Site Map CHURCH COMMITTEE REPORTS |
WARRANTLESS SURREPTITIOUS ENTRIES: FBI "BLACK BAG" BREAK-INS AND MICROPHONE INSTALLATIONS CONTENTS I. Introduction _ A. FBI policy and practice _ B. The legal context: United States v. Ehrlichman _ II. Operational Procedure, Authorization, and Targeting _ A. Internal procedure and authorization _ B. Targets: Counterintelligence and domestic subversives _ C. Operations directed against the Socialist Workers Party _ III. FBI Policy and the Question of Authorization Outside the Bureau _ A. FBI policy: The Hoover termination of "black bag jobs" _ B. Presidential and Attorney General authorization _ 1. The Huston plan: Proposal to lift the ban _ 2. Justice Department policy _ a. Historical development _ b. FBlCI enbnrieedfyings of Attorney General Rober_t c. Present policy _ ~PC~~~~1 ~~~:~l~~~~~s~~~r!~~ _f_o~_ ~~~ . !~~~~~~~i~~__o!_ ~~~r_o~~~~~S_!~ (353) Page 355 355 356 358 358 358 361 365 365 365 365 366 366 366 369 371 1VARRANTLESS SFRREPTITIOFS ENTRIES: FBI "BLACK BAG" BREAK-INS AND MICROPHONE INSTALLATIONS I. INTRODUCTION A. FBI Policy and Practice Since 1948 the FBI has conducted hundreds of warrantless surreptitious entries to gather domestic and foreign intelligence, despite the questionable legality of the technique and its deep intrusion into the privacy of targeted individuals. Before 1966, the FBI conducted over two hundred "black bag jobs." 1 These warrantless surreptitious entries were carried out for intelligence purposes other than microJ?hone in~ stallation, such as physical search and photographing or seizmg documents. Since 1960, more than five hundred warrantless surreptitious microphone in8tallations against intelligence and internal security targets have been conducted by the FBI, a technique which the Justice Department still permits. Almost as man'y surreptitious entries were conducted in the same period agamst targets of criminal investigations.Io Although several Attorneys General were aware of the FBI practice of break-ins to install electronic listening devices, there is no indication that the FBI informed any Attorney General about its use of "black bag jobs." Surreptitious entries ~were performed by teams of FBI agents with special training in subjects such as "lock studies." Their missions were authorized in writing by FBI Director Hoover or his deputy, Clyde Tolson. A "Do Not File" procedure was utilized, under whIch most records of surreptitious entries were destroyed soon after an entry was accomplished. The use of surreptitious entries against domestic targets dropped drastically after J. Edgar Hoover banned "black bag jobs" in 1966. In 1970, the relaxation of restraints on domestic intelligence techniques such as surreptititous entries was proposed in the Huston Plan. Hoover opposed this proposal, although he expressed a willingness to follow the Huston Plan, if directed to do so by the Attorney Genera1.2 1 Memorandum from FBI to Senate Select Committee, 1/13/76. Throughout this rllport, the FB'l's term "black bag job" will be used, as in F'BI memoranda, to refer to warrantless surreptitious entries for purposes other than microphone installation, e.g., physical search and photogra.phing or seizing documents. The term "surreptitious entries" will be used to refer to all warrantless entries by the FBI, incluiling both "black bag jobs" and entries for the purpose of microphone installation. Surreptitious entries of either type often involved breaking and entering the targeted premises. See the Committee's report on FBI Electronic Surveillance for a general treatment of microphone installations. 1& Memorandum from FBI to Senate Select Committee, 10/17/75, p. 3. Memorandum from J. Edgar Hoover to Attorney General Mitchell, 7/27/70. (355) 356 B. The Legal Oontext: United States v. Ehrlichman The legality of warrantless surreptitious entries for intelligence purposes is highly questionable. An FBI official who administered "black bag" operations in the 1960s expressed the opinion that they were "clearly illegal," 3 even though a 1954 memorandum from Attorney General Herbert Brownell to J. Edgar Hoover had provided the color of legal authority for surreptitious entries to install microphones! U.S. v. Ehrlichman is the only judicial decision on the legality of a warrantless surreptititous entry and physical search where the action was justified by the claim that it was "in the national interest." 5 In that case-which did not involve intelligence agencies-President Nixon's assistants, John Ehrlichman and Charles Colson, were among five defendants accused of conspiring to deprive a Los Angeles psychiatrist of his Fourth Amendment rights "by entering his offices without a warrant for the purpose of obtaining the doctor's medical records relating to one of his patients, Daniel Ellsberg, then under Federal indictment for revealing top secret documents." 6 Ruling on the defendant's discovery motions, Federal District Judge Gerhard Gesell found the break-in and search of the psychiatrist's office "clearly illegal under the unambiguous mandate of the Fourth Amendment" because no search warrant was obtained : [T]he Government must comply with the strict constitutional and statutory limitations on trespassory searches and arrests even when known foreign agents are involved.... To hold otherwise, except under the most exigent circumstances, would be to abandon the Fourth Amendment to the whim of the Executive in total disregard of the Amendment's history and purpose.7 Gesell also pointed to a passage in the landmark "Keith" case to emphasize that surreptitious entries should be viewed by the courts as more intrusive than other forms of search such as wiretapping: physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed.S Despite the national security defense raised by the defendants, Judge Gesell concluded that "as a matter of law ... the President ... Memorandum from William C, Sullivan to C. D. DeLoach, 7/19/66. This memorandum was written by Section Chief F. J. Baumgardner and approved on Sullivan's behalf by his principal deputy, J. A. Sizoo. Memorandum frQlll Brownell to Hoover, 5/20/54. U.S. v. EhrUo1ImwIn, 376 F. Supp. 29, 31 (1974). 6 U.S. v. EhrUohftUm, 376 F. Supp. 29, 31 (1974). Ibid, p. 33, Gesell wrote: "Defendants contend that, over the last few years, the courts have begun to carve out an exception to this traditional rule for purely intelligence-gathering searches deemed necessary for the conduct of foreign affairs. However, the cases cited are carefully limited to the issue of wiretapping, a relatively nonintrusive search, United States v. Butenlw, 494 F.2d 593 (3rd Cir. 1974) ; United States v. Brown, 484 F.2d 41R (5th Cir. 1973) ; ZweilJon v. Mitchell, 363 F. Supp. 936 (D.D.C. 1973), and the Supreme Court has reserved judgment in this unsettled area. United States v. United States District Oourt, 407 U.IS. 297, 322 n. 20, 92 S. Ct. 2125, 32 L. Ed. 2d 752 (1972)." Ibid, p. 33. 