Academia.eduAcademia.edu
r I 33 k C 1 33 June 1975 Report to the President by the COMMISSION ON lA ACTIVITIES WITHIN THE UNITED STATES ik>ston Public Library Superintendent of Documents JUL •if. •; Its 9 1975 June 1975 Report to the President by the COMMISSION ON CIA ACTIVITIES WITHIN THE UNITED STATES For sale by the Superintendent of Documents, U.S. Government Printing Washington, D.C. 20402 Price $2.85 - Stock Number 041-015-00074-8 Office COMMISSION ON CIA ACTIVITIES WITHIN THE UNITED STATES Washington, DC 20500 David W. Belin, Executive Director Nelson A. Rockefeller, Chairman John T. Connor C. Douglas Dillon Erwin N. Griswold Lane Kirkland Lyman L. Lemnitzer Ronald Reagan Edgar F. Shannon, Jr. June 6, 1975 The President The White House Washington, D.C. Dear Mr. President: Your Commission to Investigate CIA Activities within the United States, having completed its assignment in accordance with Executive Order No. 11828 of January 4, 1975, herewith submits its final report. ^^<^ /' Nelson A. Rocke f e 1 lep^ Chairman Dillon (^7 Ronald Reagan EdqAr F. Shannon, Jr \ . COMMISSION ON CIA ACTIVITIES WITHIN THE UNITED STATES VICE PRESIDENT NELSON A. JOHN T. CONNOR C. DOUGLAS DILLON ERWIN N. GRISWOLD LANE KIRKLAND LYMAN L. LEMNITZER RONALD REAGAN EDGAR F. SHANNON, Jr. DAVID W. BELIN, ROCKEFELLER, Chainnan Executive Director Senior Counsel HAROLD A. BAKER ERNEST GELLHORN ROBERT B. OLSEN WILLIAM W SCHWARZER Counsel MARVIN L. GRAY, Jr. GEORGE A. MANFREDI JAMES N. ROETHE JAMES B. WEIDNER Special Counsel RONALD J. GREENE Staff R. Members MASON CARGILL PETER R. CLAPPER TIMOTHY S. HARDY Special Counsel to Counsel to the Vice President the Vice President SOL NEIL CORBIN PETER J. WALLISON (V) Table of Contents Page IX Preface Part Chapter — Summary 2. The Fundamental Issues The Need for Intelligence 3. Summary of Findings, 1. ^ I. of the Investigation 3 6 Conclusions, and Recommendations 9 Part II. The CIA's Role and Authority Intelligence 4. and Related Activities by the United States before 1947 5. The Sources 6. Legal Analysis of CIA Part III. Supervision and Control of the 7. 8. 45 48 58 Authority CIA External Controls Internal Controls 71 83 Part IV. Significant Areas of Investigation 9. The CIA's Mail Intercepts Community Coordination 101 116 130 10. Intelligence Group— "Operation CHAOS" 11. Special Operations 12. Protection of the Agency against Threats of Violence —Office of Security 13. 14. 151 Other Investigations by Involvement of the CIA 160 the Office of Security in Improper Activities for the White House 15. 16. 17. 18. 19. 172 Domestic Activities Domestic Activities 208 of the Directorate of Operations of the Directorate of Science and Tech- nology CIA Relationships with Other Federal, State, and Local Agencies Indices and Files on American Citizens Allegations Concerning the Assassination of President Kennedy Appendix I. Executive III. IV. V. VI. VII. 232 240 251 Order (Establishing a Commission Within the United States) on CIA Activities II. 225 Statement by the President National Security Act of 1947, as Amended Biographical Information and Acknowledgements Highlights of Civil Disturbances and Other Disorders in the United States January 1966 through January 1973. _ Proposed Amendments to Statute Assistance to and from Federal, State and Local Agencies. — (VII) 271 273 275 279 285 292 294 : Preface President Gerald E. Ford created the Commission on CIA Activities within the United States on January 4, 1975. He directed the Commission to determine whether any domestic CIA activities exceeded the Agency's statutory authority and to make appropriate recommendations. The findings, conckisions and recommendations of the Commission are summarized in Chapter 3 and detailed with full background in subsequent chapters. A. Charges on CIA Domestic Activities Charges that the CIA has conducted illegal activities within the United States violating the rights of private citizens have aroused concern —Because of the number and seriousness of alleged violations of law; and —Because many of the Agency's activities are necessarily secret and therefore are not well understood by the American people. At the same time, many persons have voiced alami that public controversy and exposure would seriously impair the CIA's ability to function which in turn could seriously midermine the national — security. Therefore, the President took steps designed to ensure that the charges would be fully and impartially investigated and that necessary corrective actions would be taken. B. The The President requested President's Order a report on many Director of Central Intelligence and received On January 4, 1975, he issued Executive of the charges from the it in late 1 The Order is reprinted in full In Appendix I. (IX) 1974. Order No. 11828 establishing Commission on CIA Activities within the ITnited signed this Commission three tasks: a December States.^ He as- " ; : X Ascertain and evaluate any facts relating to activities conducted within the United States by the Central Intelligence Agency which give rise to questions of compliance with the provisions of 50 U.S.C. 403 (2) Determine whether existing safeguards are adequate to prevent any activities which violate the provisions of 50 U.S.C. 403; (3) Make such recommendations to the President and to the Director of Central Intelligence as the Commission deems appropriate. (1) ; President Ford appointed the members of the Commission and designated Nelson A. Rockefeller, the Vice President of the United New York, who has held various posts in the Federal Government since 1940, as Chairman. The other mem bers, all from private life, brought widely varied experience to the States and former Governor of Commission John T. Connor, Chairman Officer i Board and Chief Executive of Allied Chemical Corporation and former Secretary of of the Commerce (under President Jolmson) C. Douglas Dillon, a Managing Director ; of Dillon, Read & Co., an investment banking firm, former Secretary of the Treasury (under Presidents Kennedy and Johnson) and former Ambassador to France and Undersecretary of State (under President Eisenliower) Erwin N. Griswold, lawyer, former Solicitor General (under Presidents Johnson and Nixon) and former Dean of the Harvard Law School; Lane Kirkland, Secretary-Treasurer of the AFL-CIO; Lyman L. Lemnitzer, General, U.S. Army (Retired) and former Chairman of the Joint Chiefs of Staff Ronald Reagan, political commentator, former President of the Screen Actors' Guild, and former Governor of California; Edgar F. Shannon, Jr., Commonwealth Professor of English and former President of the University of Virginia. The President named David W. Belin, a lawyer from Des Moines, Iowa, as the Commission's Executive Director. A staff of eleven lawyers was recruited, primarily from the private practice of law and with substantial investigative experience. Inc., ; C. Conduct of the Investigation The Commission has been determined from its inception to make thorough and vigorous investigation. Because of the sensitivity of the CIA's intelligence and counterintelligence activities, and their a 2 This statute established the CIA in 1947. It Is reprinted in full in Appendix III. XI critical relationship to national security, the that it must close its sessions to the public. Commission recognized But as a consequence it more an obligation to conduct a diligent investigation, assuring the American people that all serious questions of legality and propriety within the area of responsibility assigned to the Commission have been carefully investigated and analyzed. The CIA and other agencies were directed by the President to cooperate with the Commission. Much of the evidence the Commission examined has come from CIA files and personnel. But the Commission has felt all the has sought wherever possible to verify the evidence independently, using available outside sources rather than relying solely on summaries or analyses of materials supplied by the CIA or other divisions of the federal government. The Commission began weekly hearings within its appointment and even before a The Commission full staff was eight days after available. recognizes that no investigation of any govern- mental intelligence agency can be certain of uncovering every relevant fact. Nevertheless, the Commission believes that its investigation has disclosed the principal categories of CIA activities within the United States which might exceed affect the rights of its American statutory authority or might adversely citizens. D. Alleged Plans to Assassinate Certain Foreign Leaders CIA had been involved in plans to assassinate certain leaders of foreign countries came to the Commission's attention shortly after its inquiry was under way. Although it was unclear whether or not those allegations fell within the scope of the Commission's authority, the Commission directed that an inquiry be undertaken. The President concurred in this approach. The Commission's staff began the required inquiiy, but time did Allegations that the not permit a full investigation before this report was due. The President therefore requested that the materials in the possession of the Commission which bear on these allegations be turned over This has been done. to him. Parti Summary of the Investigation ; : Chapter 1 The Fundamental Issues In annoiincino- the formation of this Commission, the President noted that an effective intellio;ence and counterintelligence capability is essential to provide "the safeguards that protect our national in- and help avert armed conflicts.'" While it is vital that security requirements be met, the President terest continued, it is equally important that intelligence activities be con- ducted without "impairing our democratic institutions and fundamental freedoms." The Commission's assessment of the CIA's activities within the United States reflects the members' deep concern for both individual rights and national security. A. Individual Rights The ' Rights in the Constitution protects individual liberties against encroachment by government. Many statutes and the common law also reflect this protection. The First Amendment piotects the freedoms of speech and of the press, the right of the people to assemble peaceably, and the right to jK^tition the government for redress of grievances. It has been consti'ued to protect freedom of peaceable political association. In addiBill of tion, the Fourth Amendment declares : The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated .... In accordance with the objectives enunciated in these and other Constitutional amendments, the Supreme Court has outlined the following basic Constitutional doctrines 1. Any intrusive investigation of an American citizen by the government must have a sufficient basis to warrant the invasion caused by the particular investigative practices which are utilized (3) ; 2. Government monitoring of ; — a citizen's political activities re- quires even greater justification 3. The scope of any resulting intrusion on personal privacy must not exceed the degree reasonably believed necessary 4. With certain exceptions, the scope of which are not sharply defined, these conditions must be met, at least for significant investigative intrusions, to the satisfaction of an uninvolved governmental body such as a court. These Constitutional standards give content to an accepted principle of our society —the right of each person to a high degree of individ- ual privacy. In recognition of this right, President Truman and the Congress in enacting the law creating the CIA in 1947 included a clause providing that the CIA should have no police, subpoena, law-enforcement powers or internal security functions. Since then, Congress has further outlined citizen rights in statutes limiting electronic surveillance and granting individuals access to certain information in government files,^ underscoring the general concern of Congress and the Executive Branch in this area. — B. Government Must Obey the Law The individual liberties of American citizens depend on government observance of the law. Under our form exercised only if of Constitutional government, authority can be has been properly delegated to a particular department or agency by the Constitution or Congress. Most delegations come from Congress; some are implied from the it allocation of responsibility to the President. thority resides, however, it is Wherever the basic au- fundamental in our scheme of Constitu- — — government that agencies including the CIA shall exercise only those powers properly assigned to them by Congress or the tional President. Whenever the activities of a individual liberty may government agency exceed its authority, be impaired. C. National Security Individual liberties likewise depend on maintaining public order at home and in protecting the country against infiltration from abroad 1 Omnibus Crime Control and Safe Streets Act of 1968 (18 U.S.C. Sees. 2510-20) and Privacy Act of 1974 (5 U.S.C. Sec. 552a). and armed attack. Ensuring domestic tranquility and pro\dding for common defense are not only Constitutional goals but necessary preconditions for a free, democratic system. The process of orderly and lawful change is the essence of democracy. Violent change, or forcing a change of government by the stealthy action of "enemies, foreign or domestic," is contrary to our Constitutional system. The government has both the right and the obligation within Constitutional limits to use its available power to protect the people and their established form of government. Nevertheless, the mere a invocation of the "national security" does not grant unlimited power to the government. The degree of the danger and the type of action contemplated to meet that danger require careful evaluation, to ensure that the danger is sufficient to justify the action and that fundamental rights are respected. D. Resolving the Issues Individual freedoms and privacy are fundamental in our society. Constitutional government must be maintained. An effective and efficient intelligence system is necessary and to be effective, many of its ; activities must be conducted in secrecy. Satisfying these objectives presents considerable opportunity for conflict. The vigorous pursuit of intelligence by certain methods can lead to invasions of individual rights. The preservation of the United States requires an effective intelligence capability, but the preservation of individual liberties within the United States requires limitations or restrictions on gathering of intelligence. — where lines stitutional The drawing legitimate intelligence needs end government begins — of reasonable and erosion of Con- is difficult. In seeking to draw^ such lines, we have been guided in the first instance by the commands of the Constitution as they have been interpreted by the Supreme Court, the laws as written by Congress, the values we believe are reflected in the democratic process, and the faith we have in a free society. We have also sought to be fully cognizant of the needs of national security, the requirements of a strong national defense against external aggression and internal subversion, and the duty of the government to protect its citizens. In the final analysis, public safety and individual liberty sustain each other. Chapter 2 The Need for Intelligence During the period of the Commission's inquiry, there have been public allegations that a democracy does not need an intelligence apparatus. The Commission does not share this view. Intelligence is information gathered for policymakers in government which illuminates the range of choices available to them and enables them to exerjudgment. Good intelligence will not necessarily lead to wise policy choices. But without sound intelligence, national policy decisions and actions cannot effectively respond to actual conditions and reflect the best national interest or adequately protect our national security. Intelligence gathering involves collecting information about other countries' military capabilities, subversive activities, economic conditions, political developments, scientific and technological progress, and social activities and conditions. The raw information must be evaluated to determine its reliability and relevance, and must then be analyzed. The final products called "finished intelligence" are distributed to the President and the political, military and other governmental leaders according to their needs. Intelligence gathering has changed rapidly and radically since the advent of the CIA in 1947.^ The increased complexity of international political, economic, and military arrangements, the increased destruccise — — weapons of modern warfare, and the advent of electronic methods of surveillance have altered and enlarged the needs for sophisticated intelligence. Intelligence agencies have had to rely more and more on scientific and technological developments to help meet tiveness of the these needs. Despite the increasing complexity and significance of intelligence in national policymaking, it is also important to understand its limits. Not all information is reliable, even when the most highly refined 1 The CIA is only one of several foreign intelligence agencies In the federal government, others include the National Security Agency, the Defense Intelligence Agency, the intelligence branches of the three military services and the State Department's Bureau of Intelligence and Research. (6) intelligence methods are used to system ensure that its collect it. Nor can any intelligence current estimates of another country's inten- tions or future capacities are accurate or will not be outrun by unfore- seen events. There are limits to accurate forecasting, and the use of deception by our adversaries or the penetration of our intelligence services increases the possibility that intelligence predictions may prove to be wrong. Nevertheless, informed decision-making is impossible without an intelligence system adequately protected from penetration. Therefore, a vital part of any intelligence service is an effective counterintelligence program, directed toward protecting our own intelli- gence system and ascertaining the activities of foreign intelligence such as espionage, sabotage, and subversion, and toward minimizino- or counteracting- the effectiveness of these activities. services, Foreign Invasions of United States Privacy This Commission devoted to analyzing the domestic activities of the CIA in the interest of protecting the privacy and security rights of American citizens. But we cannot ignore the invasion of the privacy and security rights of Americans by foreign countries or their agents. This is the other side of the coin and it merits attention here in the is — interest of perspective. . Witnesses with responsibilities for counterintelligence have told the Commission that the United States remains the principal intelligence target of the communist bloc. The communists sums of money, personnel and sophisticated technology in collecting information within the United States on our military capabilities, our weapons systems, our defense structure and our social divisions. The communists seek to penetrate our intelligence services, to compromise our law enforcement agencies and to recruit as their agents United States citizens holding sensitive government and industry jobs. In addition, it is a common practice in communist bloc countries to inspect and open mail coming from invest large — — or going to the United States. In an open society such as ours, the intelligence opportunities for our adversaries are immeasurably greater than they are for us in their closed societies. Our society must remain an open one, with our traditional freedoms unimpaired. But when the intelligence activities of other countries are flourishing in the free environment we afford them, it is all the more essential that the foreign intelligence activities of CIA and our other intelligence agencies, as well as the domestic counterintelligence activities of the FBI, be given the support necesthe 8 sary to protect our national security and to shield the privacy and American citizens from foreign intrusion. The Commission has received estimates that communist bloc intelligence forces currently number well over 500,000 worldwide. The number of communist government officials in the United States has tripled since 1960, and is still increasing. Nearly 2,000 of them are now in this country and a significant percentage of them have been identified as members of intelligence or security agencies. Conservative estimates for tlie number of unidentified intelligence officers rights of — among the remaining officials raise the level to over 40 percent. In addition to sending increasing numbers of their citizens to this country openly, many of whom have been trained in espionage, communist bloc countries also place considerable emphasis on the training, provision of false identification and dispatching of "illegal" agents that is, operatives for whom an alias identity has been systematically developed which enables them to live in the United States as Amicrican citizens or resident aliens without our knowledge of their — ti'ue origins. While making large-scale use of human intelligence sources, the communist counti'ies also appear to have developed electronic collection of intelligence to an extraordinary degree of technology and sophistication for use in the United States and elsewhere throughout the world, and we believe that these countries can monitor and record thousands of pVivate telephone conversations. Americans have a right to be uneasy if not seriously disturbed at the real possibility that their personal and business activities which they discuss freely over the telephone could be recorded and analyzed by agents of foreign powers. This raises the real specter that selected American users of telephones are potentially subject to blackmail that can seriously affect their actions, or even lead in some cases to recruitment as espionage agents. ; : Chapter 3 Summary of Findings y Conclusions, and Recommendations As by the President, the Commission has investigated the role and authority of the CIA, the adequacy of the internal controls and external supervision of the Agency, and its significant domestic activities that raise questions of compliance with the limits on its statutory authority. This chapter summarizes the findings and conclusions of the Commission and sets forth its recommendations. directed A. The Summary of Charges initial public chsbrges and Findings were that the CIA's domestic activities had involved 1. Large-scale spying on American citizens in the United States by the CIA, whose responsibility is foreign intelligence. 