--117.
'42 "Ex-FBI Aide Accused in Police Spy Hearings," Chica.llo Tribune, 6/21/75,
p.3.
... 1971 Hearings, p. 1297.
... Ibid.
245 Memorandum for ACSI Task Force, U.S. Army Intelligence Command, Subject
: Possible Transfer of MI Files, 2/8/71.
,.. See DIRO Inspection Report No.4, 4/21/72, 1974 Hearings, p. 250.
824
(2) Tramfer of Money and Equipment.-In 1968 after the riots
following the assassination of Martin Luther King Jr., a meeting was
held at the White House. At this meeting Mayor Walter Washington,
of Washington, D.C., expressed concern that the Intelligence Division
of the Metropolitan Police Department did not have sufficient resources
to predict future riots and disorders.
Shortly thereafter, at the order of the White House, the Army arranged
for a transfer of $150,000 from its intelligence funds to the
D.C. Police Department to be used for intelligence purposes.1l48 In the
summer of 1968, the Army also agreed to furnish the Justice Department
with tear gas grenades for distribution to local police departments,
but the plan was never implemented.249
(3) PartWipation in Law Enforcement Operationa.-On January
14, 1969, shortly before the inauguration of President Nixon, two
Army intelligence agents participated in an FBI search of the evacuated
premises of an underground newspaper in Washington, D.C.250
The FBI obtained a key from the landlord to gain entry, and subsequently
removed documents which they found on the premises. These
were turned over to the Army agents.251
In Chicago, two Army intelligence agents were invited to "observe"
a 1970 police raid on a meeting place of the Chicago 7 defense team.m
Another Army agent in Chicago stated that he had been invited to participate
in several raids by the Chicago police, inc1udin~ the raid on
the apartment of Black Panther leader Fred Hampton III November
1969.253 He denied having participated in any of the raids, however.
During the Democratic Convention of 1968, Army intelligence
agents in Chicago were also detailed to support the U.S. Secret Service.
One of the agents who was involved was assigned at various times to
monitor personally the activities and whereabouts of Ralph Abernathy,
Lester Maddox, and Jesse Jackson.254
In 1974, at the request of the FBI, Army investigators were used to
take down the license numbers of cars in a parking lot at West Point,
New York.255 The lot was being used to park the cars of demonstrators
in town for a protest demonstration.
Also in 1974, a special agent of the Defense Investigative Service
was asked to assist with an investigation of the U.S. Customs Bureau
by interviewing a friend suspected of having knowledge of the case.2~
(4) Participation in Interagency Intelligence Projects.-Representatives
of the military were among those involved in drafting the so-
... See Testimony of Albert C. Hall, Assistant Secretary of Defense (Intelligence),
Hearings before the Select Committee on Intelligence, U.S. House of
Representatives, 94th Cong., 1st Sess. (1975), p. 219.
... Hyman Memorandum, 1914 Hearings, p. 307.
Z6II"Break-In by FBI Alleged Before 1969 Inauguration," New York Time8,
3/3'1/7'3, p. 1; also "FBI Was Given Key for Search in 1969," New York
Times, 6/1/73, p. 14.
- Ibid,;
-Norusis (stair summary), 6/23/75.
... Staff summary of Jerry h Borman interview, 6/13/75.
... Statement of Richard G. Stahl, former intelligence agent, 6/18/75.
.. See Army Response to 2nd Select Committee inquiry, in Select Committee
files.
.. Ibid.