8 U.S. v. EhrMchman, supra at 33, n. 3 citing U.S. v. U.S. District Oourt, supra at 313. This decision, known as the Keith case, after its author, Judge Damon Keith, is discussed in detail in the report on FBI Electronic Surveillance. 357 lacked the authority to authorize the Fielding break-in." 9 Gesell commented that break-ins in the interest of "national security" cannot be excepted from the requirement of a judicial warrant; the Fourth Amendment cannot be obviated, he wrote, . . . whenever the President determines that an American citizen, personally innocent of wrongdoing, has in his possession information that may touch upon foreign policy concerns. Such a doctrine, even in the context of purely information- gathering searches, would give the Executive a blank check to disregard the very heart and core of the Fourth Amendment and the vital privacy interests that it protects. Warrantless criminal investigatory searches-which this break-in may also have been-would, in addition, undermine vital Fifth and Sixth Amendment rights." 10 Judicial decisions on electronic surveillance have encompassed surreptitious entries for the purpose of installing electronic listening deices. The leading case, Katz v. United States,11 abandoned previous judicial decisions in which the legality of microphone surveillance depended upon whether or not a "constItutionally protected area," such as a home or office, had been physically invaded.12 Instead, the Court declared that "the Fourth Amendment protects people, not places," wherever they have a "reasonable expectation of privacy." 13 In Katz the Court recognized a possible exception to the warrant requirement for "a situation involving the national security"-an exception which might apply to all forms of electronic surveillance, including surveillance accomplished 'by trespass to install a microphone.14 The possible exception to the warrant requirement, articulated by the Supreme Court and sustained by some lower courts in electronic surveillance cases,l5 probably would not apply to surreptitious entries conducted for the purpose of physical search. As Attorney General Edward H. Levi testified: The nature of the search and seizure can be very important. An entry into a house to search its interior may be viewed as more serious than the overhearing of a certain type of conversation. The risk of abuse may loom larger in one case than the other.16 u.s. v. E1lh"Uchman, 8Upra, at 34. 1·libid, pp. 33--84. The Ehrlichma-n decision has been appealed and the Justice Department has filed a memorandum in the Court of Appeals contesting Judge Gesell's ruling on the President's power. The Justice Department's position is set forth later in this report at pp. 369--370. U Katz v. United states, 389 U.S. 347 (1967). 10 For example, Gold-man v. Un-ited states, 316 U.S. 129 (1M2). 13 Katz v. Uwited States, 389 U.S. at 351, 360. 1< 389 U.S., at 358 n. 23. 10 Although the Supreme Court has never held that there is such an exception, at least two lower courts have so held in the foreign intelligence and oounterintelligence field. United States v. Butenko, 494 F.2d 500 (3rd Cir. 1974), Un-ited States v. Brown, 484 F.2d 418 (5th Cir. 1973) ; but cf., Zweibon v. Mitchell, 516 F.2d 594 (D.C. Cir.1975, en bane). ,. Levi testimony, 11/6/75, Hearings, Vol. 5, p. 97. 358 II. OPERATIONAL PROCEDURE, AUTHORIZATION, AND TARGETING A. InteT"tUll Procedure and Autlwrization The only internal FBI memorandum located by the Select Committee which discussed the policy for surreptitious entries stated: We do not obtain authorization for "black bag" jdbs from outside the Bureau. Such a technique involves trespassing and is clearly illegal; therefore, it 'Would be impossi'ble to ?htain any legal sanotion for it. Despite this, "~lack bag" lObs have been used because they represent an Invaluable toohnique in combating subversive activities of a olandestine nature aimed directly at undermining and destroying our nation.11 The FBI described. the procedure for authorization of surreptitious entries as follows: When a Special Agent in Charge (SAC) of a field office considered surreptitious entry necessary to the conduct of an investigation, he would make his request to the appropriate Assistant Director at FBIHQ, juStifying the need for an entry and assuring it could be accoml?lished safely with full security. Inaccordanoe with instructIOns of Director J. Edgar Hoover, a memorandum outlining the facts of the request was prepared. for approval of Mr. Hoover, or Mr. Tolson, the Associate Director. Subsequently, the memorandum was filed in the Assistant Director's office under a "Do Not File" procedure, and thereafter destroyed. In the field office, the SAC maintained. a record of 'approval as a control device in his office safe. At the next yearly field office inspection, a revi6W of these records would be made by the Inspector to insure that the SAC was not acting without prior FBIHQ approval in conducting surreptitious entries. Upon completion of this review, these records were destroyed.18 One FBI agent who performed numerous "black bag jobs" stated that he obtained approval from some officer at FBI headquarters, although not always the Director, before performing a study of the feasibility of an entry.19 He said that a feasibility study was intended to determine: whether the entry could 'be aooomplished. in a secure manner, who owned the building and whether a key could be obtained. Floor plans of the building were often procured. If a building owner appeared to hea "patriotic citizen," FBI agents would approach him for assistance in enterin~ a unit of his building-"show our credentials and wave the flag.' 20 If the FBI agents decided that they would he unable to obtain the building owner's con- 11Memorandum from W. C. Sullivan to C. D. DeLoach, 7/19/66, Subject: "Black Bag" Jobs. 18 Memorandum from the FBI to the Senate Select Committee, September 23, 1975. 1. Staff summary of interview with former FBI Agent 1, 9/5/75, p. 3. .. Ibid, p. 4. 