2. Keeping dossiers on large numbers of American citizens. 3. Aiming these activities at Americans who have expressed their disagreement with various government policies. These initial charges were subsequently supplemented by others including allegations that the CIA: —Had intercepted and opened personal mail in the United States for 20 years; —Had infiltrated domestic dissident groups and otherwise intervened in domestic politics —Had engaged in wiretaps and break-ins; and, — Had improperly assisted other government agencies. ' illegal In addition, assertions have been made ostensibly linking the CIA to the assassination of President John F. Kennedy. It became clear from the public reaction to these charges that the secrecy in which the Agency nesessarily operates, combined with the allegations of wrongdoing, had contributed to widespread public misunderstanding of the Agency's actual practices. (9) 10 A Commission that the great majority of the CIA's domestic activities comply with its detailed analysis of the facts has convinced the statutory authority. Nevertheless, over the 28 years of CIA has engaged in some activities that should be criticized and not permitted to happen again both in light of the limits imposed on the Agency by law and as a matter of public policy. Some of these activities were initiated or ordered by Presidents, its history, the — either directly or indirectly. Some them within the doubtful area between responsibilities delegated to the CIA by Congress and the National Security Council on the one hand and activities specifically prohibited to the Agency of fall on the other. Some them were plainly unlawful and constituted improper invasions upon the rights of Americans. of The Agency's own recent actions, undertaken for the most part in 1973 and 1974, have gone far to terminate the activities upon which this investigation has focused. The recommendations of the Commission are designed to clarify areas of doubt concerning the Agency's authority, to strengthen the Agency's structure, and to guard against recurrences of these improprieties. B. The CIA's Role and Authority (Chapters 4-6) Findings The Central Intelligence Agency was established by the National Security Act of 1947 as the nation's first comprehensive peacetime foreign intelligence service. The objective was to provide the President with coordinated intelligence, which the country lacked prior to the attack on Pearl Harbor. The Director of Central Intelligence reports directly to the President. The CIA receives its policy direction and guidance from the National Security Council, composed of the President, the Vice President, and the Secretaries of State and Defense. The intelligence CIA and disseminate obtained from United States intelligence agencies, and statute directs the to correlate, evaluate, perform such other functions related to intelligence as the National Security Council directs. Recognizing that the CIA would be dealing with sensitive, secret materials. Congress made the Director of Centi'al Intelligence responsible for protecting intelligence sources and methods from unauthorized disclosure. At the same time. Congress sought to assure the American public to 11 was not establishing a which would threaten the civil liberties of Americans. It specifically forbade the CIA from exercising "police, subpoena, or law-enforcement powers or internal security functions." The CIA w^as not to replace the Federal Bureau of that it secret police Investigation in conducting domestic activities to investigate crime or internal subversion. Altliough Congress contemplated that the focus of the CIA would be on foreign intelligence, it understood that some of its activities would be conducted within the United maintains States. The CIA necessarily headquarters here, procures logistical support, recruits and trains employees, tests equipment, and conducts other domestic activities in support of its foreign intelligence mission. It makes necessary investigations in the United States to maintain the security of its facilities its and personnel. has been understood from the beginning that the CIA is permitted to collect foreign intelligence that is, information concerning foreign capabilities, intentions, and activities from American citizens within this country by overt means. Determining the legal propriety of domestic activities of the CIA requires the application of the law to the particular facts involved. This task involves consideration of more than the National Security Act and the directives of the National Security Council Constitutional and other statutory provisions also circumscribe the domestic activities of the CIA. Among the applicable Constitutional provisions are the First Amendment, protecting freedom of speech, of the press, and of peaceable assembly; and the Fourth Amendment, prohibiting unAdditionally, it — — ; reasonable searches and seizures. Among the statutory provisions are those which limit such activities as electronic eavesdropping and interception of the mails. The visions precise scope of is many of these not easily stated. statutory and Constitutional pro- The National Security Act in particular was drafted in broad terms in order to provide flexibility for the CIA to adapt to changing intelligence needs. Such critical phrases as "internal security functions" are left undefined. The meaning of the Director's responsibility to protect intelligence sources and methods from unauthorized disclosure has also been a subject of uncertainty. The word "foreign" appears now^here in the statutory grant of authority, though it has always been understood that the CIA's mission is limited to matters related to foreign intelligence. This apparent statutory ambiguity, although not posing problems in practice, has troubled members of the public who read the statute without having the benefit of the legislative history from the National Security Council. and the instructions to the CIA 12 Conclusions The evidence within the scope of this inquiry does not indicate that fundamental rewriting of the National Security Act is either necessary or appropriate. The evidence does demonstrate the need for some statutory and ad- ministrative clarification of the role and function of the Agency. Ambiguities have been partially responsible for some, though not all, of the Agency's deviations within the United States from its assigned mission. In some cases, reasonable persons will differ as to the lawfulness of the activity ; in others, the absence of clear guidelines as to its authority deprived the Agency of sures to engage in activities which a means of now appear resisting pres- to us improper. Greater public awareness of the limits of the CIA's domestic authority would do much to reassure the American people. The requisite clarification can best be accomplished (a) through a specific amendment clarifying the National Security Act provision which delineates the permissible scope of CIA activities, as set forth in Kecommendation 1, and (b) through issuance of an Executive Order further limiting domestic activities of the CIA, as set forth in Recommendation 2. Recommendation (1) Section 403 of the National Security Act of 1947 should be amended in the form set forth in Appendix VI to this Report. These amendments, a. Make in summary, would: explicit that the CIA's activities must be related to foreign intelligence. 6. Clarify the responsibility of the CIA to protect intelligence sources and methods from unauthorized disclosure. (The Agency would be responsible for protecting against unauthorized disclosures within the CIA, and it would be responsible for providing guidance and technical assistance to other agency and department heads in protecting against unauthorized disclosures within their own agencies and departments.) c. Confirm publicly the CIA's existing authority to collect foreign intelligence from willing sources within the United States, and, except as specified by the President in a published Executive Order,^ prohibit the CIA from collection ef1 The Executive Order authorized by this statute should recogrnize that when the collection of foreign intelligence from persons who are not United States citizens results in the incidental acquisition of information from unknowing citizens, the Agency should be permitted to make appropriate use or disposition of such information. Such collection activities must be directed at foreign intelligence sources, and the involvement of American citizens must be incidental. ; 13 forts within the United States directed at securing foreign intelligence from unknowing American citizens. Recommendation (2) The President should by Executive Order prohibit the CIA from the collection of information about the domestic activities of United States citizens (whether by overt or covert means), the evaluation, correlation, and dissemination of analyses or reports about such activities, and the storage of such information, with exceptions for the following categories of persons or activities: Persons presently or formerly affiliated, or being considered for affiliation, with the CIA, directly or indirectly, or others who require clearance by the CIA to receive classified information; b. Persons or activities that pose a clear threat to CIA facilities or personnel, provided that proper coordination with the FBI is accomplished c. Persons suspected of espionage or other illegal activities relating to foreign intelligence, provided that proper coa. ordination with the FBI is accomplished. Information which is received incidental to appropriate CIA activities may be transmitted to an agency with appropriate jurisdiction, including law enforcement agencies. Collection of information from normal library sources such as newspapers, books, magazines and other such documents is not to be affected by this order. Information currently being maintained which is inconsistent with the order should be destroyed at the conclusion of the current congressional investigations or as soon thereafter as permitted by law. The CIA should periodically screen its files and eliminate all material inconsistent with the order. The order should be issued after consultation with the National Security Council, the Attorney General, and the Director of Central Intelligence. Any modification of the order would be permitted only through published amendments. d. C. Supervision 1. and Control of the CIA External Controls (Chapter 7) Findings The CIA is subject to supervision and control by various executive agencies and by the Congress. ; 14 Congress has established special procedures for review of the CIA and its secret budget within four small subcommittees.^ Historically, these subcommittees have been composed of members of Congress with many other demands on their time. The CIA has not as a general rule received detailed scrutiny by the Congress. The principal bodies within the Executive Branch performing a supervisory or control function are the National Security Council, which gives the CIA its policy direction and control the Office of Management and Budget, which reviews the CIA's budget in much tlie same fashion as it reviews budgets of other government agencies and the President's Foreign Intelligence Advisory Board, which is composed of distinguished citizens, serving part time in a general advisory function for the President on the quality of the gathering and interpretation of intelligence. ; None the of these agencies has the specific responsibility of overseeing CIA to determine The Depai'tment its power whether its activities are proper. of Justice also exercises an oversight role, through to initiate prosecutions for criminal misconduct. For a period of over 20 years, however, an agreement existed between the Depai-tment of Justice and the CIA providing that the Agency was to investigate allegations of crimes by CIA employees or agents which money or property or might involve operational security. If, following the investigation, the Agency determined that there was no reasonable basis to believe a crime had been committed, involved Government or that operational security aspects precluded prosecution, the case was not referred to the Department of Justice. The Connnission has found nothing ities, of its CIA by the agreement. The agreement, howinvolved the Agency directly in forbidden law enforcement activand represented an abdication by the Department of Justice abused the function given ever, to indicate that the it statutory responsibilities. Conclusions Some improvement in the congressional oversight system would be helpful. The problem of providing adequate oversight and control while maintaining essential security is not easily resolved. Several knowledgeable witnesses pointed to the Joint Committee on Atomic Energy as an appropriate model for congressional oversight of the Agency. That Committee has had an excellent record of providing effective oversight while avoiding breaches of security in a highly sensitive area. 2 Subcommittees of the Appropriations Committees and the Armed Services Committees two houses. of the 15 One CIA of the underlying causes of the problems confronting the arises out of the pervading atmosphere of secrecy in which its activities have been conducted in the past. One aspect of this has been the secrecy of the budget. A new body needed to provide oversight of the Agency within the Executive Branch. Because of the need to preserve security, the CIA is not subject to the usual constraints of audit, judicial review, publicity or open congressional budget review and oversight. Conis sequently, its operations require additional external control. thority assigned the job of supervising the The au- CIA must be given sufficient power and significance to assure the public of effective supervision. The situation whereby the Agency determined whether its own employees would be prosecuted must not be permitted to recur. Recommendation (3) The President should recommend to Congress the establishment of a Joint Committee on Intelligence to assume the oversight role currently played by the Recommendation Armed Services Committees.^ (4) Congress should give careful consideration to the question whether the budget of the CIA should not, at least to some extent, be made public, particularly in view of the provisions of Article I, Section 9, Clause 7 of the Constitution.^ Recommendation (5) a. The functions of the President's Foreign Intelligence Advisory Board should be expanded to include oversight of the CIA. This expanded oversight board should be composed of distinguished citizens with varying backgrounds and experience. It should be headed by a full-time chairman and should have a fulltime staff appropriate to its role. Its functions related to the CIA should include: 1. Assessing compliance by the CIA with its statutory authority. Assessing Assessing Assessing Assessing the quality of foreign intelligence collection. 3. the quality of foreign intelligence estimates. 4. the quality of the organization of the CIA. 5. the quality of the management of the CIA. 6. Making recommendations with respect to the above subjects to the President and the Director of Central Intelligence, and, where appropriate, the Attorney General. 2. See statement by Commissioner Griswold, Chapter 7. "No Money shall be drawn from the Treasury, bnt in Consequence of Appropriations made by Law; and a regrnlar Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time." 3 * 16 The Board should have access to all information in the CIA. It should be authorized to audit and investigate CIA expenditures and activities on its own initiative. c. The Inspector General of the CIA should be authorized to b. report directly to the Board, after having notified the Director of Central Intelligence, in cases he deems appropriate. Recommendation (6) The Department of Justice and the CIA should establish written guidelines for the handling of reports of criminal violations by employees of the Agency or relating to its affairs. These guidelines should require that the criminal investigation and the decision whether to prosecute be made by the Department of Justice, after consideration of Agency views regarding the impact of prosecution on the national security. The Agency should be permitted to conduct such investigations as requires to determine whether its operations have been jeopardized. The Ageny should scrupulously avoid exercise of the prosecutorial function. 