825
called Huston plan in the summer of 1970.257 This }?lan was developed
for the President and proposed numerous alternatIVes for the expansion
of domestic intelligence capabilities. The military representatives,
however, succeeded in keeping the military out of further domestic
responsibilities. As White House aide Huston put it in his recommendations
to the President: "The intelligence community is agreed
that the risks of lifting these restraints (on military intelligence) are
greater than the value of any possible intelligence which could be acquired
by doing so." 258
In December 1970, however, six months after the Huston Plan had
been rescinded, the Department of Defense agreed to participate in an
interagency committee on domestic intelligence. Designated the Intelligence
Evaluation Committee, the group operated under the aegis
of the Justice Department.259 Its objectives were to prepare analyses
and reports on domestic unrest. The DOD furnished one representative
to the Committee which lasted from January 1971 until June
1973.260 It also furnished a Navy ensign who was assigned to the IEC
working statr.261
In 1972, the Under Secretary of the Army approved a Justice
Department request to furnish three Army intelligence analysts to the
Justice Department's Information Evaluation Center in Miami
Beach.262 The purpose of these agents was to analyze intelligence coming
into a Justice Department communications center regarding possible
demonstrations during the Democratic and Republican National
Conventions of 1972. These agents were on duty from July 15 to
July 25, 1972; and from August 15 to August 25, 1972.288
VI. CURRENT DEPARTMENTAL RESTRAINTS UPON SURVEILLANCE OF
CIVILIANS
As discussed above, 'after the Army's civil disturbance collection program
had been exposed in the press, the Department of Defense in
March 1971 issued a new directive 28' which, in general:
-forbade the military from collecting and maintaining information
on "unaffiliated" persons and organizations, except for that "essential"
to the military mission;
-required that all information being held in violation of the directive
be destroyed;
-permitted the military to continue investigating civilian groups
which it considered as "threats" ;
11111 Representatives of the Army, Navy, Air Force, DIA and NSA took part.
For a detailed description of the Huston Plan and itB evolution, see the Select
Committee staff report, "National Security, Civil Liberties, and the Collection
of Intelligence: A Report on the Huston Plan."
"'" Memorandum from Tom Charles Huston to H.R. Haldeman, 7/17/70, Subject:
Domestic Intelligence Review, p. 4.
- See Letter from D. O. Cooke, Deputy Assistant Secretary of Defense, to Senator
Sam J. Ervin, Jr., 1974 Hearings, p. 205.
..., Ibid.
... Ibid., p. 206.
... Ibid., p. 205.
... Ibid., p. 206.
... DOD Directive 5200.27.
826
-permitted the military to conduct both covert and overt surveillance
of civilian political activities if permitted by high-level DOD
officials;
-did not prevent military intelligence from continuing to supply
assistance to civilian law enforcement agencies.
The discussion now turns to a more detailed account of what the
directive requires and how it has worked. We begin by noting the impact
the directive has had on intelligence activities undertaken for the
purposes identified in Parts II-V above. The report then discusses the
remaining provisions of the directive as restraints upon military surveillance
in the future.
One must keep in mind throughout, however, that it is an administrative
directive being considered. No matter how effective it may
have been in the past, the directive can be rescinded or changed at the
direction of the Secretary of Defense.
A. Ourbing Past AbU8es
Although the new directive :places relatively strict restraints on
the collection and retention of mformation regarding "unaffiliated"
persons and organizations, it leaves military intelligence free to engage
in collection activities for each of the purposes described in parts II-V.
(1) Preparing for Oivil Disturbances.-The directiv{' states that
the Attorney General of the United States is the chief civilian officer
for purposes of coordinating activities relating to civil disturbances.
Furthermore, it gives the Secretary of Defense or his designee-in this
case, the Secretary of the Army-the authority to order that information
be acquired to meet the Department's "operational re9.uirements,"
if "there is a distinct threat of a civil disturbance exceedmg the law
enforcement capabilities of state and local authorities." m
The directive does not state from whom the Department is authorized
to obtain the information relating to its "operational requirements,"
or whether it may use its own personnel to collect such information.
Moreover, by reciting that the Attorney General is the chief
official responsible for coordinating civil disturbance operations, it
implies that if the Attorney General were to task the DOD for information
regarding civil disturbances, the Department would have no
choice but to comply. This is, of course, precisely what took place in
1967.
Thus, while the directive requires that any civil disturbance collection
effort using military operatives or otherwise be ''turned on" at a
high level of the Department, it does not forbid the military from
collecting information for this purpose.
As a matter of fact, the Secretary of the Army has exercised his
authority under the directive by desi~ating a small element at the
Department of Army level-the DiVIsion of Military Support-to
mamtain contact with the Justice Department and acquire information
from it regarding "distinct threats of civil disturbances." None
of this informatIOn is currently disseminated within DOD but, presumably,
it would be in the event Army troops were deployed.