359 sent to enter the target's premises, the agents would examine the building and the area to determine the feasibility of a break-in.21 The FBI 'agent stated that if an entry was considered feasible he would write. a memorandum to "Director, FBI" and, in response, would invariably receive an authorizing memorandum from headquarters initialled "JEH" [J. Edgar Hoover].22 Another FBI :agent who frequently participated in break-ins, stllited that the dirootives for such operations were sometimes initialled by Hoover and usually initialled by the Assistant Director in charge of the Domestic Intelligence Division.23 One agent, who served on a special squad responsible for installing electronic surveiUance devices, stated that in the majority of cases he was :ruble to obtain a key to the target's premises, either from a landlord, hotel manager, or neighbor. In other cases, he simply entered through unlocked doors. He stated that only in a small proportion of the cases to which he was assigned was j,t necessary to pick a lock. 23& Once ,a bug was planted, it was generally necessary for Bureau agents to m~>Ditor the conversations from a location close to the targeted prenuses. Selected FBI agents received training courses in the skills necessary to perfonn sUI'reptitious entries. An FBI technici'an provided fonnal instruct-ion in "look studies" as in-service training for experienced agents; ''specialized lock-training" was also provided to each agent who received training in electronic surveillance at "sound schoo!." 24 These courses were conducted at the direction of the Assistant Director in charge of the Bureau Laboratory. The Unit Chief who taught the courses Sbated that he had participaJted in numerous "black bag jobs" in which his only role was to open locks and safes; all other activities were performed by other agents accompanying him. He said that he would ordinllirily receive an incentive award fora successful entry.25 One agent involved in surreptitious entries sta-ted that he never knowingly conducted an entry for, or with the assistance of, a local police force; nor was he aware of any infonnllition being provided by the FBI to local police about an entry.26 The agent said that he performed two microphone installations against CIA employees at the request of the CIA. He also stated that he was never accompanied on an entry operation by a CIA officer.21 B. Targets: Oounterintelligence and Domestic S'libversives The FBI has identified two broad categories of targets for surreptitious entries from 1942 to April 1968: (1) groups and individ- II. Ibid, p. 4. "Staff Summary,FUI Special Agent 1 Interview, 9/5/75, p. 4; EmI Special Agent 1 Interview, 6/27/75, p. 4. .. Staff 'Summary, FBI Special Agent 2 Interview, 9/10/75, p. 2. ... FBI Special Agent 1 interview, 9/5/75. The Committee did not conduct a detailed examination of all operational techniques and procedures involved in surreptitious entry operations. ,. Unaddressed memorandum from J. Edgar Hoover, Director, 6/22/64. 1Il FBI Special Agent 2 Interview, 9/10/75. pp. 1-4. .. FBI Special Agent 1 Interview, 9/5/75,p. 5. III FBI Special Agent 1 Interview, 9/5/75, pp. 5, 8. 360 uals connected with foreign iIlJtelli~ence and espionage operations; and (2) "domestic subversive and whlte hate groups." 28 A Domestic Intelligence Division memorandum summarized the fruits obtained from surreptitious entries against domestic groups: We have on numerous occasions been able to obtain material held highly secret and closely guarded by subversive groups 'and orgamzations which consisted of membership lists and mailing lists of these organizations.29 The memorandum also cited a warrantless surreptitious entry against the Ku Klux Klan as an example of the utility of the technique: Through 11 '~black bag" job, we obtained the records in the }X)S8eSSion of three. high-ranking officials of a Klan, organiz8ltion.... These records gave us the complete membership 'and financial information concerning the Klan's operation which we have been using most effectively to disrupt the organization and, in fuct, to bring about its near disintegration. 30 A former FBI agent has stated that the loc8ltions of break-in operations included the residences of targets of investigation as well as organizational headquarters.31 The FBI was "unable to retrieve an accurate accounting" of the number of warrantless surreptitious entries from their files: "there is no central index, file, or document ... no precise record of entries" due to the "Do Not File procedure." 32 Relying upon a general review of files and upon the recollections of FBI agents at headquarters, the Bureau estimated that, in the "black bag job" category (warrantless surreptitious entries for purposes other than microphone installation) : There were at least 239 surreptitious entries conducted against at least fifteen domestic subversive targets from 1942 to April 1968.... In addition,at least three. domestic subversive targets were the subject of numerous entries from October 1952 to June 1966.33 "An entry against one white hate group" was also reported.34 One example of a "domestic subversive target" against whom numerous entries were conducted is the Socialist Workers Party, which may have .. Memorandum from the FBI to the Select Committee, 9/23/75, p. 1. The FBI compiled a list of the "domestic subversive" targets, based "upon recollections of Special Agents who have knowledge of such activities, and review of those tiles identified by recollection as being targets of surreptitious entdes." The Bureau admits that this list is "incomplete." The Select Committee has reviewed this list and has determined that the specific targetH listed fell within what WlaS understood at the time of the surreptitious entries to be the "domestic subversive" category, as defined in FBI Manual Section 87 as permissible targets for full investigations (Committee Staff Memorandum, September 25,1975.) [See the discussion of the overbreadth of FBI full investigations in the Report on the Development of FBI Domestic IntelUgenee <InvestigatioDB; 1916-1976.] .. Memorandum from W. C. Sullivan to C. D. DeLoach, 7/19/66, p. 2. ... Memorandum from W. C. Sullivan to C. D. DeLoach, p. 2. 81 Staff Summary, Interview of Former FBI Special Agent 3, 5/21/75, p. 4. .. Memorandum from the FBI to Senate Select Committee, 9/23/75. .. Memorandum from the FBI to ,Senate 'Select Committee, 1/13/76. .. Memorandum from the FBI to ISenate 'Select Committee, 1/13/76. 361 been targeted for as many as ninety-two break-ins during the period from 1960 to 1966.35 To have a more complete picture of the extent of "black bag" operations, two other FBI estimates, also based on incomplete records, must be considered along with this partial accounting of the number of "black bag job" entries against domestic subversive grouI?s. First, the Bureau estimated that between 1960 and 1975, 509 surreptitious microphone installations took place against 420 separate "targets of counterintelligence, internal security, and intelligence collection investigations." 