2, it Internal Controls (Chapter 8) Findings The Director's duties in administering the intelligence community, handling relations with other components of the government, and passing on broad questions of policy leave him little time for day-today supervision of the Agency. Past studies have noted the need for the Director to delegate greater responsibility for the administration of the Agency to the Deputy Director of Central Intelligence. In recent years, the position of Deputy Director has been occupied by a high-ranking military officer, with responsibilities for maintaining liaison with the Department of Defense, fostering the Agency's relationship with the military services, and providing top CIA management with necessary experience and skill in understanding particular intelligence requirements of the military. Generally speaking, the Deputy Directors of Central Intelligence have not been heavily engaged in administration of the Agency. Each of the four directorates within the CIA Operations, Intelligence, Administration, and Science and Technology is headed by a deputy director who reports to the Director and Deputy Director of Central Intelligence. These four deputies, together with certain other top Agency officials such as the Comptroller, form the Agency Management Committee, which makes many of the administrative and management decisions affecting more than one directorate. — — 17 Outside the chain of command, the primary internal mechanism for keeping the Agency within bounds is the Inspector General. The size of this office was recently sharply reduced, and its previous practice making regular reviews of various Agency departments was terminated. At the present time, the activities of the office are almost entirely concerned with coordinating Agency responses to the various investigating bodies, and with various types of employee grievances. The Office of General Counsel has on occasion played an important role in preventing or terminating Agency activities in violaof tion of law, but many of the questionable or unlawful activities dis- cussed in this report were not brought to the attention of this office. A attor- certain parochialism may have resulted from the fact that neys in the office have little or no legal experience outside the Agency. It is important that the Agency receive the best possible legal advice on the often difficult and unusual situations which confront it. Conclusions In the final analysis, the proper functioning of the Agency must depend in large part on the character of the Director of Central Intelligence. The best assurance against misuse of the Agency lies in the appointment to that position of persons with the judgment, courage, and improper pressure and importuning, whether from the White House, within the Agency or elsewhere. Compartmentation within the Agency, although certainly appropriate for security reasons, has sometimes been carried to extremes which prevent proper supervision and control. The Agency must rely on the discipline and integrity of the men and women it employs. Many of the activities we have found to be improper or unlawful were in fact questioned by lower-level employees. Bringing such situations to the attention of upper levels of management is one of the purposes of a system of internal controls. independence to resist Recommendation (7) Persons appointed to the position of Director of Central Intelligence should be individuals of stature, independence, and integrity. In making this appointment, consideration should be given to individuals from outside the career service of the CIA, although promotion from within should not be barred. Experience in intelligence service is not necessarily a prerequisite for a. the position ; management and administrative skills are at least as important as the technical expertise which can always be found in an able deputy. b. Although the Director serves at the pleasure of the President, no Director should serve in that position for more than 10 years. 1« I Recommendation (8) a. The Office of Deputy Director of Central Intelligence should be reconstituted to provide for two such deputies, in addition to the four heads of the Agency's directorates. One deputy would act as the administrative officer, freeing the Director from day-today management duties. The other deputy should be a military serving the functions of fostering relations with the military and providing the Agency with technical expertise on military intelligence requirements. b. The advice and consent of the Senate should be required for the appointment of each Deputy Director of Central Intelligence. officer, Recommendation (9) a. The Inspector General should be upgraded i to a status equiva- deputy directors in charge of the four directorates within the CIA. b. The Office of Inspector General should be staffed by outstanding, experienced officers from both inside and outside the CIA, with ability to understand the various branches of the Agency. c. The Inspector General's duties with respect to domestic CIA activities should include periodic reviews of all offices within the United States. He should examine each office for compliance with CIA authority and regulations as well as for the effectiveness of their programs in implementing policy objectives. d. The Inspector General should investigate all reports from employees concerning possible violations of the CIA statute. e. The Inspector General should be given complete access to all information in the CIA relevant to his reviews. lent to that of the f. An staff, effective Inspector General's office will require a larger more frequent reviews, and highly qualified personnel. Inspector General reports should be provided to the National Security Council and the recommended executive oversight body. The Inspector General should have the authority, when he deems it appropriate, after notifying the Director of Central Intelligence, to consult with the executive oversight body on any CIA g. activity (see Recommendation 5). Recommendation (10) a. The Director should review the composition and operation of the Office of General Counsel and the degree to which this office is consulted to determine whether the Agency is receiving adequate legal assistance and representation in view of current requirements. b. Consideration should be given to measures which would strengthen the office's professional capabilities and resources including, among other things, (1) occasionally departing from the , : 19 existing practice of hiring lawyers from within the Agency to bring in seasoned lawyers from private practice as well as to hire law school graduates without prior CIA experience; (2) occasionally assigning Agency lawyers to serve a tour of duty elsewhere in the government to expand their experience; (3) encouraging lawyers to participate in outside professional activities. Recommendation (11) To a degree consistent with the need for CIA movement security, the should be encouraged to provide for increased lateral of personnel among the directorates and to bring persons with outside experience into the Agency at all levels. Recommendation a. (12) The Agency should issue detailed guidelines for its em- ployees further specifying those activities within the United States which are permitted and those which are prohibited by statute, Executive Orders, and NSC and DCI directives. b. These guidelines should also set forth the standards which govern CIA activities and the general types of activities which are permitted and prohibited. They should, among other things, specify that Clandestine collection of intelligence directed against United States citizens is prohibited except as specifically permitted by law or published Executive Order. Unlawful methods or activities are prohibited. Prior approval of the DCI shall be required for any activities which may raise questions of compliance with the — — — law or with Agency regulations. c. The guidelines should also provide that employees with information on possibly improper activities are to bring it promptly to the attention of the Director of Central Intelligence or the Inspector General. D. Significant Areas of Investigation Introduction Domestic activities of the CIA raising substantial questions of compliance with the law have been closely examined by the Commission to determine the context in which they were performed, the pressures of the times, the relationship of the activity to the Agency's foreign intelligence assignment and to other CIA activities, the procedures 20 ! used to authorize and conduct the activity, and the extent and effect of the activity. In describing and assessing each such activity, it has been necessary to consider both that activity's relationship to the legitimate national security needs of the nation and the threat such activities might pose to individual rights of Americans and to a society founded on the need for government, as well as private citizens, to obey the law. The CIA's Mail Intercepts (Chapter 9) 7. Findings At the time the CIA came into being, one of the highest national was to gain an understanding of the Soviet Union and its worldwide activities affecting our national security. In this context, the CIA began in 1952 a program of surveying mail between the United States and the Soviet Union as it passed through a New York postal facility. In 1953 it began opening some of this mail. The program was expanded over the following two decades and ultimately involved the opening of many letters and the analysis of envelopes, or "covers," of a great many more letters. The New York mail intercept was designed to attempt to identify persons within the United States who were cooperating with the Soviet Union and its intelligence forces to liarm the United States. It was also intended to determine technical communications procedures and mail censorship techniques used by the Soviets. The Director of the Central Intelligence Agency approved commencement of the New York mail intercept in 1952. During the enintelligence priorities suing years, so far as the record shows. Postmasters General Summerfield, Day, and Blount were informed of the program in varying degrees, as was Attorney General Mitchell. Since 1958, the FBI was aware of this program and received 57,000 items from it. 1962 CIA memorandum indicates the Agency was aware that the mail openings would be viewed as violating federal criminal laws pro- A hibiting obstruction or delay of the mails. year before the termination of this program, out of 4,350,000 items of mail sent to and from the Soviet Union, the New York intercept examined the outside of 2,300,000 of these items, In the last photographed 33,000 envelopes, and opened 8,700. The mail intercept was terminated in 1973 when the Chief Postal Inspector refused to allow its continuation without an up-to-date highlevel approval. The CIA in also ran much smaller mail intercepts for brief periods San Francisco between 1969 and 1971 and in the territory of Hawaii ' 21 during 1054 and 1955. For a short period in 1957, mail in transit between foreign countries was intercepted in NeAv Orleans. Conclusions While in operation, the CIA's domestic mail opening programs United States statutes Avere unlawful. specifically forbid opening the mail. The mail openings under the Fourth Amendment guarantees against unreasonable search, and the scope of the New York project poses possible difficulties with the First Amendment rights of speech and press. Mail cover operations (examining and copying of envelopes only) are legal when carried out in compliance with postal regulations on a limited and selective basis involving matters of national security. The New York mail intercept did not meet these criteria. The nature and degree of assistance given by the CIA to the FBI in the New York mail project indicate that the CIA's primary purpose eventually became participation with the FBI in internal security functions. Accordingly, the CIA's participation was prohibited under also raise Constitutional questions the National Security Act. Recommendation a. (13) The President should instruct the Director of Central CIA In- not to engage again in domestic mail openings except with express statutory authority in time of war. (See also Recommendation 23.) b. The President should instruct the Director of Central Intelligence that mail cover examinations are to be in compliance with postal regulations; they are to be undertaken only in furtherance of the CIA's legitimate activities and then only on a limited and selected basis clearly involving matters of national security. telligence that the 2, Intelligence is Community Coordination (Chapter 10) Findings As a result of growing domestic disorder, the Department of starting in 1967 at the direction of Attorney General Justice, Ramsey Clark, coordinated a series of secret imits and interagency groups in an effort to collate and evaluate intelligence relating to these events. These continued until 1973. The interagency committees were designed for analytic and not efforts 22 operational purposes. They were created as a result of White House pressure which began in 1967, because the FBI performed only limited evaluation and analysis of the information it collected on these The CIA's participation was to supply relevant foreign intelligence and to furnish advice on evaluation events. stated purpose of techniques. The CIA was reluctant to become unduly involved in these commitwhich had problems of domestic unrest as their principal focus. It repeatedly refused to assign full-time personnel to any of them. The most active of the committees was the Intelligence Evaluation Staff, which met from January 1971 to May 1973. A CIA liaison officer * attended over 100 weekly meetings of the Staff, some of which concerned drafts of reports which had no foreign aspects. With the exception of one instance, there is no evidence that he acted in any capacity other than as an adviser on foreign intelligence, and, to some degree, as an editor. On one occasion the CIA liaison officer appears to have caused a CIA agent to gather domestic information which was reported to the tees, Intelligence Evaluation Staff. The Commission found no evidence of other activities by the CIA that were conducted on behalf of the Department of Justice groups except for the supplying of appropriate foreign intelligence and advice on evaluation techniques. Conclusions The statutory prohibition on internal security functions does not preclude the CIA from providing foreign intelligence or advice on evaluation techniques to interdepartmental intelligence evaluation organizations having some domestic aspects. The statute was intended to i)romote coordination, not compartmentation of intelligence between governmental departments. The attendance of the CIA liaison officer at over 100 meetings of the Intelligence Evaluation Staff, some of them concerned wholly with domestic matters, nevertheless created at least the appearance of impropriety. The Director of Central Intelligence was well advised to approach such participation reluctantly. The liaison officer acted improperly in the one instance in which he directed an agent to gather domestic information within the United States which was reported to the Intelligence Evaluation Staff'. * The tion was Chief of the CIA's Special Operations Group which ran Operadiscussed in Chapter 11 of this Report. liaison officer CHAOS, 23 Much of the problem stemmed from the absence government in of any organization capable of adequately analyzing intelligence collected by the FBI on matters outside the purview of CIA. Recommendation (14) A capability should be developed within the FBI, or elsewhere in the Department of Justice, to evaluate, analyze, and coordinate intelligence and counterintelligence collected by the FBI a. concerning espionage, terrorism, and other related matters of in- ternal security. b. The CIA should any restrict its participation in joint intelli- gence committees to foreign intelligence matters. c. The FBI should be encouraged to continue to look to the CIA for such foreign intelligence and counter-intelligence as is relevant to FBI needs. Operations (Chapter 11) Special 3, Group —**Operation CHAOS" Findings The marked by widespread violence and civil disorders."' Demonstrations, marches and protest assemblies were frequent in a number of cities. Many universities and college campuses became places of disruption and unrest. Government facilities were picketed and sometimes invaded. Threats of bombing and bombing incidents occurred frequently. In Washington and other major cities, special security measures had to be instituted to control late 1960's and early 1970's were the access to public buildings. Responding to Presidential requests made domestic disorder, the Director of Central Intelligence in established a Special Operations ordinate, evaluate growing August 1967 in the face of Group within the CIA to collect, co- and report on the extent of foreign influence on domestic dissidence. The Group's activities, which CHAOS, led the CIA to collect from CIA field stations overseas later came to be known as Operation information on dissident Americans and from the FBI. Although the stated purpose of the Operation was to determine whether there were any foreign contacts with American dissident groups, it resulted in the accumulation of considerable material on domestic dissidents and their activities. During six years, the Operation compiled some 13,000 different files, including files on 7,200 American citizens. The documents in these files and related materials included the names of more than 300,000 persons and organizations, which were entered into a computerized index. ^ See Appendix V. 24 This information was kept closely guarded within the CIA. Using this information, personnel of the Group prepared 3,500 memoranda for internal use 37 memoianda officials in The ; 3,000 memoranda for dissemination to the for distribution to AAliite FBI and House and other top ; level the government. assigned to the Operation was steadily enlarged in response to repeated Presidential requests for additional information, ultistaff matelv reaching a maximum of 52 in 1971. Because of excessive isolation. the Operation was substantially insulated from meaningful review within the Agency, including review by the Counterintelligence Staff of which the Operation was technically a part. Commencing in late 1969, Operation CHAOS used a number of agents to collect intelligence abroad on any foreign connections with American dissident groups. In order to have sufficient "cover" for these agents, the Operation recruited persons from domestic dissident groups or recruited others and instructed them to associate with such groups in this country. Most of the Operation's recruits were not directed to collect information domestically on American dissidents. On a number of occasions, however, such information was reported by the recruits while they were developing dissident credentials in the United States, and the information was retained in the files of the Operation. On three occasions, an agent of the Operation was specifically directed to collect domestic intelligence. No evidence was found that any Operation CHAOS agent used or was directed by the Agency to use electronic surveillance, wiretaps or break-ins in the United States against any dissident individual or group. Activity of the Operation decreased substantially by mid-1972. The Operation was formally terminated in March 1974. — Conclusions Some domestic activities of Operation CHAOS unlawfully exceeded the CIA's statutory authority, even though the declared mission of gathering intelligence abroad as to foreign influence on domestic dissident activities was proper. Operation became a repository for large quantities of information on the domestic activities of American citizens. This information was derived principally from FBI reports or Most significantly, the fi'om overt sources and much of it and not from clandestine was not of foreign connections. collection by the CIA, directly related to the question of the existence 25 was probably necessary for the CIA to accumulate an information base on domestic dissident activities in order to assess fairly whether the activities had foreign connections. The FBI would collect information but would not evaluate it. But the accumulation of domestic data in the Operation exceeded what was reasonably required to make such an assessment and was thus improper. It The use of agents of the Operation on three occasions to gather information within the United States on strictly domestic m.atters was beyond the CIA's authority. In addition the intelligence disseminations and those portions of a major study prepared by the Agency which dealt with purely domestic matters were improper. The isolation of Operation CHAOS within the CIA and its inde- pendence from supervisivju by the regular chain of the clandestine service made it command within possible for the activities of the Opera- bounds of the Agency's authority without the knowledge of senior officials. The absence of any regular review of tion to stray over the these activities prevented timely correction of such missteps as did occur. Recommendation (15) Presidents should refrain from directing the CIA to perform what are essentially internal security tasks. b. The CIA should resist any efforts, whatever