It would seem that while the directive appears to authorize the collection
of information on potential civil disturbances on a case-by-case
""" DOD Directh'e 5200.27, Para. IV (c).
827
basis, in fact the Army has decided to authorize continuous, albeit
limited, collection.
The Committee's investigation also revealed that this portion of
the directive has been violated. As late as 1975, the National Security
Agency, a foreign intelligence collection agency of the Department
of Defense, was maintaining information on potential civil disturbances
on the grounds that it was helpful to NSA recruiters who may
be entering such "troublespots." 267 DOD put an end to the practice.
(2) Monitoring Dom.estie Radio Transmissions.-The directive contains
no direct reference to radio monitoring. Rather, it has a general
prohibition against the use of electronic surveillance "except as authorized
by law."
It is noted, in this regard, that the monitoring and publication of
radio transmissions are outlawed by section 605 of the Communications
Act of 1934, but that did not prevent the Army Security Agency
from engaging in such intercepts from 1967 to 1970.268 The Army, in
fact, continued such monitoring even after being told by the FCC that
it was illegal.
(3) Investigating "Threats" to the Military.-The directive expressly
provides that "information maybe acquired about activities threatening
defense military and civilIan personnel and defense activities
and installations ...." One example of a "threatening" activity
cited in the directive is the subversion of loyalty, discipline, or morale
of Department of Defense military or civilian personnel by actively
encouraging violation of law, disobedience of lawful orders or regulations,
or disruption of military activities."
This exception for "threats" is, on its face, ambiguous. The phrase
"subversion of the loyalty, discipline, or morale of DOD personnel,"
is not defined, nor is the phrase "encouraging ... disobedience ... or
disruption of military activities." Conceivably, these exceptions could
encompass any form of prote&t activity against the established order in
the civilian community.
The Committee has noted in the course of its investigation that
there are differing interpretations of what constitutes a "threat"
among the military services. For example, the Navy considered the
fact that its personnel were members of a "dissident" civilian group
sufficient grounds to treat the group as a "threat," and thereby justify
retaining information about the group. The Army and Air Force,
however, did not consider the membership of their personnel in such
a group sufficient grounds to collect information on the group. They
would retain information regarding such a group only if it could otherwise
be shown to be a "demonstrable threat" to their respective services.
These differences in interpretation are also reflected in the services'
requests to the DIRC for approval of covert penetrations. In the one
case where the DIRC turned down such a request, it did so on the basis
"'" DIRC Inspection Report, No. 19, 4/29/75. See Select Committee Report
"Xational Security Agency Surveillance Affecting Americans" .
... Neither the National Security Agency nor the service cryptologic agencies
which are under its operational control (the Army Security Agency is one of
these) regard section 605 of the 1934 Act or title III of the Omnibus Crime Control
and Safe Streets Act as applying to them, since they collect foreign intelligence.
See the Select CommIttee report "National Security Agency Surveillance
Affecting Americ;ans". A different question is posed, however, when the National
Security Agency or one of its service components intercepts domestic communications
for purposes other than foreign intelligence.
69-984 0 - 76 - 53
828
that the civilian group against which a penetration was proposed, although
presumably antimilitary, did not represent a "direct and palpable"
threat. The directive, of course, makes no such distinction.
We have also seen in practice that what the military views as "threats"
are not always perceived as such by the FBI which, when approached
by the military, declines to initiate an investigation of the civilian
group in question.
(4) Assisting Law Enforcement Agencies.-The directive states that
DOD will place "maximum reliance" upon domestic law enforcement
agencies to satisfy its informational needs regarding civilians. It also
provides that the directive shall not be construed to prevent the Department
from reporting threats to life and property, or violations of the
law, to local law enforcement.
It makes no reference, however, to DOD's being tasked by law enforcement
or other Federal agencies to perform intelligence duties in
the civilian community. In practice, DOD has taken the position that
all operations within the civilian community must be carried out in
accordance with the directive, whether they are done at the request of
other agencies or not.