36 It is impossible to determine from the FBI estimates exactly how many of these installations involved a surreptitious entry because other techniques were also utilized, such as installing a microphone prior to the occupancy of the target or encapsulating it in an article which was sent into the premises. It is also impossible to determine the number of these targets who were American citizens. Second, the FBI estimat~d that between 1960 and 1975, there were 491 surreptitious entries to install electronic surveillance devices against 396 targets of criminal investigations.37 O. Operations Directed Against the Socialist Workers Party Recently disclosed FBI memoranda pertaining to surreptitious en· tries directed at the Socialist Workers Party (SWP) in 1960-1966 provide additional details on ,FBI procedures.38 Most of the documents were to be filed in the "Personal Folder" of the Spooial Agent in Oharge of the New York field office.39 The "purpose of assignment" for surreptitious entries against an SWP affiliate, the Young Socialist Alliance (YSA), was described as follows: To locate records and information relating to the national organization of the YSA, [and] the identity of national members located throughout the country. Also it is anticipated that records of the local organization will be made available,4° .. Sixth Supplementary Response to Requests for Production of Documents of Defendant Director of the Federal Bureau of Investigations, Socialist Workers Party, et al, v. Attorney General, et al, 73 Civ. 3160 (S.D.N.Y.), 3/24/76. .. Memorandum from the E1BI to Senate Select Committee, 10/17/75, p. 3. The FBI reporting of these statistics does not make clear how many of these installations, if any, were included in the estimate of the number of surreptitious entries cited above. lf1 Memorandum from the FBI to Senate Select Committee, 10/17/75, pp. 4-5. See Appendix for the complete yearly breakdown of these statistics. 38 These materials have been described by the FBI as a response to the Socialist Workers Party request for "documents relating to any intelligence gathering burglaries perpetrated by or with knowledge of the F.B.I. against the S.W.P., the Y.S.A. (Young Socialist Alliance) or anyone suspected to be a leader or member thereof." (Sixth Supplementary Response to Re<luests for Production of Documents of Defendant Director of the Federal Bureau of Investigation, Socilalist Worker's Party, et al. v. Attorney Genoral, et al., 73 Civ. 3160 (S.D.N.Y.), 3/24/76.) ... This method of ,filing of documents relating to the oporati01UJ.l deta41,s of surreptitious entries should be distinguished from the "Do Not File" procedure which led to the destruction of documents recording the authorization of surreptitious entries. .. Memoranda forom New York Field Office to FBI Headquarters, 6/23/60 and 9/26/62. 362 To carry out this assignment, the FBI prepared memoranda which contained detailed plans for post-midnight burglarizing of YSA headquarters. The FBI's entry plans included descriptions of "security aspects" such as building floor plans, locks, li~hting, surrounding streets, entrances, and the occupants' living habIts!1 The FBI's Los Angeles field office obtained "photographs of material maintained in the office of .James P. Cannon, National Chairman of the SWP," including letters to and from Oannon!2 The field office reports about this material carried the warning: .. Several memoranda describe the "security aspects" of the FBI agents' plans for securing entry into the headquarters of the Young Socialist Alliance. One reads as follows: "The headquarters entrance is a store front on the street level. There is only one entrance to the headquarters. The door is locked with a Master padlock only.... "The entrance to the building is located approximately 75 feet on the north side of [the] Street from Second Avenue. The headquarters is a street front located adjacent to the entrance to the apartment building. . . . East of the headquarters store front are located 4 similar store fronts within the same building. These are described as follows from the headquarters going ea'st: New York Telephone Company; empty store front; law office; empty store front. "There are 4 fioors of apartment dwellings above these store fronts in the building. "There is a street light located on the north side of [the] Street, approximately five store fronts east of the headquarters. Inasmuch as the nearest other street light is located on the southeast corner of Hhe street] and Second [street], the immediate area of the headquarters is reasonably dark in evening hours. "Previous spot checks on numerous occasions have shown that there is a very limited amount of pedestrian and automobile traffic after 12 Midnight. These spot checks have also shown that the lights of the apartments in the building are darkened. "Entrance will be made between the hours of 12 Midnight and 4 AM, June 30, 1960." (Memorandum from FBI Headquarters to New York Field Office, 6/23/60.) When the YSA headquarters moved in 1962, the "security aspects" of the FBI's entry plans were re-evaiuated : "This building is a three-story edifice approximately 25 feet wide by 75 feet in depth. The second and third floors 'are loft premises. The first floor is occupied by [a paint company]. The entrance to the second and third floors of the building is a door located beside the paint store. This door leads directly to 9tair flights to the second and third floors and is secured with a cylinder lock. This entrance does not connect with the paint store on the street level. . "The third floor loft of this building is occupied by an artist . . . who maintains a studio. This individual pursues his profession, together with holding occasional art cIasses, in this loft. This activity transpires during the daytime. [The artist] does I]j()t reside on these premises and is not known to frequent the premises in the evening hours. ' "The YSA Headquarters are located on the second floor loft space. The YSA moved into these headquarters on 9/21/62. Numerous spot checks of the area have shown very limited pedestrian and automobile traffic after midnight. The buildings adjacent to this location . . . on both sides of the street, are commercial establishments and lofts, and contain I]j() residence. "It has been ascertained that the paint store at this building closes at 6:00 p.m. and that all of the commercial establishments in this area close business between 5:00 and 6 :00 p.m. . .. "Entrance will be made between the hours of twelve midnight and 4 :00 a.m., on 9/28/62." Memorandum from FBI Headquarters to New York Field Office 9/26/62. ' d Memorandum from Los Angeles Field Office to New York Field Office, 6/16/60; memorandum from Los Angeles Field Office to FBI Headquarters 6/17/60. ' 363 EXTRE.ME CACTION SHOULD BE EXERCISED IN UTILIZING INFORMATION FURXISHED BY [DELETED] IN ORDER THAT THE IDENTITY OF THIS HIGHLY CONFIDENTIAL SOURCE IS NOT CQMPROMISED.43 Several of the reports were "classified" because disclosure could "compromise effectiveness of the source."44 Moreover, upon receipt of this information, FBI headquarters advised the Los Angeles field office: Due to the sensitive nature of [deleted], which may become a further source of valuable information concerning the Socialist 'Yorker's Party, any data obtained from that source should be paraphrased when submitted to the Bureau or other offices in memorandum form suitable for dissemination.45 The Bureau apparently required such paraphrasing because it contemplated the dissemination outside the FBI of data obtained from surreptitious entries. The material photographed by the FBI included membership lists, photographs of members, contribution lists, and correspondence concerning mem'bers' public participation in United States presidential campaIgns, academic debates, and civil rights and antiwar organizing. For example, the following items were among those photographed by Bureau agents at the national offices of the Socialist Worker's Party: -"Items of correspondence between SWP National Headquarters and various branches detailing plans to obtain petition signatures to get on the ballot in 1960 elections." -"Letter sent by [SWP leader] to President Eisenhower (1/21/60) against loyalty program." 