their origin, to involve it again in such improper activities. c. The Agency should guard against allowing any component a. Operations Group) to become so self-contained and isolated from top leadership that regular supervision and review are lost. d. The files of the CHAOS project which have no foreign intelligence value should be destroyed by the Agency at the conclusion of the current congressional investigations, or as soon thereafter as permitted by law. (like the Special 4, Protection of the Agency Against Threats of Violence —Office of Security (Chapter 12) Findings The CIA was not immune from the threats of violence and disrup- tion during the period of domestic unrest between 1967 Office of Security was charged throughout this period and 1972. The with the respon- ensuring the continued functioning of the CIA. The Office therefore, from 1967 to 1970, had its field officers collect information from published materials, law enforcement authorities, sibility of 26 other agencies and college officials before recruiters were sent to some campuses. Monitoring and communications support was provided to when trouble was expected. The Office was also responsible, with the approval of the Director of Central Intelligence, for a program from February 1967 to Derecruiters cember 1968, which at first monitored, but later infiltrated, dissident organizations in the Washington, D.C., area to determine if the groups planned any activities against CIA or other government installations. At no time were more than 12 persons performing these tasks, and they performed them on a part-time basis. The project was terminated when the Washington Metropolitan Police Department developed its own intelligence capability. In December, 1967, the Office began a continuing study of dissident activity in the United States, using information from published and other voluntary knowledgeable sources. The Office produced weekly Situation Information Reports analyzing dissident activities and providing calendars of future events. Calendars were given to the Secret Service, but the CIA made no other disseminations outside the Agency. About 500 to 800 files were maintained on dissenting organizations and individuals. Thousands of names in the files were indexed. Report publication was ended in late 1972, and the entire project was ended in 1973. Conclusions The program under which the Office of Security rendered assistance to Agency recruiters on college campuses was justified as an exercise of the Agency's responsibility to protect its own personnel and operations. Such support were not undertaken for the puror operations of other governmental activities pose of protecting the facilities agencies, or to maintain public order or enforce laws. The Agency should not [)urposes unless there is infiltrate a dissident group for security Agency installations, opera- a clear danger to and investigative coverage of the threat by the FBI and local law enforcement authorities is inadequate. The Agency's infiltration of dissident groups in the Washington area went far beyond steps necessary to protect the Agency's own facilities, personnel and operations, and therefore exceeded the CIA's statutory tions or personnel, authority. In addition, the Agency undertook to protect other government departments and agencies a police function prohibited to it by statute. Intelligence activity directed toward learning from what sources a domestic dissident group receives its financial support within the — 27 United States, and how much income it has, is no part of the authorized security operations of the Agency. Neither is it the function of the Agency to compile records on who attends peaceful meetings of such dissident groups, or what each speaker has to say (unless it relates to iiisruptive or violent activity which may be directed against the Agency). The Agency's actions in contributing funds, photographing people, activities and cars, and following people home were unreasonable under the circumstances and therefore exceeded the CIA's authority. With certain exceptions, the program under which the Office of Security (without infiltration) gathered, organized and analyzed information about dissident groups for purposes of security was within the CIA's authority. The accumulation of reference files on dissident organizations and their leaders was appropriate both to evaluate the risks posed to the Agency and to develop an understanding of dissident groups and their differences for security clearance purposes. But the accumulation of information on domestic activities went beyond what was required by the Agency's legitimate security needs and therefore exceeded the CIA'S authority. I Recommendation (16) The CIA should not infiltrate dissident groups or other organizations of Americans in the absence of a written determination by the Director of Central Intelligence that such action is necessary to meet a clear danger to Agency facilities, operations, or personnel and that adequate coverage by law enforcement agencies is unavailable. Recommendation (17) on individuals accumulated by the Office of Security in the program relating to dissidents should be identified, and, except where necessary for a legitimate foreign intelligence activity, be destroyed at the conclusion of the current congressional investigations, or as soon thereafter as permitted by law. All 5. files Other Investigations by the Office of Security (Chapter 13) A. Security Clearance Investig^ations of Prospective Employees and Operatives Findings and Conclusions The conducts standard security investigations of persons seeking affiliation with the Agency. In doing so, the Office of Security routinely 28 Office is performing the necessary function of screening pereons to whom it will make available classified information. Such investigations are necessary, and no improprieties were found in connection with them. B. Investigations of Possible Breaches of Security 1. Persons Investigated Findings The Office of Security has been called upon on a number of occasions to investigate specific allegations that intelligence sources and methods were threatened by unauthorized disclosures. The Commission's inquiry concentrated on those investigations which used investigative means intruding on the privacy of the subjects, including physical and electronic surveillance, unauthorized entry, mail covers and intercepts, and reviews of individual federal tax The returns. large majority of these investigations were directed at persons affiliated with the Agency —such as employees, former employees, and defectors and other foreign nationals used by the Agency as intelli- gence sources. A few investigations involving intrusions on personal privacy were directed at subjects with no relationship to the Agency. The Commission has found no evidence that any such investigations were directed against any congressman, judge, or other public official. Five were directed against newsmen, in an efl'ort to determine their sources of leaked classified information, and nine were directed against other United States citizens. The CIA's investigations of newsmen to determine their sources of classified information stemmed from pressures from the White House and were partly a result of the FBI's unwillingness to undertake such investigations. The FBI refused to proceed without an advance opinion that the Justice Department would prosecute if a case were developed. Conclusions Investigations of allegations against Agency employees and opera- tives are a reasonable exercise of the Dii-ector's statutory tect intelligence sources duty to pro- and methods from unauthorized disclosure if Such investigations also as- the investigations are lawfully conducted. the Director in the exercise of his unreviewable authority to terminate the employment of any Agency employee. They are proper unless sist 29 their principal purpose becomes law-enforcement or the maintenance of internal security. The and permit investigations of persons having Director's responsibility to protect intelligence sources methods is not so broad as to no relationship whatever with the Agency. The CIA has no authority to investigate newsmen simply because they have published leaked classified information. Investigations by the CIA should be limited to persons presently or formerly affiliated with the Agency, directly or indirectly. Recommendation (18) a. The Director of Central Intelligence should lines setting forth the situations in conducting its own issue clear guide- which the CIA is justified in investigation of individuals presently or for- merly affiliated with it. The guidelines should permit the CIA to conduct investigations of such persons only when the Director of Central Intellib. gence determines that the investigation is necessary to protect intelligence sources and methods the disclosure of which might endanger the national security. c. Such investigations must be coordinated with the FBI whenever substantial evidence suggesting espionage or violation of first a federal criminal statute Recommendation is discovered. (19) In cases involving serious or continuing security violations, as determined by the Security Committee of the United States Intelligence Board, the Committee should be authorized to recommend in writing to the Director of Central Intelligence (with a. a copy to the National Security Council) that the case be referred to the FBI for further investigation, under procedures to be developed by the Attorney General. b. These procedures should include a requirement that the FBI accept such referrals without regard to whether a favorable prosecutive opinion is issued by the Justice Department. The CIA should not engage in such further investigations. Recommendation (20) The CIA and other components and agencies of the intelligence community should conduct periodic reviews of all classified material originating within those departments or agencies, with a view to declassifying as much of that material as possible. The purpose of such review would be to assure the public that it has access to all information that should properly be disclosed. Recommendation (21) The Commission endorses legislation, drafted with appropriate 30 safeguards of the constitutional rights of all affected individuals, which would make it a criminal offense for employees or former employees of the CIA wilfully to divulge to any unauthorized person classified information pertaining to foreign intelligence or the collection thereof obtained during the course of their employment. 2. Investigative Techniques Findings Even an must be conducted by lawful means. Some of the past investigations by the Office of Security within the United States were conducted by means which were invalid at the time. Others might have been lawful when conducted, but would be impermissible today. Some investigation within the CIA's authority investigations involved physical surveillance of the indi- viduals concerned, possibly in conjunction with other methods of in- The vestigation. last instance of pliysical surveillance by the Agency within the United States occurred in 1973. The investigation disclosed the domestic use of 32 wiretaps, the last in 1965 32 instances of bugging, the last in 1968 and 12 break-ins, the last in 1971. None of these activities was conducted under a judicial warrant, and only one with the written approval of the Attorney ; ; General. Information from the income tax records of 16 persons was obtained from the Internal Revenue Service by the CIA in order to help determine whether the taxpayer was a security risk with possible connections to foreign groups. The CIA did not employ the existing statutory and regulatory procedures for obtaining such records from the IRS. In 91 instances, mail covers (the photographing of the front and back of an envelope) were employed, and in 12 instances letters were intercepted The and opened. CIA such that it is often difficult to determine why the investigation occurred in the first place, who authorized the special coverage, and what the results were. Although there was testimony that these activities were frequently known state of the records on these activities to the Director of Central Intelligence Attorney General, the files is and sometimes to the often are insufficient to confirm such information. Conclusions The not unlawful unless it reaches unauthorized entries described were use of physical surveillance the point of harassment. The is 31 illegal when conducted and would be illegal if conducted today. Like- wise, the review of individuals' federal tax returns ception and opening of mail violated specific and the interstatutes and regulations prohibiting such conduct. Since the constitutional and statutory constraints applicable to the use of electronic eavesdropping (bugs and wiretaps) have been evolving over the years, the Commission deems it impractical to apply those changing standards on a case-by-case basis. The Commission does believe that while some of the instances of electronic eavesdropping were proper when conducted, many were not. To be lawful today, such activities would require at least the written approval of the Attorney General on the basis of a finding that the national security is involved and that the case has significant foreign connections. Recommendation (22) The CIA should not undertake physical surveillance (defined as systematic observation) of Agency employees, contractors or related personnel within the United States without first obtaining written approval of the Director of Central Intelligence. Recommendation (23) In the United States and its possessions, the CIA should not intercept wire or oral communications or otherwise engage in activities that would require a warrant if conducted by a law enforcement agency. Responsibility for such activities belongs with '' the FBI. Recommendation (24) The CIA should strictly adhere to established legal procedures governing access to federal income tax information. Recommendation CIA (25) show that each investigation was duly authorized, and by whom, and should clearly set forth the factual basis for undertaking the investigation and the results investigation records should of the investigation. C. Handling of Defectors Findings The sons 6 charged with providing security for perhave defected to the United States. Generally a defector Office of Security is who As defined In the Omnibus Crime Control and Safe Streets Act, 18 U.S.C. Sees. 2510-20. 32 can be processed and placed into society in a few months, but one de- was involuntarily confined at a CIA installation for three years. He was held in solitary confinement under spartan living conditions. fector The CIA maintained the long confinement because of doubts about was approved by the Director of Central Intelligence and the FBI, Attorney General, United States Intelligence Board and selected members of Congress were aware to some extent of the confinement. In one other case a defector was physically abused the Director of Central Intelligence discharged the employee involved. the bona fides of the defector. This confinement ; ; Conclusions Such treatment of individuals by an agency of the United States is unlawful. The Director of Central Intelligence and the Inspector General must be alert to prevent repetitions. 6. Involvement of the CIA in Improper Activities for the White House (Chapter 14) Findings During members of the White House documents and disguise material, a 1971, at the request of various CIA provided alias tape recorder, camera, film and film processing to E. Howard Hunt. It also prepared a psychological profile of Dr. Daniel Ellsberg. Some of this equipment was later used without the knowledge of the CIA in connection with various improper activities, including staff, the the entry into the Some members office of Dr. Lewis Fielding, Ellsberg's psychiatrist. of the CIA's medical staff who participated in the preparation of the Ellsberg profile knew that one of to support a public attack on Ellsberg. Except for vestigation has disclosed no evidence that the son to know that the assistance it its purposes was this fact, the in- CIA knew or had rea- gave would be used for improper purposes. President Nixon and his staff also insisted in this period that the CIA turn over to the President highly classified files relating to the Lebanon landings, the Bay of Pigs, the Cuban missile crisis, and the Vietnam War. The request was made on the ground that these files were needed by the President in the performance of his duties, but the record shows the purpose, undisclosed to the CIA, was to serve the President's personal political ends. The Commission has also investigated the response of the CIA 33 Beginning in June 1972, the CIA received various requests for information and assistance in connection with these investigations. In a number of instances, its responses were either incomplete or delayed and some materials that may or may not have contained relevant information were destroyed. The Commission feels that this conduct reflects poor judgment on the part of the CIA, but it has found no evidence that the CIA participated in the Watergate break-in or in the post-Watergate cover-up by the White House. to the investigations following the Watergate arrests. Conclusions Providing the assistance requested by the White House, including the alias and disguise materials, the camera and the psychological profile on Ellsberg, was not related to the performance by the Agency authorized intelligence functions and was therefore improper. No evidence has been disclosed, however, except as noted in connection with the Ellsberg profile, that the CIA knew or had reason of its to know that activities. its assistance would be used Nor has any evidence been in connection with improper disclosed indicating that the CIA participated in the planning or cari-ying out of either the Fielding or Watergate break-ins. The CIA apparently was unaware of the break-ins until they were reported in the media. The record does show, however, that individuals in the Agency comply with the normal control procedures in providing assistance to E. Howard Hunt. It also shows that the Agency's failure to cooperate fully with ongoing investigations following Watergate was inconsistent with its obligations. Finally, the Commission concludes that the requests for assistance by the White House reflect a pattern for actual and attempted misuse of the CIA by the Nixon administration. failed to Recommendation (26) a. A single and exclusive high-level channel should be established for transmission of all White House staff requests to the CIA. This channel should run between an officer of the National Security Council staff designated by the President and the office of the Director or his Deputy. b. All Agency officers and employees should be instructed that any direction or request reaching them directly and out of regularly established channels should be immediately reported to the Director of Central Intelligence. 34 7. Domestic Activities of the Directorate of Operations (Chapter 15) Findings and Conclusions In support of its responsibility for the collection of foreign intelligence and conduct of covert operations overseas, the CIA's Directorate of Operations engages in a variety of activities within the United States. A. Overt Collection of Foreign Intelligence within the United States One division of the Directorate of Operations collects foreign intel- ligence within the United States from residents, business firms, other organizations willing to assist the Agency. This activity ducted openly by officers who CIA identify themselves as is and con- employees. Such sources of information are not comi^ensated. In connection with these collection activities, the CIA maintains approximately 50,000 active files which include details of the CIA's relationships with these voluntary sources and the results of a federal agency name check. The have been almost exclusively confined to foreign economic, political, military, and operational topics. Commencing in 1969, however, some activities of the division resulted in the collection of limited information with respect to American dissidents and dissident groups. Although the focus was on foreign contacts of these groups, background information on domestic dissidents was also collected. Between 1969 and 1974. when this activity was formallv terminated. 