Nevertheless there is a discernible tendencv for DOD to agree when
asked by other agencies to undertake intelligence activities which it
would otherwise forbid to itself. For example, DOD participation in
the Intelligence Evaluation Committee and its support to the Justice
Department at the 1972 political conventions are cases where DOD
undertook domestic intelligence activities at the request of other
agencies, which it presumably would not have undertaken on its own
initiative.
In short, the activities of the Department of Defense which have led
to abuses in the past are still within its jurisdiction, although the use
of military personnel to collect such information has been restricted.
The nature of these restrictions is the subject of the next section.
B. PTeventing SUTVeillance in the Future
Although DOD Directive 5200.27 does seek to prohibit the "collecting,
reporting, processing, or storing information on individuals or
organizations not affiliated with the Department of Defense," it allows
for exceptions and its terms are so ambiguous that future surveillance
activities in the civilian community might be undertaken consistent
with the directive.
(l) Scope.-Until August 20, 1975, DOD Directive 5200.27 applied
only to military personnel located in the 50 states, and the territories
and possessions of the United States.271 Furthermore, it did not apply
to the acguisition of "foreign intelligence information," even if such
informatIOn involved unaffiliated persons and organizations.
As noted previously, the Army undertook operations against civilian
groups in West Germany and West Berlin,and the Navy undertook
operations against similar groups in Japan, without seeking
exceptions to the DOD directive.
There has also been confusion over the meaning of the exclusion of
foreign intelligence information. Until August 1973, two years after
J'T1 On August 20, 1975, DIRe expanded the scoPe of the directive to include
military personnel in overseas locations.
829
the directive had been in effect, the National Security Agency, a foreign
intelligence collection agency within the Department of Defense,
considered itself to be exempted by this clause from the provisions of
the directive.272
Moreover, NSA was found to have been violating the restrictions of
the directive. Its Office of Security was told in 1973 to destroy 40 cubic
feet of files on "unaffiliated" individuals and organizations being held
in violation of the directive.273
(2) Permitted ExceptWns.-In addition to designating what information
on unaffiliated individuals and groups may be collected and
retained, the directive ·also provides how such information shall be
collected. It begins by stating as a matter of "policy," that "maximum
reliance" will be placed upon local law enforcement authorities.
It, nevertheless, allows military personnel to be used to collect "essential"
information if authorized by various high-level persons within
the military.
(a) 0 overt 8urveillance.-The directive provides that "there shall be
no covert or otherwise deceptive surveillance or penetration of civilian
organizations unless specifioolly authorized by the Secretary of Defense
or his designee." In this case, the "designee" is the Chairman of
the Defense Investigative Review Council, the special board, referred
to earlier, established to monitor the implementation of the directive.274
It should be noted, however, that the directive provides no criteria to
guide the judgment of those officials who must decide whether covert
surveillance should be employed. Assistant Secretary of Defense
Robert F. Froehlke, in an exchange with Senator Edward M. Kennedy
during the 1971 hearings, conceded that the directive may be deficient
in this respect:
KENNEDY. And you are not maintaining any information
then on any individual at the present time who is involved in
in protests ?
FROEHLKE. Only under the policy that we have now. It
does allow it under certain circumstances, but in all cases 8
civilian official would first have to give his approval.
KENNEDY. And what criteria does he use ?
FROEHLKE. Judgment, his judgment.
KENNEDY. Completely a subjective determination?
FROEHLRE. As of this moment, yes. . . .
KENNEDY. Don't you think criteria ought to be set f
FROEHLXE. Yes. Short of having criteria, you are going
to be arbitrary.275
As noted above, this authority has been exercised nine times since'
1971 by the Chairman of the DIRC, all for the purpose of conducting
penetrations of civilian groups considered "threats." The Com-
.... The DIRe informed NSA that the directive covered all elements of the Department
of Defense, including foreign intelligence collection agencies. It only
excludes foom its general prohibition "foreign intelligence information." See
DIRO Inspection Report, No. 19, 3/29/75; and Staff Summary of Roland Morrow,
Defense Investigative Program Office, interview, 5/22/75.