46 -"SWP members active in trade unions-identity of union and members disclosed." 47 -"Letter dated 6/1/60 setting forth the topic of speech to be given by ... SWP Vice-Presidential candidate at opening of tour at Detroit, and listing complete schedule of cities to be visited thereafter in nationwide tour." 48 ~"Correspondenceidentifying contributors to SWP election campaign fund." -"Letter proposing picket activity at Democratic Convention." 49 -"List naming all students at each session of Trotsky School from beginning in 1947 to the present." 50 -"Letter setting forth that [deleted] was cancelling balance of her national tour because her husband ... had suffered a stroke." 51 'S For example, memorandum from Los Angeles Field Office to New York Field Office, 6/16/60. (Deletion by ~'BI.) .. For example, memorandum from Los Angeles Field Office to FBI Headquarters, 6/17/60. .. Memorandum from :F'BI Headquarters to Los Angeles Field Office, 7/1/60. (Deletion by FBL) "'Memorandum from FBI Headquarters to New York Field Office, 1/29/60. ... Memorandum from FBI Headquarters to New York Field Office, 3/25/60. "Memorandum from FBI Headquarters to New York Field Office, 6/3/60. '" Memorandum from FBI Headquarters to New York Field Office, 7/11/60. 50 Memorandum from FBI Headquarters to New York Field Office, 9/26/60. 51 Memorandum from FBI Headquarters to New York Field Office, 10/24/60. 69-984 0 - 76 - 24 364 -"Correspondence re arrangements for [deleted] to debate at Yale University." -"Letter announcing death of [deleted] ... and plans for NY memorial meeting...." 52 -"Letter of Young Socialist Alliance (YSA) of 5/23/61 organizing Northern support for Southern students in integration struggle." 53 -"Note from S'VP member ... requesting new key to headquarters so he could continue delivering newspapers there 'when he finished work at night." 54 -"Letter . . . detailing health status of . . . Nat'l Chairn1an." 55 -"Several current items of correspondence to and from S'VP members active in integration activities in Georgia." 56 -"Letters from National office to all branches re March on 'Vashington." 57 -"Voluminous correspondence from many areas re SWP getting on the ballot in 1964 Presidential elections." 58 -"Complete tour schedule for SWP Presidential candidates Sept.-Oct. 1964." 59 -"Plans of [deleted] to write a book." 60 -"Reports on SWP participation in March on Washington (against the Vietnam War)." 61 -"Correspondence re new veterans anti-war organization." -"Current photographs of S'VP members." -"Correspondence re new anti-war front in Cleveland." 62 -"Confidential address book of National-international Trotskyites." 63 In addition to these items, the FBI obtained information about other activities of SWP members, leaders and affiliates, including publishing plans, financial status, international travels and contacts, legal defense strategy,64 and the political conflicts within the party. For example, information about "proposed legal maneuvers" by a committee to aid indicted Young Socialist Alliance members in Bloomington. Indiana,was obtained by the FBI. The number of documents photographed during a single operation reached as high as 220 65 and regularly was above 100. 52l\Iemorondum from FBI Headquarters to New York Fi!'ld Office, 12/16/60. 53l\Iemorandum from FBI Headquarters to New York Field Office, 6/6/61. 50 Memorandum from FBI Headquarters to New York Field Office, 9/15/61. '''' Memorandum from ]!'BI Headquarters to ]\"ew York Field Offic!', 11/3/61. ... Memorandum from FBI Headquarters to New York Field Office, 8/24/62. 51 Memorandum from FBI H!'adquarters to New York Field Office, 8/16/63. fill :\Iemorandum from FBI Headquarters to New York Field Office, 2/10/64. '0 Memorandum from l<'BI Headquarters to New York Fi!'ld Office, 7/10/61. r>o Memorandum from FBI Headquarters to New York Field Office, 10/30/64. Ol l\I!'morandum from FBI Headquarters to N!'w York Field Office, 4/30/M. 2Memorandum from FBI Headquarters to New York Field Office, 12/17/65. 63 Memorandum from FBI Headquarters, to New York Field Office, 4/22/66. 1 Memorandum from FBI Headquarters to New York Field Office, 7/10/64; memorandum from FBI Headquarters to ]\"ew York Field Office, 5/14/65; memorandum from FBI Headquarters to New York Field Office, 7/16/65. lIS Memorandum from FBI Headquarters to New York Field Office, 4/30/65. 365 III. FBI POLICY AND THE QUESTION OF AUTHORIZATION OUTSIDE THE BUREAU A. FBI Policy: The Hoover Termination of "Black Bag Jobs" After apparently approving hundreds of warrantless surreptitious entries, J. Edgar Hoover changed the FBI policy in 1966. In response to a Domestic Intelligence Division memorandum of July 19, 1966, outlining the procedures used for approval and reporting on "black bag jobs," Hoover appended the following handwritten note: "No more such techniques must be used." 67 Six months later, Hoover formalized this directive in a memorandum: I note that requests are still being made by Bureau officials for the use of "black bag" techniques. I have previously indicated that I do not intend to approve any such requests in the future, and, consequently, no such recommendations should be submitted for approval of such matters. This practice, which includes also surreptitious entrances upon premises of any kind, will not meet ,Yith my approval in the future. 68 The FBI's accounting of surreptitious entries indicated that Hoover's prohibition applied only to "black bag jobs." Break-ins to install microphones were not banned. 