400 reports were made to Operation division's collection efforts CHAOS. In 1972 and 1973. the division obtained and transmitted, to other parts of the CIA, information about telephone calls between the Western Hemisphere (including the United States) and two other countries. The information was limited to names, telephone numbers, and locations of callers and recipients. It did not include the content of the conversations. Tliis division also occasionally receives reports activity within the concerning criminal United States. Pursuant to written regulations, the source or a report of the information received is referred to the appropriate law enforcement agency. The CIA's efforts to collect foreign intelligence from residents of the United States willing to assist the CIA are a valid and necessary element of its responsibility. Not only do these persons provide 35 a large reservoir of foreign intelligence; they are by far the most accessible source of such information. The division's files on American citizens and firms representing actual or potential sources of information constitute a necessary part of its legitimate intelligence activities. They do not appear to be communication of derogatoiy. embarrassing, or sensitive information about American citizens. The division's efforts, with few exceptions, have been confined to vehicles for the collection or legitimate topics. The American dissident groups exceeded legitimate foreign intelligence collection and was beyond the proper scope of CIA activity. This impropriety was recognized in some of the division's own memoranda. The Commission was unable to discover any specific purpose for the collection of telephone toll call information or any use of that information by the Agency. In the absence of a valid purpose, such collection of information with respect to collection is improper. B. Provision CIA and Control of Cover for CIA Personnel personnel engaged in clandestine foreign intelligence activities cannot travel, live or perform their duties openly as Agency employees. Accordingly, virtually all CIA personnel serving abroad and many in the United States assume a "cover*' as employees of another government agency or of a commercial enterprise. CIA involvement in certain activities, such as research and development projects, are also sometimes conducted under cover. CIA's cover arrangements are essential to the CIA's performance of its foreign intelligence mission. The investigation has disclosed no instances in which domestic aspects of the CIAs cover arrangements involved any violations of law. By definition, however, cover necessitates an element of deception which must be practiced within the United States as well as within foreign countries. This creates a risk of conflict with various regulatory statutes and other legal requirements. The Agency recognizes this risk. It has installed controls under which cover arrangements are closely supervised to attempt to ensure compliance with applicable laws. C. Operating Proprietary The CIA Companies and perform the Agenc}-. Most of the uses proprietary companies to provide cover administrative tasks without attribution to large operating proprietaries — primarily airlines —have been liqui- 36 dated, and the remainder engage in activities offering competition to private enterprise. The only remaining large proprietary activity is a little or no complex of fi- nancial companies, with assets of approximately $20 million, that enable the Agency to administer certain sensitive trusts, annuities, escrows, insurance arrangements, and other benefits and payments provided to officers or contract employees without attribution to CIA. The remaining small operating pi'oprietarics, generally having fewer than ten employees each, make nonattributable purchases of equip- ment and Except supplies. as discussed in connection witli the Office of Security (see Chapters 12 and 13), tlie Commission has found no evidence that any proprietaries have been used for operations against American citizens or investigation of their activities. All of them appear to be subject to close supervision and multiple financial controls within the Agency. D. Development of Contacts With Foreign Nationals In connection with the CIA's foreign intelligence responsibilities, it seeks to develop contacts with foreign nationals within the United States. American citizens voluntarily assist in developing these contacts. As far as the Commission can find, these activities have not involved coercive methods. These activities appear to be directed entirely to the production of foreign intelligence and to be within the authority of the CIA. We found no evidence that any of these activities have been directed against American citizens. E. Assistance in Narcotics Control The Directorate of Operations provides foreign intelligence sup- port to the government's eft'orts to control the flow of narcotics and other dangerous drugs into this country. The CIA coordinates clandes- and provides other government agencies with foreign intelligence on drug traffic. From the beginning of such efi'orts in 1969, the CIA Director and other officials have instructed employees to make no attempt to gather information on Americans allegedly trafficking in drugs. If such information is obtained incidentally, it is transmitted to law enforcement agencies. Concerns that the CIA's narcotics-related intelligence activities may tine intelligence collection overseas Agency in law^ enforcement or other against American citizens thus appear unwarranted. involve the actions directed 37 Beginniiio- in the fall of 1973, the Directorate monitored conver- United States and Latin America in an eflfort to months after the program began, the General Counsel of the CIA was consulted. He issued an opinion that the program was illegal, and it was immediately terminated. This monitoring, although a source of valuable information for enforcement officials, was a violation of a statute of the United States. sations between the identify narcotics traffickers. Three Continuation of the operation for over three months without the knowledge of the Office of the General Counsel demonstrates the need for improved internal consultation. (See Recommendation 10.) 8. Domestic Activities of the Directorate of Science and Technology (Chapter 16) Findings and Conclusions The CIA's Directorate of Science and Technology performs a variety of research and development and operational support functions for the Agency's foreign intelligence mission. Many of these activities are performed in the United States and involve cooperation with private companies. A few of these activities were improper or questionable. I As part of a program to test the influence of drugs on humans, research included the administration of LSD to persons w4io were un- This was clearly illegal. One person died in 1953, apparently as a result. In 1963, following the Inspector GoneraPs discovery of these events, new stringent criteria were issued prohibiting drug testing by the CIA on unknowing persons. All drug testing programs were ended in 1967. In the process of testing monitoring equipment for use overseas, the CIA has overheard conversations between Americans. The names of the speakers were not identified the contents of the conversations were not disseminated. All recordings were destroyed when testing was concluded. Such testing should not be directed against unsuspecting persons in the United States. Most of the testing undertaken by the Agency could easily have been performed using only Agency personnel and with the full knowledge of those whose conversations were being recorded. This is the present Agency practice. Other activities of this Directorate include the manufacture of alias credentials for use by CIA employees and agents. Alias credentials are necessary to facilitate CIA clandestine operations, but the strictest controls and accountability must be maintained over the use of such aware that they were being I ; I tested. ; 38 I documents. Recent guidelines established by the Deputy Director for* Operations to control the use of alias documentation appear adequate to prevent abuse in the future. As part of another program, photographs taken by CIA aerial photography equipment are provided to civilian agencies of the government. Such photographs are used to assess natural disasters, conduct route surveys and forest inventories, and detect crop blight, Permitting civilian use of aerial photogi'aphy systems is proper. The economy of operating but one aerial photography program dictates the use of these photographs for appropriate civilian purposes. 1 | Recommendation i | i '< (27) | In accordance with its present guidelines, the CIA should not again engage in the testing of drugs on unsuspecting persons. Recommendation (28) Testing of equipment for monitoring conversations should not involve unsuspecting persons living within the United States. Recommendation A (29) agency committee should be reestablished to oversee the civilian uses of aerial intelligence photography in order to avoid any concerns over the improper domestic use of a CIA-decivilian veloped system. 9, CIA Relationships With Other Federal, State, and Local Agencies (Chapter 17) CIA operations touch the interest of many other agencies. The CIA, government, frequently has occasion to give or receive assistance from other agencies. This investigation has concentrated on those relationships which raise substantial questions under the CIA's legislative mandate. like other agencies of the Findings and Conclusions A. Federal Bureau of Investigation The FBI counterintelligence operations often have positive intelli- gence ramifications. Likewise, legitimate domestic CIA activities occasionally cross the path of FBI investigations. Daily liaison is therefore necessary between the two agencies. Much routine information is passed back and forth. Occasionally joint operations are conducted. The relationship between the agencies i I I 1 ' |. ' i I 39 however, not been uniformly satisfactory over the years. Formal liaison was cut off from February 1970 to November 1972, but relationships have improved in recent years. The relationship between the CIA and the FBI needs to be clarified and outlined in detail in order to ensure that the needs of national security are met without creating conflicts or gaps of jurisdiction. has, Recommendation (30) The Director of Central Intelligence and the Director of the FBI should prepare and submit for approval by the National Security Council a detailed agreement setting forth the jurisdiction of each agency and providing for effective liaison with respect to all matters of mutual concern. This agreement should be consistent with the provisions of law and with other applicable recommendations of this Report. Findings and Conclusions B. Narcotics Law Enforcement Agencies Beginning in late 1970, the CIA assisted the Bureau of Narcotics and Dangerous Drugs (BNDD) to uncover possible corruption within that organization. The CIA used one of its proprietary companies to recruit agents for BNDD and gave them short instructional courses. Over two and one-half years, the CIA recruited 19 agents for the BNDD. The project was terminated in 1973. The Director was correct in his written directive terminating the project. The CIA's participation in law enforcement activities in the course of these activties was forbidden by its statute. The Director and the Inspector General should be alert to prevent involvement of the Agency in similar enterprises in the future. C. For more than 20 The Department of State CIA through a proprietary^ conducted a training school for foreign police and security officers in the United States under the auspices of the Agency for International Development of the Department of State. The proprietary also sold small amounts of licensed firearms and police equipment to the foreign officers and their years, the departments. The CIA'S activities in providing educational programs for foreign police were not improper under the Agency's statute. Although the school was conducted within the United States through a proprietary, it had no other significant domestic impact. CIA 40 I t Engaging in the lii-earms business government intelligence agency. D. Funding Requests was a questionable activity for a It should not be repeated. From Other ' \ Federal Agencies In the spring of 1970, at the request of the AVhite House, the CIA contributed $33,655.68 for payment of stationery and other costs for replies to persons who wrote the President after the invasion of Cambodia. This use of CIA funds for a purpose unrelated to intelligence is improper. Steps should be taken to ensure against any repetition of such an incident. E. State and Local Police The CIA handles a variety of routine security matters through son with local police departments. In addition, it liai- offered training courses from 1966 to 1973 to United States police officers on a variety of law enforcement techniques, and has frequently supplied equipment to state and local police. In general, the coordination and cooperation between state and' local law enforcement agencies and the CIA has been exemplaiy, based upon a desire to facilitate their respective legitimate aims and goals. Most of the assistance rendered to state and local law enforcement agencies by the CIA has been no more than an effort to share with law enforcement authorities the benefits of new methods, techniques, and equipment developed or used by the Agency. On a few occasions, however, the Agency has improperly become involved in actual police operations. Thus, despite a general rule against providing manpower to local police forces, the CIA 1ms lent men, along with radio-equipped vehicles, to the Washington Metropoli- tan Police Department to help monitor anti-war demonstrations. It helped the same Department surveil a police informer. It also provided an interpreter to the Fairfax County (Virginia) Police Department to aid in a criminal investigation. In compliance with the spirit of a recent Act of Congress, the CIA terminated all but routine assistance to state and local law enforcement agencies in 1973. Such assistance is now being provided state and local agencies by the FBI. There is no impropriety in the CIA's furnishing the FBI with information on new technical developments which may be useful to local law enforcement. For several years the CIA has given gratuities to local police offi- . . 41 ' who had been cers helpful to the Agency. Any such practice should be terminated. i The CIA has also received assistance from routine matters, officers from local police forces. Aside from such forces have occasionally conduct of investigations. The has occasionally obtained police badges and other identification assisted the Office of Security in the CIA for use as cover for its agents. Except for one occasion when some local police assisted the CIA in an unathorized entry, the assistance received by the CIA from state and local law enforcement authorities was proper. The use of police identification as a means of providing cover, while not strictly speaking a violation of the Agency's statutory authority as long as no police function is performed, is a practice subject to misunderstanding and should be avoided. 10. Indices and Files on American Citizens (Chapter 18) Findings Biographical information is a major resource of an intelligence agency. The CIA maintains a number of files and indices that include biographical information on Americans. As a part of its normal process of indexing names and information of foreign intelligence interest, the Directorate of Operations has indexed some 7,000,000 names of all nationalities. An estimated 115,000 of these are believed to be Where a person is American citizens. believed to be of possibly continuing intelligence I i , ' ' information as received are opened. A.n estimated 57,000 out of a total of 750,000 such files concern American citizens. For the most part, the names of Americans appear in indices and files as actual or potential sources of information or assistance to the CIA. In addition to these files, files on some 7,200 American citizens, relating primarily to their domestic activities, were, as already stated, compiled within the Directorate of Operations as part of Operation CHAOS. The Directorate of Administration maintains a number of files on persons who have been associated with the CIA. These files are maintained for security, personnel, training, medical and payroll purposes. Very few are maintained on persons unaware that they have a relationship with the CIA. However, the Office of Security maintained files on American citizens associated with dissident groups who were never affiliated with the Agency because they were considered a threat to the physical security of Agency facilities and employees. These interest, files to collect 42 files were also maintained, in part, for use in future security clearance determinations. Dissemination of security restricted to persons files is with an operational need for them. The Office of Legislative Counsel maintains tionships with congressmen. files concerning its rela- Conclusions Although maintenance of most of the indices, files, and records of the Agency has been necessai-y and proper, the standards applied by the Agency at some points during its history have permitted the accumulation and indexing of materials not needed for legitimate intelligence or security purposes. Included in this category are many of the files related to Operation CHAOS and the activities of the Office of Security concerning dissident groups. Constant vigilance by the Agency is essential to prevent the collection of information on United States citizens which is not needed for proper intelligence activities. The Executive Order recommended by the Commission (Recommendation 2) will ensure purging of nonessential or 11, improper materials from Agency files. Allegations Concerning the Assassination of Presi- dent Kennedy (Chapter 19) Numerous allegations have been made that the assassination of President John investigated these allegations. On F. Kennedy. CIA participated in The Commission staff the basis of the staff's investigation, the Commission concludes that there involvement. the is no credible evidence of CIA Part II The CIA 's Role and Authority Introduction The Agency derives primarily from the National Security Act of 1947 and the implementlegal authority of the Central Intelligence ing directives of the National Security Council. The Act, written in broad terms, is properly understood only against the historical background. Chapter 4 discusses this back- ground. language and describes the legislative history, the subsequent National Security Council directives, Chapter 5 sets forth the statutory and the administrative practice. Chapter 6 analyzes the scope of the CIA's activities within the United States. legal authority for its (44) % Chapter 4 Intelligence and Related Activities by the United States before 1947 The United States, like other countries, has long collected intelligence. Until World War II, however, its activities were minimal. General Dwight D. Eisenhower described the prewar United States intelligence system as "a shocking deficiency that impeded all constructive planning." ^ It was not until the Office of Strategic Services (OSS) was established during the second World War that the organized colbegan on a substantial scale, although the FBI was active in Latin America in the late 1930's and during the war. Even before Pearl Harbor, President Franklin D. Roosevelt was [acutely aware of deficiencies in American intelligence. When calling on William J. Donovan, a New York lawyer who later headed OSS, to draft a plan for an intelligence service, he bluntly observed: "We have no intelligence service." ^ Donovan's study recommended that a central unit be established to coordinate intelligence