.... Ibid.
m The DIRO was established by DOD Directive 5200.26.
.... 1971 Hearings, p. 435.
830
mittee's investigation revealed only one minor "deceptive surveillance"
which appears not to have been authorized by the DIRC in accordance
with the directive. This occurred at Pawnee, Oklahoma, near Fort
Sill, where on two occasions in the spring of 1973 the Provost Marshal
of Fort Sill ordered Army personnel to conduct reconnaissllJlce flights
to determine if members of the American Indian Movement were
marching on the Army post, or were building fortifications near
Fort Sill.277
(b) Overt SurveUlanee.-The directive also provides that "no DOD
personnel will be assigned to attend public or private meetings, demonstrations,
or other similar activities for the purpose of acquirinp;
information the collection of which is authorized by this Directive
without specific prior approval by the Secretary of Defense or his
designee." The designees in this case are the Secretaries and Under
Secretaries of each military department. Local commanders may also
authorize such surveillance on their own initiative to collect information
on "direct and immediate threats," but this must subsequently be
reported to the Secretary of Defense or his designees.
Again, the Committee investigation revealed only one probahle
violation of this provision. Army investil!Rtors attended a protest
rally in West Point, New York, in May, 1974, without the required
authorization of thp Secretary or Under Secretary of the Army.
(c) Electroni<J Surveillanee.-As mentioned previously, the directive
provides only that the department will not conduct electronic
surveillance of any unaffiliated persons or organization "except as
authorized bv law." This would seem to mean that insofar as nonconsensual
wiretaps and eavesdrops are concerned, DOD must obtain
the approval of the Attorney General in accordance with section 2516
of title 18, United States Code. Consensual eavesdrops (one party
consents) must also have the approval of the Attorney General; 279
consensual wiretaps, however, may be approved within the Department
of Defense, but onlv for the investigation of crimes.~80
It should also be noted' that since electronic surveillance would also
be covert or deceptive, presumably its use would also require the
approval of the Secretary of Defense or the Chairman of the Defense
Investigative Review Council.
The Committee found no evidence that DOD had employed electronic
surveillance against any unaffiliated person or organization
in the United States since 1971.
(d) Retention of Files.-The directive prohibits the "storage" of
information which violates its provisions. It further provides that
any information gathered under its provisions shall be destroyed
within 90 days, "unless its retention is specifically reQuired by law. or
unless its retention is specifically authorized under criteria established
by the Secretary of Defense or his designee." The designee in this case
is the Chairman of the Defense Investigative Review Council.
=See DOD Response to Senate Select Committee's 2nd document Teque9!:.
279 See j\Iemorandl1m from the Attornev General to the heads of Executive
Departments and Agencies; 6/16/67. .
280 DOD Directive 5200.24.
831
The Chairman of the DIRC did exercise this authority soon after
the directive was issued to permit the military departments to maintain
"dead storage" files, so long as procedures were employed to
screen any such files prior to disseminating information from them.281
This decision was made in order that the military departments
would not have to screen literally millions of files in "dead storage."
It did, nonetheless, result in a technical violation of the directive smce
much of this information was not retainable.
A second violation of these provisions was the Army's retention
of microfilm files in a counterintelligence analysis unit in Washington,
D.C. Secretary of the Army Howard H. Callaway announced in
January, 1975, that the microfilm files contained substantial information
on the political activities of persons and organizations unaffiliated
with the Department of Defense and should have been destroyed.
Subsequent investigation by DOD disclosed that the microfilm contained
160,000 documents, 24,000 of which were added since March 1,
1971, the date of the departmental directive. Of the 136,000 documents
dated prior to the directive, approximately 6,900 were found to be
held in violation of the directive's retention criteria. Of those 24,000
added after the date of the departmental directive, 175 were identified
in a preliminarily screening as being in possible violation of the directive.
Twenty-three were then determined by DOD to be in definite
violation of its directive.