69 Moreover, Hoover's order did not finally terminate "black bag jobs" against foreign targets.70 Despite Hoover's directive, there is evidence that at least one "black bag job" directed against a "domestic subversive target" took place between 1966 and 1968.71 B. Presidential and A ttorney General Autlwrization 1. Tlwlluston Plan: ProposaZ to Lift the Ban In 1970, a plan for the inter-agency coordination of domestic intelligence activity was presented to President Nixon. The "Huston Plan" proposed, among other things, that restrictions against "black bag" entries "should be modified to permit selective use of this technique against foreign intelligence targets and other urgent and high priority internal security targets." 72 Presidential assistant Tom Charles Huston, the proponent of this plan, which received the support of many high officials in the intelligence community, was of .7 Memorandum from W. C. Sullivan to C. DeLoach, 7/19/66, p.3. oo Memorandum from Hoover to Tolson and DeLoach, 1/6/67. Hoover's motivation for issuing this order in 1966 is unclear. His order came during the same period in which the Bureau's mail opening programs were halted. (See the report on "CIA and FBI Mail Opening", Sec. III-Termination of the FBI Mail Opening Programs, for a discussion of the possihle motivation for Hoover's termination of both mail opening activities and surreptitious entries.) One agent who participated in "black bag" operations indicated that he was unaware of any previous FBI opposition to them. (FBI Special Agent 1 Interview, 9/5/75, p. 8) .. Memorandum from Director, FBI, to Attol'llley General, 6/26/75, p. 1. Even todar Justice Department p~li('r permits warrantless surreptitious entries both to install microphones and for other purposes in the area of "foreign espionage or intelligence." See pp. 369--371. 70 See pp. 369-371. 71 Memorandum from the FBI to Senate Select Committee, 9/23/75. 72 Memorandum from Tom Charles Huston to H. R. Haldeman, 7/70, p. 2. 366 the opinion that "black bag jobs" were illegal but should be utilized nonetheless: Use of this technique is clearly illegal: it amounts to burglary. It is also highly risky and could result in great embarrassment if exposed. However, it is also the most fruitful tool and can produce the type of intelligence which cannot be dbtained in any other fashion. The FBI, in Mr. Hoover's younger days, used to conduct such operations with great success and with no exposure. The information secured was invaluable. Surreptitious entry of facilities occupied by subversive elements can turn up information about identities, methods of operation, and other invaluable investigative information which is not otherwise dbtainable. This technique would be particularly helpful if used against the Weathermen and Black Panthers.73 In a ,memorandum to Attorney General John Mitchell, J. Edgar Hoover expressed his "clear-cut opposition to the lifting of the various restraints" proposed in the Huston Plan, but he also indicated a willingness to partIcipate in the plan if it were adopted: [T]he FBI is prepared to implement the instructions of the White House at your direction. Of course, we would continue to seek your specific authorization, where appropriate, to utilize the various sensitive investigative techniques involved in individual cases.74 Although President Nixon granted approval for the Huston Plan, he revoked this approval within five days, in part because of Hoover's opposition.75 93. JWJtice Department Policy (a) Historical Development.-There is no indication that any Attorney General was informed of FBI surreptitious entries for domestic intelligence purposes other than microphone installation.78 During World War II Alexander Holtzoff, a Special Assistant to the Attorney General, submitted a memorandum to Director Hoover on the "admissibility of evidence obtained by trash covers or microphone surveillance," in response to a series of hypothetical questions posed by an FBI official. Holtzoff declared flatly: The secret taking or abstraction of papers or other property from the premises without force is equivalent to an illegal .. Memorandum from Huston to H.R. Haldeman. 7/70, p.3. .. Memorandum fr0m Hoover to Mitchell, 7/27/70. p. 3. ,. See report on The Huston Plan: Sec. VI, Rescission of the Huston Plan: A Time for Reconsideration. For a full treatment ot memoranda between FBI Director Hoover and successive Attorneys General on microphone installation policy and an analysis of legal developments in the field of electronic surveillance, see Report on FBI Electronic Surveillance. 367 search and seizure, if the taking or abstraction is effected by a representative of the United States. Consequently, such papers or other articles are inadmissible as against a person whose rig-hts have been violated, i.e., the person in control of the premIses from which the papers or other property has been taken, Gouled v. United States, 255 U.S. 298. However, Holtzoff interpreted prevailing court decisions as permitting a "microphone installation ... where an actual trespass is committed." He stated that: evidence so obtained should be admissible, although no precise case decided by the courts involving such a situation has been found. The basic principle governing the situation is ... that microphone surveillance is not equivalent to an illegal search and seizure, Goldman v. United States, 316 U.S. 129.77 In fact, the Goldman decision did not support Holtzoff's conclusion, since the microphone surveillance in the case did not involve trespass; and the Court did not address the question of microphone surveillance accomplished by sUTreptitious entry. In 1952, Attorney General J. Howard McGrath advised Director Hoover that he could not "authorize the installation of a microphone involving a trespas8 under existing law." McGrath added, "Such surveillances as involve trespass are in the area of the Fourth Amendment, and evidence so obtained and from leads so obtained, is inadmissible." 78 A 1954 directive from Attorney General Brownell provided at least the color of legal authority for microphone surveillance involving trespass, but did not deal with surreptitious entries for other purposes. 79 The Justice Department policy toward warrantless surreptitious entry for the purpose of microphone installation apparently remained unchanged until 1965, when Attorney General Katzenbach required the FBI to seek his prior approval for microphone surveillances in- 77 Memorandum from Holtzoff to Hoover, 7/4/44. Holtzoff also advised the FBI that it could legally use cooperating sources or informants to obtain access to private materials: "Where a person (A), having possession of the membership records of an organization, is told by a person (B) who is a member of the same organization but who is working in conjunction with the Bureau, that a particular place is a safe one in which to leave the membership records of the organization. After the records have been so left agents of this Bureau who have the legal permission of (B) enter the premises where the material was left, obtain the records and remove them to another place where they are completely photographed. The records are then returned to their original place where they are subsequently obtained by the depositor (A). It can be assured that both the Agent and the person (B) can testify on behalf of the Government. The foregoing evidence is probably admissible. No entry to the subject's premises was involved, nor was the property abstracted from him. He left it voluntarily in the possession of (B) whose possession was lawful and who thereafter was in a position to grant permission to Bureau Agents to photograph it." ,. Memorandum from McGrath to Hoover, 2/26/52. 