activities and lection of intelligence to process information for the President. As a result, OSS was created major theaters. The function of OSS was to collect and analyze strategic information required by the Joint (^hiefs of Staff and to conduct special operations not assigned to other agencies. Other intelligence services of the State Department and the military services were maintained to to operate in certain collect tactical intelligence directly related to their specific missions. OSS relied primarily on three operating staffs: (1) the Secret Intelligence division, assigned to overseas collection, generally in- ivolving espionage; (2) the X-2 division, the counterespionage unit which protected the security of espionage agents; (3) the Research and Analysis division, which produced intelligence reports for policy makers. The OSS also performed other functions, varying from propaganda to paramilitary operations. D. D. Eisenhower, Crusade in Europe, p. .S2 (1948). ^H. H. Ransom, The Intelligence Estahlishment, p. 61 (1970). ^ (45) 46 By the end of the war, approximately 13,000 employees were en- gaged in the intelligence and si)ecial operations activities of the OSS. It supplied policymakers with essential facts and intelligence estimates. It also played an important role in directly aiding military campaigns. Nevertheless, OSS never received complete jurisdiction over all foreign intelligence activities. In the Southwest Pacific Theater, its activities were limited. Moreover, although the jurisdictional boundaries between the FBI and the military services were never made entirely clear, the FBI had been assigned responsibility for intelligence activities in Latin America. Friction inevitably developed among the FBI, the military and OSS during the war. On October 1, 1945, following the end of the war. President Truman oi'dered that OSS be dissolved as an independent body. Several of the branches of OSS continued and were absorbed by other agencies. Research and intelligence evaluation was assigned to the State Department, and espionage and related special operations were transferred to the War Department. Even before OSS was dismembered, however, proposals had been drawn up for a postwar centralized intelligence system. These early plans, and the discussions concerning them, led ultimately to the creation of the CIA. The participants in these early discussions all be- was necessary. views concerning the proper structure and lieved strongly that a postwar- intelligence capability They differed only in their role for a centralized agency. The velt in original plan Genei-al November 1944 Donovan submitted to President Roose- called for separation of intelligence services from the Joint Chiefs of Staff. Direct Presidential supervision was recommended. To avoid duplication and ensure effective coordination, Donovan proposed an '"organization which Avill procure intelligence both by overt and coVert methods and will at the same time provide intelligence guidance, determine national intelligence objectives, and correlate the intelligence material collected by all Government agencies." Under this plan, a powerful centralized agency would have dominated the intelligence services of several departments. Donovan's memorandum also proposed that this agency have authority to conduct "subversive operations abroad" but "no police or law enforcement functions, either at home or abroad." Several centralized approaches were offered in response as soon as Donovan's plan was disti'ibuted for connnent. The Navy took the lead complete mei'ger of intelligence services. It asserted that the Donovan proposal was not feasible since each opei-ating department had individual needs which required "operating intelligence in opi)osing a pemliai- to itself/' It pi'oposed a Central Intelligence Agency in name 47 only whose function would be to coordinate intelligence information, ''as far as practicable, [to] unify all foreign intelligence activities, and to synthesize all intelligence developments abroad." The Army con- curred in the Navy's opposition to a tightly centralized intelligence service. The State Department preferred an interdepartmental committee organization chaired by the Secretary of State. The Department con- tended that, in peacetime, the Secretary of State should supervise all operations a fleeting foreign relations. The Joint Chiefs opposed tight centralization. Their opposition to intelligence collection by a central agency was placed on the narrower ground that collection of intelligence should generally by carried out by existing departments except when done by clandestine methods. They also objected to Donovan's proposal that the new agency engage in foreign covert operations (such as OSS propaganda and paramilitary actions) because "subversive operation abroad does not appear to be an appropriate function of a central intelligence service." This aspect of the original Donovan plan was not, thereafter, specifically included in any proposal. The FBI also developed its own proposal for postwar intelligence. It would have assigned responsibility for "civilian" intelligence to the FBI on a world-wnde basis and left "military" intelligence to the armed services. On January also favored coordination but 22, 1946, in response to this policy debate. President Truman issued a directive establishing the Central Intelligence Group CIG) The final directive was developed by the Bureau of the Budget as a compromise. The CIG was directed to coordinate existing depart( . mental intelligence and to perform those intelligence functions wdiich the National Intelligence Authority (NIA), a forerunner of the National Security Council, concluded should be performed centrally.' The CIG supplemented but did not supplant departmental intelligence services, although the FBI did abruptly w^ithdraw its intelligence service from Latin America. The NIA and CIG were replaced one and one-half years later by the National Security Council and the Central Intelligence Agency. The CIA's organization and role reflected the CIG compromise between competing concepts of tight centralization and loose confederation. The CIA was only one of several agencies assigned intelligence functions. JSIost of the specific assignments given the CIA, as well as the pro- on police or internal security functions in its statute, closely follow the original 1944 Donovan plan and the Presidential directive liibitions creating the CIG. Chapter 5 The Sources of CIA Authority The National Security Act of 1947 charges the CIA with the duty of coordinating the intelligence activities of the federal government and correlating, evaluating and disseminating intelligence which affects national security. In addition, the Agency is to perform such other functions and duties related to intelligence as the National Security Council may direct. The statute makes the Director of Central Intelligence responsible for protecting intelligence sources and methods. Congress contemplated that the CIA would be involved in all aspects of foreign intelligence, including collection. It understood that the Agency would engage in some activities, including some overt collection, within the United States.^ The statute expressly provides that the Agency shall have no law enforcement powers or internal security functions. This prohibition is an integral part of the definition of the CIA's authority. It reflects Congress' general understanding that CIA activities in the United States would be justified only to the extent they supported the CIA's basic foreign intelligence mission. This understanding has been reflected in the National Security Council Intelligence Directives and the other documents which further define the Agency's jurisdiction. Determining the scope of the Agency's authority within the United States is primarily a matter of drawing the line between the responsibility of the CIA and that of the FBI, while ensuring adequate coordination to avoid gaps in coverage. The areas posing the most substantial problems in this respect have involved counterintelligence and the preservation of the security of intelligence sources and methods. hich disclose the identity of the source of the informa- are secret, and deniable as (48) ; ; : — : ; : 49 A. The Statutes The National Security Act of 1947 replaced the National Intel- composed of the President, the Secretary of State, the Secretary of Defense, and other Secretaries and Under Secretaries when appointed by the President with the advice and consent of the Senate.^ Subsequent legislation added the Vice President as a member. The Act also created the Central Intelligence Agency and placed it under the direction of the ligence Authority with the National Security Council, National Security Council. The Agency's statutory authority Sections 408 (d) and (e) is contained in Title 50 U.S.C. : For the purpose of coordinating government departments and agencies (d) tlie intelligence activities of the several in the interest of national security, it shall be the duty of the [Central Intelligence] Agency, under the direction of the National Security Council (1) to advise the National Security Council in matters concerning such intelligence activities of the government departments and agencies as relate . to national security (2) to make recommendations to the National Security Council for the coordination of such intelligence activities of the departments and agencies of the government as relate to the national security (3) to correlate and evaluate intelligence relating to the national security, and provide for the appropriate dissemination of such intelligence within ; the Government using where appropriate existing agencies and facilities Provided, That the Agency shall have no police, subpoena, law-enforcement powers, or internal security functions Provided further. That the departments and other agencies of the Government shall continue to collect, evaluate, correlate, and disseminate de- partmental intelligence And provided further. That the Director of Central Intelligence shall be responsible for protecting intelligence sources and methods from unauthorized disclosure (4) to perform, for the benefit of the existing intelligence agencies, such additional services of ; common concern as the National Security Council determines can be more efficiently accomplished centrally (5) to perform such other functions and duties related to intelligence affecting the national security as the National Security Council may from time to time direct. (e) To the extent recommended by the National Security Council and approved by the President, such intelligence of the departments and agencies of the Government, except as hereinafter provided, relating to the national security shall be open to the inspection of the Dii*ector of Central Intelligence, and such intelligence as relates to the national security and is possessed by such departments and other agencies of the Government, except as hereinafter provided, shall be made available to the Director of Central Intelligence for correlation, evaluation, and dissemination Provided, however. That upon the written request of the Director of Central : 3 Under the original statute, tlie Director for Mutual Security and the Chairman of the National Security Resources Board were included as members. Both these positions have since been abolished. : 50 Intelligence, the Director of the Federal ' Bureau of Investigation shall make available to the Director of Central Intelligence such information for correlation, evaluation, and dissemination as may be essential The Director of Central Intelligence, time is who heads the CIA, is ap- subject to similar appointment provisions. At no may both positions be filled by military officers. Other provisions of the 1947 Act give the Director of Central Incomplete authority over the employment of CIA personnel. He may, in his discretion, dismiss any employee whenever "he shall deem such termination necessary or advisable in the interests of the United States." His decision is not subject to judicial or Civil telligence Service review. In the 1949 CIA Act, Congress enacted additional provisions per- mitting the Agency to use confidential cedures. This Act exempts the CIA and administrative profrom all usual limitations on the fiscal CIA expenditure of federal funds. It provides that funds may be included in the budgets of other departments and then transferred to Agency without regard to the restrictions placed on the initial appropriation. This Act is the statutory authority for the secrecy of the the Agency's budget. The 1949 Act also authorizes the Director to make expenditures for "objects of a confidential, extraordinary, or emergency nature" on and without further accounting. In order to protect intelligence sources and methods from disclosure, the 1949 Act further exempts the CIA from having to disclose its "organiza- his personal voucher tion, functions, names, official titles, salaries, or number of personnel employed." B. The Legislative History The 1947 Congressional hearings and debates a dual concern. Congress accepted the need for a centralized intelligence agency that would supply the President witli a complete and accurate picture of reflect the capabilities, intentions, and activities of foreign countries. On the other hand, there was considerable congressional concern over possible misuses of this Clarence new agency. The comments Brown (Eepublican-Ohio) of Representative are illustrative I am very much interested in seeing the United States have as fine a foreign military and naval intelligence as they can possibly have, but I am not interested in setting up here in the United States any particular central policy [«fc] agency under any President, and I do not care what his name may be, and just allow him to have a gestapo of his own if he wants to have it. Every now and then you get a man that comes up in power and that has an imperialist idea. ! to the national security. pointed by the President witli the advice and consent of the Senate. The position of Deputy Director of Central Intelligence, added to the statute in 1953, > I I : 51 The House, added language to the bill submitted to Congress by President Truman which detailed the specific functions given to the CIA, In doing so, it generally followed the language of the Presidential directive which had established the Central Intelligence Group, the CIA's predecessor. The inclusion in the 1947 Act of specific functions and prohibitions, therefore, was to ensure that a President could not alter the CIA's basic functions without 1, first in the course of its deliberations, obtaining the approval of Congress. Authority To Collect Intelligence The Agency include coordinating intelligence activities and correlating and evaluating intelligence. The statute itself does not expressly authorize the Agency to engage in statutory functions of the matter to the National Security Council, which was authorized to direct the Agency to perform "other functions and duties related to intelligence" and "additional services of common concern,"' which are "for the benefit of the Congress intelligence collection. left this existing intelligence agencies." It is clear from the legislative history that Congress expected the National Security Council to give the CIA responsibility and authority for overseas espionage. The National Intelligence Authority had given this responsibility to the predecessor Central Intelligence Group in 1946. Witnesses and congressmen were reluctant to discuss such matters publicly, but General Hoyt Vandenberg, Director of the CIG, told the Senate committee in secret session United States is to be forced by conditions in the world today to enter clandestine operations abroad, then such operations should be centralized in one agency to avoid the mistakes indicated, and we should follow the experience of the intelligence organizations of other countries which have proven successIf the ful in this field. Some the CIA witnesses during the congressional hearings opposed giving any responsibilities for collection of intelligence and urged that the authority of the National Security Council to assign additional functions to the CIA be deleted so that the CIA could not collect in- Congress did not agree. Although two congressmen expressed disapproval of any CIA collection, the general provisions were not challenged during the floor debates. They remain in the statute as telligence. authority for the CIA to collect intelligence at the direction of the National Security Council. The Meaning of "Intelligence" The 1946 Presidential Directive expressly restricted Intelligence Group to activities connected with foreign 2. the Central intelligence. Although the 1947 National Security Act does. not contain this ex- : : : : 52 i was a general understanding in and out of Congress that the CIA's activities would be similarly confined. An exchange between General Vandenberg and Congressman Chet Holifield (Democrat-California), later the floor manager of the CIA press restriction, there statute, is indicative General Vandenberg. The National Intelligence Authority and the Central Group have nothing whatsoever to do with anything domestic so when we talk about the Central Intelligence Group or the NIA, it always means foreign intelligence, because we have nothing to do wath domestic intelligence. Representative Holifield. That was my understanding, and I wanted it conIntelligence ; firmed. In testifying before a House committee. Navy Secretary James Forrestal said The purposes of the Central Intelligence Authority [sic] are limited definitely to purposes outside of this country, except the collation of information gathered by other government agencies. Regarding domestic operations, the Federal Bureau of Investigation is working at all times in collaboration with General Vandenberg. He relies upon them for domestic activities. When Representative Brown asked whether additional limitations should be attached because the CIA "might possibly affect the rights and privileges of the people of the United States," General Vandenberg responded do not think there is anything in the bill, since it is all foreign incan possibly affect any of the privileges of the people of the United States. ... I can see no real reason for limiting it at this time. No, sir; I telligence, that The agency has never disputed that its authority is restricted to for- eign intelligence. 3. Activities Within the United States The fact that the CIA is restricted to activities relating to "foreign what those andwhether they may be conducted within the United States. Allen Dulles, testifying before a House committee, made the point intelligence"" does not, of course, tell us They would have to exercise certain functions have their headquarters in the United States. in the activities are United States. They would More importantly, an exchange between Dulles and Congressman Manasco (Democrat-Alabama) during the closed House hearings indicates that Congress understood the Agency would have authority to collect foreign intelligence in this country from knowing sources: Representative Manasco. Limit it [collection] to foreign countries, of course. Mr. Dulles. There is one little problem there. It is a very important section of the thing, the point I raised there. In New York and Chicago and all through the country where we have these business organizations and philanthropic and 53 other organizations a tremendous who send amount in the United States, They collect There ought to be a way of collecting that imagine that would not he excluded by any terms of their people througlaout the world. of information. and I your bill. Representative Manasco. The fear of the committee as to collecting information on our own nationals, we do not want that done, but I do not think the committee has any objection to their going to any source of information that our nationals miglit have on foreign operations. Is that your understanding? Representative Wadsworth. (Republican-New York) Yes. Representative Manasco. They could go to Chicago and talk to the presidents of some of the machinery firms that have offices all over the world. Mr. Dulles. That must be done. Less clear from the legislative history is whether Congress contemplated that the CIA would collect foreign intelligence within the United States by clandestine means, so that the source of the intelligence would be unaware that information was being provided to the CIA. As stated above, there was a general reluctance to discuss openly the subject of clandestine collection. Accordingly, the absence of dis- cussion of the subject provides The 1946 little guidance. Presidential directive to the predecessor CIG contained express authority only for clandestine collection "outside of the United States and its possessions," but there is no corresponding provision in the 1947 National Security Act. Neither Dulles nor Vandenberg in their testimony (quoted in part above) referred to clandestine collection as an activity the Agency might be assigned within the United gress failed to include this activity among On the other hand. Conthe prohibitions expressly States, incorporated in the statute. 