The Army explained that the microfilm files had, in fact, been
screened in December 1970, in accordance with an Army order preceding
the promulgation of the DOD directive. At that time, those who
screened the files apparently considered the exception made for
"threats" to the Army to be broader than the current interpretation.
Due to the negligence of subsequent commanders of the Army unit
which maintained the files, the annual screening required by the
departmental directive did not occur.
A similar explanation was given for the accumulation of twentythree
documents, obviously in VIOlation of the directive. After the date
such directive was issued, the Army suggested that those who had
placed such documents in the files had a dIfferent interpretation of the
term "threat" than was currently acceptable.
The Select Committee also investigated news reports that the Army's
civil disturbance files, the retention of which was not authorized by
the directive, were transferred in 1972 from Fort Holabird, Maryland,
to the Massachusetts Institute of Technology via a Defense Department
computer network.283 The Committee investigation, however, did
not substantiate the news report.
(3) Implementation and Enforeement.-The task of implementing
and enforcing the departmental restrictions is delegated primarily
to the Defense Investi~ative Review Council (DIRC), the Chairman
of which reports directly to the Secretary of Defense on such matters.284
The DIRC carries out its work by [ssuing guidance to subordinate
elements of the department on how the basic directive should be imple-
28l DIRC Study Report No. I, 5/5/71. Subject: Retention Criteria for Investigative
Information, Para VI.
... The Report was aired on the NBC Nightly News, 6/3/75.
... See DOD Directive 5200.26.
832
mented. It also conducts unannounced inspections of DOD installations
to determine whether they are in compliance with the departmental
restrictions. As of May 29, 1975, the DIRC had conducted 19 such
inspections, covering a total of 82 DOD installations.285
In general, the Committee investigation found that implementation
of the departmental restrictions has been vigorous and effective. The
Committee reached this judgment only after its staff inspected the
files and key operational personnel of every major domestic intelligence
headquarters of the Department. It found that the Department.
of Defense now maintains little information on private citizens and
organizations in its current files. Of that which is maintained, all :has
been carefully segregated and is systematically screened prior to disclosure
outside the particular agency which holds them.
Moreover, as indicated above, violations of the directive have been
rare and relatively minor. They do not demonstrate widespread or
systematic misconduct. Furthermore, exceptions permitted by the
Department to the general prohibition of the directive do not appear,
in the Committee~sview, to represent egregious abuses of discretion on
the part of authorizing officials.
(4) Prospects for the Future.- While the current departmental ~irectives
have succeeded in limiting military surveillance activitIes
against private ciitizens 'and organizations, these limitations remain
only in the form of an internal regulation, which can be rescinded or
amended by the Secretary of Defense. Although the Department assures
the Committee that it has no intention of doing either, it cannot
dispute the fact that such a possibility remains. Several former Army
officials told the Committee staff that if America returned Ito a period
of perceived crisis, such 'as the late 19608, the new controls may be
scrapped.286 Assistant Secretary of Defense Robert F. Froehlke conceded
as much in his testimony before the Ervin committee in 1971:
The Army, in such situations (civil disturbances), is really
the only unit of Government that has the resources today.
Whether or not it should be that way I think is very debatruble,
but that is now the faot, and when you get crisis situations,
you need info~mation. Responsible officials fear cities
are going to burn. Where do they look? They look to that
unit of Government that has the resources avaHable, and it
is always the Army.287
Indeed, the current directives have such great flexibility that renewed
surveiHance activity could easily be undertaken if permitted
by high level offi'cials of the Department. Again, one might consider
the following exchange between Senator Edward M. Kennedy and
Assistant Secretary Froehlke at the 1971 Ervin hearings:
KENNEDY. Are we going to assume now at the end of these
hearings that the Department of Army is going to continue
to involve itself (in collecting information on civilians) ?
... At each installation visited by the DIRC inspection team, all units which
are likely to collect or maintain information on unaffiliated individuals and
organizations are normally inspected.
... Staff' summary of Col. Arthur Halligan interview, 7/15/75; and staff summary
of Gen. Millard Daugherty interview, 11/20/75.
287 1971 Hearings, p. 436.
833
FROEHLKE. The Army is out of it. ...