7ll Memorandum from Brownell to Hoover, 5/20/54. See full discussion in Report on FBI Electronic Surveillance. 368 volving trespass, and he restricted the purpose of such operations to the collection of intelligence affecting the national security.so (b) FBI Briefings of Attorney General Robert Kennedy.-In 1961, the FBI reiterated to the Justice Department that the Bureau's practice was to install microphones, sometimes by trespass, without informing the Justice Department. In May 1961, Byron White, Deputy Attorney General under Robert Kennedy, was told by Director Hoover that: in the internal security field we are utilizing microphone surveillances on a restricted basis even though trespass is necessary to assist in uncovering the activity of [foreign] intelligence agents and Communist Party leaders.... In the interest of national safety, microphone surveillances are also utilized on a restricted basis, even though trespass is necessary, in uncovering major criminal activities.s1 A memorandum by Courtney Evans, Assistant Director of the FBI for the Special Investigative Division, indicates that he discussed microphones in "organized crime cases" with Attorney General Kennedy in July 1961 : It was pointed out to the Attorney General that we had taken action with regard to the use of microphones in (organized crime) cases and. . . we were nevertheless utilizing them in all instances where this was technically feasible and where valuable information might be expected. The strong objections to the utilization of telephone taps as contrasted to microphone surveillances was stressed. The Attorney General stated he recognized the reasons why telephone taps should be restricted to national-defense-type cases and he was pleased we had been using microphone surveillances, where these objections do not apply, wherever possible in organized crime matters." Evans testified that the purpose of this meeting was to secure the Attorney General's approval for the leasing of a telephone line from a private company for a wiretap operation.s3 .. . Evans stated that he was "purposely vague" III thIS conversatIOn and did not describe to the Attorney General the kinds of technical surveillance the Bureau was using or their methods for installing surveillance devices.s4 He explained that his "purposely vague" briefing was consistent with Director Hoover's policy. Mr. EVANS. Mainly because of a feeling the Director had expressed, that one shouldn't discuss confidential techniques used by the Bureau any more than was absolutely necessary. 1M> Memorandum from Katzenbacb to Hoover, 9/27/65. See full discussion in Report on FBI Electronic Surveillance. 81 Memorandum from Director, FBI, to Attorney General Byron White, 5/4/61. 82 Memorandum from C. A. Evans to A. Belmont, 7/7/71. .. Courtney Evans, testimony, 12/1/75, p. 24. .. Evans, 12/1/75, p. 25. 369 Question. It was your understanding that the admonition applied to the Attorney General as well as all other persons outside the Bureau? Mr. EVANS. It was my understanding that if exceptions were to be made, the Director was going to make them himself.55 Evans, who was responsible for the FBI's liaison with Attorney General Kennedy, testified that it was "entirely possible" that the Attorney General did not understand that surreptitious entries might be used in connection with the "microphone surveillance" and leased telephone line taps which he subsequently authorized. Evans himself understood that the operation for which the Attorney General's signature was obtained "could have in some instances" included microphone installation by means of surreptitious entry, although Evans indicated that there were several methods by which the Bureau could make a "legal entry to a location and effect a microphone installation." 86 (0) Present Polioy.-The Justice Department under Attorney General Edward H. Levi has addressed, for the first time, the legal issues arising from "black bag jobs." This occurred in a statement submitted by Acting Assistant Attorney General John C. Keeney in the appeal of the conviction of John Ehrlichman for the break-in by the White House "plumbers" at the office of Daniel Ellsberg's psychiatrist. Assessing the "plumbers" break-in, the Justice Department declared: The physical entry here was plainly unlawful ... because the search was not controlled as we have suggested it must be, there was no proper authorization, there was no delegation to a proper officer, and there was no sufficient predicate for the choice of the particular premises invaded.87 At the same time, however, the Justice Department defended the President's constitutional authority to conduct warrantless surreptitious entries in limited circumstances and with proper executive authorization: It is the position of the Department that such activities must be very carefully controlled. There must be solid reason to believe that foreign espionage or intelligence is involved. In addition, the intrusion into any zone of expected privacy must be kept to the minimum and there must be personal authorization by the President or the Attorney General. The Department believes that activities so controlled are lawful under the Fourth Amendment. In regard to warrantless searches related to foreign espionage or intelligence, the Department does not believe there is a constitutional difference between searches conducted by wire- .. Evans, 12/1/75, pp. 25, 29. .. Evans, 12/1/75, p. 31; Memorandum from Evans to Belmont, 8/17/61. f₯l Department of Justice Letter, Acting Assistant Attorney General John C. Keeney to Hugh E. Kline, Clerk of U.S. Court of Appeals for the District of Columbia, 5/9/75. 