4. Protecting Intelligence Sources and Methods The tecting responsibility of the Director of Central Intelligence "for prointelligence sources and methods from unauthorized . dis- closure" reflects congressional recognition that the intelligence function necessarily involves sensitive materials and that secrecy is critical. This language was originally inserted in the early drafts of the Act in response to the expressed concern of some military officials that a civilian agency might not properly respect the need for secrecy. Congress was also aware of the concern that United States espionage laws were ineffective in preventing unauthorized disclosure of classified information. The statute does not provide the Director of Central Intelligence with guidance on the scope of this responsibility or on how it is to be grant him additional authority to discharge this responsibility. The legislative debates did not focus on these performed; nor does issues. it : : 54 5. Prohibition Against the Exercise of Police and Law Enforcement Powers and Internal Security Functions The 1947 Act explicitly limits the CIA's domestic ing the Agency from exercising law enforcement or by prohibit police powers or undertaking internal security fimctions. This prohibition was taken almost verbatim from the 1946 Presidential directive. Although the wording of the prohibition was not specifically discussed in congressional hearings or debates, several congressmen and witnesses expressed their concern that the CIA role neither invade the FBI's jurisdiction nor become a secret police. Dr. Vannevar Bush, the Chairman of the Joint Research and Development Board, responding to a question about the CIA's exercise of domestic police and related activities, stated no danger of tliat. The bill provides clearly that it is not concerned with intelligence on internal affairs, and I think this is a safeguard against its becomimg an empire. We already have, of course, the FBI in this country, concerned with internal matters, and the collection of intelligence in connection with law enforcement internally. We have had that for a good many years. I think there are very few citizens who believe this arrangement will get beyond control so that it will be an improper affair. I think there is Representative Brown questioned Secretary Forrestal closely about possible domestic activities of the CIA : Representative Brown. This Chief of the Central Intelligence Agency, the Dihe decide he wants to go into my income tax records, I presume he could do so, could he not? Secretary Forrestal. I do not assume he could. I think he would have a very short life^I am not referring to you, Mr. Brown, but I think he would have a very short life. rector, should General Vandenberg spoke for many when he I very strongly advocate that it [the CIA] have no forcement powers or internal security functions. 6. "Services of ties The said: police, subpoena, law en- Common Concern" and "Other Functions and Du- Related to Intelligence" statute grants broad authority to the National Security Council to assign the CIA other responsibilities in the intelligence field, sub- on law enforcement powers or internal security functions. The preceding discussion shows that Congress specifically ject to the prohibition expected that collection of intelligence would be among those respon- Other such services of common concern were mentioned by General Vandenberg before the Senate Committee on the Armed sibilities. Services agency to perform other [functions] two or more agencies. These are projects which it is be- [I]t is necessary for a central intelligence of common concern to | 55 most eflBciently or economically performed centrally. An example of such a service is the monitoring of foreign voice broadcasts. Similarly, we lieved cau be . . . have centralized the activities of the various foreign document branches which were operated by some of the services individually or jointly during the war. Neither the congressional hearings nor the floor debates discussed the limits on the power of the CIA NSC to assign particular activities to and duties related to intelligence.-' The broad language reflected concerns that American experience with peacetime intelligence needs and requirements was extremely limited. Several witnesses cabinet officers, military leaders and intelligence the experts — as "other functions — testified before Congress that the NSC should be allowed flexibility in its direction if the CIA was to be responsive to changing conditions and if the United States was to develop an effective intelligence service. Under the authority of this "other functions" proviso, the Na- tional Security Council has assigned the CIA responsibility for for- eign covert operations of a political or paramilitary nature. C. Practice Under the National Security Act The National Security Council provides the CIA and other intel- and direction through National Security Council Intelligence Directives (NSCID's) and other official memoranda. By means of these documents, the NSC exercises its statutory authority to assign the CIA services of common concern and other functions and duties related to intelligence. The NSC has also given some greater specificity to the duties of correlation, evaluation, and dissemination which are specifically assigned in the statute. Only those directives which are pertinent to the Commission's inquiry tire dis- ligence agencies with guidance cussed below. Since 1947, the CIA has had, under NSC directive, the responsibility for all espionage (that is, clandestine collection of foreign intelligence) and clandestine counterintelligence activities conducted outside the United States and its possessions. In 1948, the National Security Council added the responsibility for overt collection of foreign intelligence within the United States. However, the NSC has not assigned the CIA responsibility for clandestine collection of foreign intelli- gence in the United States. The CIA has a number of miscellaneous responsibilities of an intelligence-gathering nature. Perhaps the most important for purposes of this Commission is the responsibility assigned it by the NSC for dealing with persons who defect to the United States overseas. (Defections within this country are the responsibility of the FBI.) The Director of : 56 Central Intelligence has implemented this assignment by issuing directives which set forth the details for the defector program. Under the National Security Council directives, the Director of Cen- primary responsibility for the tral Intelligence has impending crises appropriate and the transmission of relevant intelligence to the officials. The Director — information national intelligence security policy identification of also has the responsibility for required for the formulation of which transcends the exclusive competence of any one department. The CIA is responsible for the regular production of cur- rent intelligence to meet the day-to-day needs of the President While these directives do not expressly prothe production of intelligence on purely domestic matters, it is other high-level hibit and officials. clear that their focus is on overseas events. In connection with the statutory responsibility of the Director of Central Intelligence for the protection of intelligence sources and methods from unauthorized disclosure, the National Security Council has directed that each agency or department be responsible for the protection of its own sources and methods, and that the Director call upon these other bodies as appropriate to investigate any unauthorized disclosures and report to him. The Director, has in turn, delegated these responsibilities to the Security Committee of the United States Intelligence Board, a board composed of the heads of the various intelligence agencies. particularly difficult security problem is presented by "leaks" of classified information to the news media. Usually there is no way of determining which agency is the source for any particular disclosure. A At present all "leak" cases are referred to the Security Committee for discussion and appropriate action. The Security Committee has been given the authority to consider the problems caused by the "leak," including the degree of harm to the national interest, and to make reports and recommendations for corrective action as appropriate. The Committee, however, has no authority to direct either the FBI or any member agency to investigate "leaks." The position of the FBI during the 1960's and early 1970's was firm FBI would not handle "leak" cases unless directed to do so by the Attorney General. This was a reflection of the attitude of Director the Edgar Hoover. He news "leaks" was an inappropriate use of FBI resources, because, most of the time, the source of such a "leak" could not be discovered, and often when the source was discovered, it turned out to be a high-ranking officfal against whom no action would be taken. As a result, the CIA, under J. felt that investigation of Presidential pressure, has occasionally investigated such "leaks" itself, relying on the "sources and methods" proviso for autliority. The FBI's internal security authority and the CIA's foreign intelli- 57 gence responsibilities result in frequent contact, particularly in the area of counterintelligence. The FBI has responsibility for "in- work in matters relating to espionage, sabotage, subvemve and related matters" regarding the security of the United vestigative activities States. The CIA has the corresponding authority overseas. It also maintains central records and indices of foreign counterintelligence information. The NSC has assigned to the Director of Central Intelligence responsibility for establishing procedures to ensure the centralized direction and prior coordination of foreign and domestic counter- intelligence activities. Close coordination between the two agencies is required in many sit- uations such as a visit by a foreign intelligence officer to this country engage in espionage. The "transfer'' of responsibility for counterintelligence requires constant cooperation between the CIA and FBI. Such coordination has not always existed, but the Commission was informed by representatives of both the CIA and the FBI that good relations and efficient liaison presently exist between the two agencies. A formal memorandum between the CIA and the FBI in February 1966 provides the most detailed statement of the understanding by the two agencies of their respective authorities. For example, the FBI must be kept advised of clandestine CIA personnel in the United States. Where CIA handling of agents in this country is inadequate to protect the FBI's internal security interest, the FBI has unrestricted access to them. to The 1966 memorandum does not any solve all problems. It does not out- degree the limits on CIA's activities related to foreign intelligence. Xo reference is made to the CIA's role within the United States to protect intelligence sources and methods, or to its power to conduct investigations for this purpose. This has been a troublesome area, as the FBI has declined to investigate the personnel of CIA or any other government agency suspected of a breach of line or indicate in security unless there last year, to is specific substantial evidence of espionage. work has begun to supplement and rewrite improve coordination and avoid future jurisdiction. this Within the memorandum conflicts or gaps of Chapter 6 Legal Analysis Introduction The CIA, every other agency of the federal government, possesses only that authority which the Constitution or duly enacted like statutes confer on it. And, like every other agency, it is subject to any prohibitions or restraints which the Constitution and applicable statutes impose on it. Congress vested broad powers in the CIA, Its purpose was to create an effective centralized foreign intelligence agency with sufficient authority and flexibility to meet new conditions as they arose. But the Agency's authority under the Act is not unlimited. All its functions must relate in some way to foreign intelligence. The Agency is further restricted by the Act's prohibition on law enforcement powers and internal security functions, as well as by other Constitutional and statutory provisions. Determining the lawfulness of particular Agency conduct requires analysis of its authority as well as any applicable restrictions. The process does not always produce clear and precise answers. Difficult questions of statutory and Constitutional interpretation are involved. There are few, if any, authoritative judicial decisions. The legislative history and the experience under the Act are an uncertain guide. In many instances, the only appropriate test is one of reasonableness. Different persons are likely to hold different opinions as to what the statutes and Constitution authorize or prohibit in particular circumstances. Legal questions are only the beginning of a complete analysis of the issues. A distinction must be drawn between what the law what may be desirable or undesirable as Activities which the law authorizes may, authorizes or prohibits and a matter of public policy. nonetheless, be undesirable as a matter of policy. Conversely, policy may which have not been authe extent that no Constitutional restrictions pose an abso- create a compelling need for activities thorized to ; (58) 59 lute barrier, authority for not now may such activities be sought if it does exist. In the Commission's recommendations, both law and policy are considered. This chapter, however, is intended to deal only with the applicable law. A. The Extent of the CIA's Authority The Authority of the CIA as /. to Foreign Intelligence Although the National Security Act does not expressly limit the CIA's intelligence activities to foreign intelligence, it appears from the legislative history as a whole and the consistent practice under the statute that the Agency's responsibility is so limited. In deciding what constitutes "foreign intelligence," the subject matter of the information and not the location of its source is the principal factor that determines whether it is within the purview of the CIA.i This conclusion is supported by that portion of the legisla- which indicates the CIA may in this country by overt means. "Foreign intelligence" is a term with no tive history collect foreign intelligence settled meaning. It is used but not defined in National Security Council Intelligence Directives. Its scope is unclear where information has both foreign and domestic aspects. The legislative history indicates general congressional concern that the Agency should not direct activities against United States citizens or accumulate information on them. However, Congress did not expressly prohibit any activities by the CIA except the exercise of law enforcement and internal security functions. We believe the congressional concern is properly accommodated by construing "foreign intelligence" as information concerning the capabilities, intentions, and activities of foreign nations, individuals or wherever that information can be found. It does not include information on domestic activities of United States citizens unless there is reason to suspect they are engaged in espionage or similar illegal activities on behalf of foreign powers. entities, The authority of the CIA to collect foreign intelligence in this country by clandestine means is also unclear. The Act neither expressly authorizes such collection nor expressly prohibits it. The National Security Council has never formally assigned this responsibility to the CIA. The Commission concludes that the CIA's authority in this area needs clarification. 1 F. See also Heine 2d 785 (4th v. RanSj 261 F. Supp. 570 (D. Md. 1966), vacated and remanded, 399 Cir. 1968). ; : ; 60 2. Support Activities In order to carry on its authorized intelligence functions within and without the United States, the CIA must necessarily engage in a variety of support activities. Such activities include the operation of its headquarters, the recruitment and training of employees, the procurement of supplies, communication with overseas stations, and the like. The Commission finds that the authority to conduct foreign intel- ligence operations includes the authority to conduct such otherwise lawful domestic activities as are reasonably necessary and appropriate by way of support. This includes the authority to use those unusual cover and support devices required by the clandestine nature of the 3. CIA. Protection of Sources and Methods The National Security Act requires the Director of Central Intel- and methods from unauthorized disclosure. The Commission believes that this provision and the inherent authority of the Director authorize the Agency to take reasonable measures not otherwise prohibited to protect the facilities and personnel of the Agency from outside threats and to ensure good security practices by persons affiliated with the Agency. ligence to protect intelligence sources What measures are facts reasonable in a particular case depends on and circumstances. No all the general rule can be laid down, but some relevant factors can be suggested. Among them are —The degree of danger to the security of the Agency —The sensitivity of the activities involved —The extent and nature of the Agency's intrusions on individual privacy and, —The alternative means of protection available. ; Because of the uncertainty inherent in a test of reasonableness, the Commission in the chapters which follow has recommended both statutory changes and a number of restrictions on the means which the Agency may employ to protect its sources and methods. On rare occasions, the Agency has asserted that the Director's authority permits him to investigate any unauthorized disclosure that jeopardizes intelligence sources and methods. This claim has been made in cases where there was no reason to believe the disclosure came from a person in any way related to the Agency. Although the statutory language and legislative history are not precise, the Commission finds that such an interpretation is unwarranted, especially in light of the applicable NSCID that makes the unauthorized disclosures from the Agency. CIA responsible only for 61 In our judgment: (a) The investigative authority of the Director is limited to — persons affiliated with the Agency that is, employees (including former employees and applicants for employment), contractors knowing sources of intelligence, agents and similar persons used by the Agency in operations, and others who require clearance by the CIA for access to classified information. Such investigations must be conducted in a lawful manner consistent with the requirements of the Constitution and applicable and their employees, statutes. Investigation of breaches of security by employees of other government agencies is the responsibility of the heads of those ( b) FBI. has no authority agencies or of the The CIA newsmen. The Commission proposes statutory changes as well as an Executive Order to clarify these matters. (c) to investigate Other Authority 4. The CIA some authority from federal statutes