KENNEDY. Of course, they are out of it unless your council
[the DIRe] decides they are back in it.
FROEHLKE. Yes, sir....288
VII. CURRENT STATUTORY RESTRICTIONS UPON MILITARY SURVEILLANCE
There is no statute which expressly prohibits the investigation of
private citizens by the military.
As noted above, the Posse Oomitatus Act (18 U.S.C. 1385) which
prohibits the military from being used to "execute the law," would
probably prevent the military from conducting criminal investigations
of civilians, but that this would not hear upon other types of
investigations.289
Other than this, only the Privacy Act of 1974 290 appears to bear
indirectly upon the matter. The Privacy Act imposes general restrictions
on all agencies of the Federal Government that "maintain systems
of records" insofar as the maintenance and dissemination of
records on individuals are concerned.
One of these general restrictions, which applies to the Department
of Defense, as an agency which "maintains a system of records," is:
Each agency that maintains a system of records shall . . .
maintain no record describing how 'any individual exercises
rights guaranteed by the First Amendment unless expressly
authorized by statute or by the individual 'about whom the
record is maintained or unless pertinent to and within the
scope of an authorized law enforcementactivity.291
Thus, the Act prohibits the maintenance of certain files, and not
investigations per se. Obviously, if 'an agency is prohibited from maintaining
records of investigations, it will ordinarily not be disposed
to conduct them.
Nevertheless, the impact of the Privacy Act, insofar as preventing
military investigations in the civilian community, is far from certain.
The Act itself has received no authoritative judicial interpretation,292
and section 552a(e) (7), cited above, is, on its face, ambiguous. It is
unclear, for example, what a record "describing how any individual
exercises rights guaranteed by the First Amendment" might consist of.
Would attendance at a protest demonstration, for example, be an activity
which could not be recorded under the Act? If the military
expected to be deployed during the demonstration, would taking note
of an individual's attendance be pennissible under the Act? Whether
an individual act represents the exercise of Frst Amendment rights
or is conduct which justifies government investigation often depends
upon the facts of the case.
Further, section 552 (e) (7) allows a government agency to maintain
infonnation on an individual's exercise of First Amendment
rights if (1) the agency is expressly authorized by statute to main-
... Ibia.
... See pp. 822-823.
... P.L. 93-579.
'"'5 U.S.C. 552a(e) (7) .
... The Privacy Act of 1974 became effective on 9/27/75.
834
tarn such information; (2) if the maintenance of such record is authorized
by the individual concerned; or (3) if such information is
pertinent to and within the scope of an authorized law enforcement
activity." 293
These exceptions would appear to allow the military to maintain
records on private citizens and organizations for certain purposes of
its own, and to permit the use of these records by other federal agencies
which themselves fall within one of the excepted categories.
For example, the military is charged with enforcement of the Uniform
Code of Military Justice, a law enforcement function. Thus,
criminal investigators would probably be able to maintain information
on the politICal activities of private citizens which was pertinent
to their investigations. Similarly, the military conducts security clearance
investigatIOns to which subjects give their consent. Presumably,
this would enable military investigators to maintain information on
the political activities of such indIViduals.
Insofar as assisting other agencies is concerned, the reader has also
seen that the military intE'1ligence has frequently been employed by
agencies with law enforcement purposes (the Justice Department and
FBI), and by an agency "expressly authorized by law" to maintain
such information (the Secret Service).294 It would appear, therefore,
tluvt the military is not foreclosed by the Privacy Act from providing
intelligence assistance to other agencies.
In summary, the Privacy Act falls short of providing adequate
assurance that the military will not engage in surveillance of private
oitizens in the future. The statute is written as applying generally to
all government agencies; its particular application to the military is
unclear. It is also sufficiently ambiguous arid contains enough exceptions
to raise doubts as to its effectiveness as a future restraint on
military investigative activity against private individuals and
organizations.
... This exception, insofar as the military is concerned, would have to be considered
in light of the Posse Oomitatus Act.
.. Section 2 of Pub. C. 90--831 (Note to section 305c. title 18, United States
Oode).

Go to Next Page