370 tapping and those involving physical entries into private premises. One form of search is no less serious than another. It is and has long been the Department's view that warrantless searches involving physical entries into private premises are justified.88 The Justice Department and the FBI have not terminated the use of warrantless surreptitious entry for electronic surveillance purposes in cases of "foreign espionage or intelligence". Warrantless surreptitious entry for other forms of search is not presently being conducted but, as indicated in the Justice Department statement, has not been ruled out as a matter of policy in foreign intelligence cases. The FBI has stated that "microphone surveillances have been continued and in some instances physical entry of the premises has been necessary" against foreign counterintelligence targ,ets. In addition, "a small number" of surreptitious entries which apparently did not involve microphone installation "were conducted in connection with foreign counterintelligence investigations having grave impact on the security of the nation." Entries for the purpose of installing electronic surveillance devices have also provided an opportunity to conduct other forms of search. The Bureau has stated: Based on available records and discussions with FBI personnel, it has 'been determined that in connection with microphone surveillances in the United States, there have been occasions when observations and recordings were made of pertinent information contained within the premises.89 According to the FBI, this "opportunity" has been "exploited" exclusively against foreign agents.90 Warrantless surreptitious entries against American citizens who have "no significant connection with a foreign power, its ag-ents or agencies" are undoubtedly unconstitutiona1.92 The oonstitutlonal issues arising from warrantless surreptitious entries against foreign agents within the United States have not been definitely resolved by the courts. The Committee recommends as a matter of policy that all governmental search and seizure "should be conducted only upon authority of a judicial warrant" issued in narrowly defined circumstances as Letter from Keeney to Hugh Kline, clerk of U.S. Court of Appeals for the District of Columbia, 5/9/75. .. Memorandum from the FBI to Senate Select Committee, 7/16/75. go Memorandum from the FBI to Senate Select Committee, 6/26/75. In contrast to the surreptitious entires conducted against "domestic subversive" targets until 1966, one such foreign intelligence operation studied by the Committee demonstrated an FBI pattern of conscientiously obtaining authorization from executive branch officials outside the Bureau: tobe CIA initially request{'d the aid of the FBI in performing the operation; the FBI secured State Department approval and th{'n submitted the plan to the Attorney General for his authorization. (Committee staff summary of FBI memoranda.) lJ2 407 U.S. 297, 309, n. 8 (1972). The Keith case did not specifically address the question of the legality of "black bag jobs." However, by holding that the President's constitutional powers do not enable him to authorize warrantless electronic surveillance of domestic organizations, the logic of the decision compels the conclusion that warrantless surreptitious entires are unconstitutional. 371 and with procedural safeguards "to minimize the acquisition and retention of non-foreign intelligence information about Americans." 93 APPENDIX I SURREPTITIOUS ENTRIES FOR THE INSTALLATION OF MICROPHONES IN CRIMINAL INVESTIGATIONS 1. Entries since 2. Separate since 1960 targets each year since 1960 1 1l 1l iHL~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1~! i: 1964... __ _.. _. ., _.,_,_",_,_" __ , __ "_,, __ .. _.. _ __ __ __ _ 83 ~~ 1965... _.. - - - -. -- .. -.. -..... --"'--'- -.. -.' --., -- .. -.- .. '--'- --. - - 41 0 1966.... _-.. -.- -.- -. --.- -. --.- -.. -.- -. ------ .. -. -- --. -.- -- --. - -.. - -. - 0 0 t~L:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: ~ O Subtotal. _ _...====3=94=====31=2 According to the FBI, the following entries were conducted pursuant to judicial warrants issued under title III of the Omnibus Crime Control and Safe Streets Acl of 1968: 3 3 1969.......... - - , -.. - -.. -.. -.'. -.. -.....- --. 8 8 1970...... -""'-" -.. -.. - -- .. - " -.. -." -., -."-" -.. - " - 7 6 1971.................... -." .,. -.'-'-'" -.. -... -"'" -- -.- .. -.. - -. 19 18 1972 - , -"'" - - -.. -.. -- .. -- - 27 20 1973 _........ -.. -.... -- -.. -.. -- ' -.'- -.-- -.. -., .."-" - 22 21 1974.... -........ --.-- .. -.. -- ..... -.- -. -... -.. --. -- -.. -.. '" --. 11 8 1975.... _..... _. _.. _._. __ .. _._ ... _. _.. __ . __ ._ .. _.. __ . _ _.. __ ..... ~~~_~_ _:_ Tolal. _ _",_, ._ _.' _. _ _. __ _ __ 491 396 1 FBI memorandum trom the FBI to Senate Select Committee, Oct. 17, 1975, re request pertaining to surreptitious entries for installation of electronic surveillance. 93 Senate Select Committee Report on "Intelligence Activities and the Rights of Americans," Recommendations 51-54, pp. 327-328. The Committee made the following recommendation to restrict the use of the technique of warrantless surreptitious entry (referred to as "unauthorized entry"-entry unauthori~ by the target) : "UnauthoriZed entry should be conducted only upon judicial warrant issued on probable cause to believe that the place to be searched contains evidence of a crime, except unauthorized entry. inclUding surreptitious entry, against foreigners who are officers, employees, or conscious agents of a foreign power should be permitted upon judicial warrant under the standards which apply to electronic surveillance described in Recommendation 52." (Recommendation 54, p. 328.) This recommendation on "unauthorized entry" incorporates by reference the standards set forth in Recommendation 52 on electronic surveillance: "All non-eonsensual electronic surveillance should be conducted pursuant to judicial warrants issued under authority of Title III of the Omnibus Crime Con. trol and Safe Streets Act of 1968. "The Act should be amended to provide, with respect to electronic surveillance of foreigners in the United States, that a warrant may issue if ., (a) There is probable cause that the target is an officer, employee or con. scious agent of a foreign power. "(b) The Attorney General has certified that the surveillance is likely to reveal information necessary to the protection of the nation against actual or potential attack or other hostile acts of force of a foreign power; to obtain foreign intelligence information deemed essential to the security of the United States; or to protect national security information against hostile foreign intelligence activity. "(c) With respect to any such electronic surveillance, the judge should adopt procedures to minimize the acquisition and retention of non·foreign intelligence information about Americans. "(d) Such electronic surveillance should be exempt from the disclosure requirements of Title III of the 1968 Act as to foreign~rs generally and as to Americans if they are involved in hostile foreign intelligence activity (except where disclosure is called for in connection with the defense in the case of criminal prosecution)." (Recommendation 54, pp. 327-28.) It should be noted that there are well established exceptions to the warrant requirement for searches in exigent circumstances.
|