of general application. The Economy Act of 1932 ^ authorizes government agencies to provide services and equipment to each other where that course would be in the best interest of the government. Public Law derives 90-331 requires ice in the all performance of federal agencies to assist the Secret Servits protective duties. The authority granted by the CIA, but our investigation has disclosed no improprieties arising from that exercise. The CIA may from time to time be delegated some of the President's in these acts is often exercised inherent authority under the Constitution in matters affecting foreign relations. The scope of the President's inherent authority and the power of the Congress to control the manner of its exercise are difficult Constitutional issues not raised by the facts found by the Commission in carrying out its assignment. B. The Restrictions on CIA's Authority The Prohibition on Law Enforcement Powers or Internal /. Se- curity Functions The statutory proviso that "the Agency shall have no police, sub- pena, law-enforcement powers, or internal security functions" was initially designed to prevent the CIA from becoming a national secret was also intended to protect the domestic the FBI. The statute does not define the terms used. police force. It of 231 U.S.C. sec. 686. jurisdiction 62 Many matters related to foreign intelligence or the security of the Agency also relate to law enforcement or internal security. For example, an unauthorized disclosure of classified information by an Agency employee may also violate the espionage acts or other criminal Additionally, the Agency statutes. in the ordinary course of its business has relationships of various types with law enforcement agencies. of these relationships may raise questions of Some compliance with thej proviso. I whether Agency activity is prohibited depends principally on the purpose for which it is conducted. If the principal purpose of the activity is the prosecution of crimes or pro- The Commission finds that tection against civil disorders or domestic insurrection, then the activity is prohibited. On the other hand, if the principal purpose relates to Agency, the might also be foi-eign intelligence or to protection of the security of the activity is permissible, within limits, even though it performed by a law enforcement agency. For instance, the mere fact that the Agency has files on or containing the names of American citizens is not in itself a violation of the statutory prohibition on law enforcement or internal security functions. The test is always the purpose for which the files were accumulated and the use made of them thereafter. The Commission does not construe the proviso to prohibit the CIA from evaluating and disseminating foreign intelligence which may be relevant and useful to law enforcement. Such a function is simply an exercise of the Agency's statutory responsibility "to correlate and evaluate intelligence relating to the national security." Nor do we believe that the CIA is barred from passing domestic information to interested agencies, including law enforcement agencies, where that information was incidentally acquired in the course of authorized foreign intelligence activities. Indeed, where the Agency has information directly relevant to an ongoing criminal investigation, as it did in connection with the Watergate investigation, the Agency is under a duty to bring its evidence to the attention of the ap]Hopriate authorities. So long as the Agency does not actively participate in the activities of law enforcement agencies, we find that it is proper for it to furnish such agencies with the benefits of technical developments and expertise which may improve their effectiveness. In the past, the Agency has conducted some technical training of members of state and local police forces through the Law Enforcement Assistance Administration. A 1973 statute prohibited this practice. The Agency has interpreted the statute to evidence congressional terminate furnishing such training directly to local law enforcement agencies as well. The Commission approves the Agency's intent that it Ij 63 decision to leave to the FBI such training of state and local police officers. 2. Constitutional Prohibitions The Central is Intelligence Agency, like all organs of government, required to obey the Constitution. The protections of the Constitu- tion extend generally to all persons within the borders of the United who have entered the country illegally. The First Amendment. The First Amendment to the Constituprotects among other things freedom of speech, of the press, and States, even aliens a. tion — from abridgement by the government. These freedoms are not absolute. The Amendment, as Mr. Justice Holmes noted, does not "protect a man in falsely shouting fire in a theatre and causing a panic." Nevertheless, government conduct which inhibits the of political association exercise of these Constitutional rights raises a substantial Constitutional question. The and the undue accumulation of information on political views or activities of American citizens could have some inhibiting effect. Because the Commission has found these activities were improper for other reasons, it is interception of communications private unnecessary to explore the First Amendment questions in detail. — The Fourth Amendment. The Fourth Amendment prohibits unreasonable searches and seizures. In ordinary criminal cases, laAv b. enforcement officers miist obtain a judicial warrant before searching a person's residence, hotel room, or When office, except in "exigent circum- Supreme Court held in 1967 that private conversations were protected by the Fourth Amendment, it made it clear that all wiretaps and other forms of surreptitious electronic surveillance stances." were within the the field of investigative activities that ordinarily require prior judicial approval. whether the President can act without such approval in some cases where the national security is involved. The Supreme Court recently held that a warrant is required in national security cases having "no significant connection with a foreign power, its agents or agencies." ^ However, the Court expressly reserved decision on whether a significant foreign connection would justify a different result. Some lower courts have held that no warrant is required in It is unclear such cases. Neither the Fourth Amendment nor any other Constitutional or —the observation of the public comings and goings of an individual — unless such sur- statutory provision prohibits physical surveillance ^United States v. United States District Court, 407 U.S. 297 (1972). 64 veillance reaches the point of harassment. acents or informers is The also lai'gely uncontrolled use of undercover by legal standards.^ — Waiver and Consent Constitutional rights may be waived in certain circumstances. The Supreme Court has held that a valid waiveimust be knowing and voluntary, and the evidence of such a waiver must be clear and unequivocal. The government cannot make waiver of Constitutional rights a condition of public employment, unless the demand c. reasonably related to a proper governmental objective and the waiver is the least restrictive means available to achieve that objective. Whether a particular waiver is valid depends on all the for such a waiver is facts of the case. Statutory Prohibitions 3. — The Omn'thus ('rhne (Control and Safe Streets Act. Title III of the Oumibus Crime Control and Safe Streets Act ^ prohibits the a. interception of private conversations through wiretaps or other forms of electronic eavesdropping unless one party to the conversation consents or a judicial warrant is obtained. The statute expressly does not whatever power the President has to oixler warrantless wiretaps or eavesdropping in national security cases. An Executive Order, dated June 30, 1965, permits warrantless wiretaps so long as the written approval of the President or the Attorney General is obtained. affect The statute defines "interception" to mean "the acquisition of the contents of any wire or oral communication through the use of any electronic, mechanical, or other device.*' A number of judicial de- have held that the Act does not prohibit the collection of longdistance telephone billing records. These records show the telephone number called, the date and time of the call, and, in some cases, the names of the parties. They do not indicate the content of the call. A different question is posed by the acquisition of communications incidental to the testing of interception equipment to be used abroad. On the face of the statute, such activities appear to be prohibited. b. Statutes Protecting the United States Mails. Opening first-class mail to examine its contents without a lawfully issued warrant is illegal.*' The statutes set forth no exception for national security cisions — matters. The examination of the exterior of first-class mail without opening presents a different problem. it Lower federal courts have held that these so-called "mail covers" are valid if they are conducted within framework of the postal regulations and there is no unreasonable delay of the mail. The Supreme Court has not passed on this issue. the * •' « Hoffa V. United States, 385 U.S. 293 (1966). IS TI.S.O. sec. 2510 et seq. 18 U.S.C. sees. 1701-170.S. 65 — Disclosure of Ineome Tax Information. Federal statutes, Executive Orders, and Internal Revenue Service regulations prohibit disclosure of information from federal income tax returns except under c. carefully defined procedures. There ments for the CIA. Indeed, CIA of improper activity specifically no exception to these requireinspection of tax returns was one form mentioned in the 1947 Act's legislative is history. d. Other Statutes. —The Commission has not attempted to identify or analyze all statutes which might conceivably apply to activities by CIA t])e or on behalf. its Whether in any particular case a criminal oi- other prohibitory statute restricts the authority of the CIA within the United States is a question of interpretation of that statute in light of the National Security Act. The statute may contain an express or im- plied exception for activities required in the interest of national secur- on the other hand, it may be an unqualified prohibition on certain conduct. Only an analysis of the language, any relevant legislative history, and the underlying policies can answer the question in a parity ; ticular case. Conclusions The evidence within, the scope of this inquiry does not indicate that fundamental rewriting of the National Security Act is either necessary or appropriate. The evidence does demonstrate the need for some statutory and ad- and function of the Agency. Ambiguities have been partially responsible foi- some, though not all, of the Agency's deviations within the United States from its assigned mission. In some cases, reasonable persons will differ as to ministi-ative clarification of the role tlie lawfulness of the activity ; in others, the absence of clear guide- deprived the Agency of a means of resisting pressures to engage in activities which now appear to us improper. Greater public awareness of the limits of the CIA's domestic lines as to its authority much authority would do The to reassure the American people. requisite clarification can best be accomplished (a) specific amendment through a clarifying the National Security Act provision which delineates the permissible scope of CIA activities, as set forth in Reconnnendation 1, and (b) through issuance of an Executive Order further limiting domestic activities of the CIA, as set forth in Recommendation Recommendation 2. (1) Section 403 of the National Security Act of 1947 should be amended in the form set forth in Appendix VI to this Report. These amendments, in summary, would: ; : ; 66 a. Make explicit that the CIA's activities must be related to foreign intelligence. b. Clarify the responsibility of the CIA to protect intelligence sources and methods from unauthorized disclosure. (The Agency would be responsible for protecting against unauthorized disclosures within the CIA, and it would be responsible for providing guidance and technical assistance to other agency and department heads in protecting against unauthorized disclosures within their own agencies and departments.) Confirm publicly the CIA's existing authority to collect foreign intelligence from willing sources within the United States, and, except as specified by the President in a published Executive Order," prohibit the CIA from collection efforts within the United States directed at securing foreign intelligence from unknowing American citizens. c. Recommendation (2) The President should by Executive Order prohibit the CIA from the collection of information about the domestic activities of U.S. citizens (whether by overt or covert means), the evaluation, correlation, and dissemination of analyses or reports about such activities, and the storage of such information, with exceptions for the following categories of persons or activities a. Persons presently or formerly affiliated, or being considered for affiliation, with the CIA, directly or indirectly, or others who require clearance by the CIA to receive classified information b. Persons or activities that pose a clear threat to CIA facilities or personnel, provided that proper coordination with the FBI is accomplished c. Persons suspected of espionage or other illegal activities relating to foreign intelligence, provided that proper coordination with the FBI is accomplished. d. Information which is received incidental to appropriate CIA activities may be transmitted to an agency with appropriate jurisdiction, including law enforcement agencies. Collection of information from normal library sources such as ^ this statute should recogrnize that when the collection who are not United States citizens results in the incidental information from unknowing citizens, the Agency should be permitted to make The Executive Order authorized by of foreign intelligence from persons acquisition of appropriate use or disposition of such information. Such collection activities must be directed at foreign intelligence sources, knd the involvement of American citizens must be incidental. 67 newspapers, books, magazines, and other such documents is not to be affected by this order. Information currently being maintained which is inconsistent with the order should be destroyed at the conclusion of the current congressional investigations, or as soon thereafter as permitted by law. The CIA should periodically screen its files and eliminate all material inconsistent with the order. The order should be issued after consultation with the National Security Council, the Attorney General, and the Director of Central Intelligence. Any modification of the order would be permitted only through published amendments. Part III and Control of the CIA Supervision Introduction The President has directed the Commission to determine whether existing safeguards are adequate to ensure that future domestic do not exceed the Agency's authority. examined CIx^'s external and internal controls. activities Control over the CIA is We CIA have, therefore, exercised both within the Agency and externally by control of policy, resources and operations. First, poli- and issued as guidelines. Second, resources such as money, property and personnel are allo- cies are established, written into regulations cated to activities consistent with this guidance. Third, direct supervision of CIA activities seeks to ensure that activities of the organiza- tion are consistent with policy guidance. In this part of the report, we first examine the supervision of the CIA externally and then explain how the CIA has been controlled internally. (70) Chapter 7 External Controls Because of the CIA's intelligence role and the resulting special need for secrecy, the Agency is subject to different external checks from other government agencies. It does not and fit within any regular pattern of executive supervision control. development during a period of "cold war," in which the needs for national security supported a broad construction of CIA's authority, limited control by Congress over its activities. Until recently, there has been little public scrutiny of its activities. Devices which have been utilized for external control of CIA are Its as follows: A. Control by the Executive Branch 1, The National Security Council and Related Bodies Primary executive control over CIA activities is exercised by the National Security Council (NSC), which by statute is responsible for supervising the CIA. Despite its nominally supervisory position, the control exercised by the NSC relates almost entirely to basic policies and allocation of resources. NSC determines where and how CIA should undertake some activities and their scope. The NSC generally does not consider the desirability of specific operational methods, questions of administrative management, or whether particular projects are within the CIA's the statutory authority. members of the NSC are the President, Vice President, and Secretaries of State and Defense; although not members of the NSC, the Director of Central Intelligence and the Chairman of the Joint Chiefs of Staff attend all NSC meetings as observers and The current advisers. (71) 72 I XSC CIA through National Security Council Intelligence Directives (XSCID's). Addressed to the entire intelligence community, they often assign responsibilities to the CIA in addition to those assigned explicitly hy the 1947 National Security Act. Each is issued under authority of that The establishes policy for the primarily Act. In general, these directives are broad delegations of responsibility; they do not focus on particular methods for meeting the assignments. To some extent, NSCID's may also limit the activities of the CIA by assigning tasks to other agencies. NSC CIA through two committees The XSC Intelligence Committee and the 40 Committee. The NSC Intelligence Committee, created in 1971 following the recommendation of a report on the intelligence community by James R. Schlesinger (then of the Office of ^Management and Budget), represents the viewpoint of users of intelligence estimates and evaluauthority over the is also exercised : ations. Its members are subcabinet officials, including the President's Assistant for National Security Affairs and the Director of Central Intelligence. It meets infrequently. The other NSC subcommittee, now named the 40 Committee,^ reviews foreign covert operations and collection activities involving high risk and has existed in some form since 1948, NSC first authorized the CIA to engage in such activities. It is now chaired by the Assistant to the President for National Security Affairs; it includes the Chairman of the Joint Chiefs of Staff and the Director of Central Intelligence as members, and has representatives from the State and Defense Departments as well. The investigation disclosed no cases in which domestic activities even those recognized by the Agency as highly sensitive were submitted to the 40 Committee for approval. In addition to the subordinate committees of the NSC, the President has, by Executive Order, established a Foreign Intelligence Advisory Board of private citizens to advise him on the objectives and management of the nation's intelligence effort and to conduct studies on specific topics of interest to him. President Eisenhower first established the Board in 1956. President Kennedy reorganized it in 1961, and gave it the assignment of reviewing the events at the Bay of Pigs. The Board has a staff of two but employs consultants and receives personnel on loan from intelligence agencies. It meets for twelve days each year (two days each two months). Meetings frequently consist of briefings by intelligence services and policymakers. sensitivity. It shortly after the — 1 40 So called because Its charter it does not have 40 members. — — Is contained In National Security Decision Memorandum 73 The Advisory Board does not CIA the is exert control over the CIA. In the Board's only source of information about CIA fact, activi- has not considered domestic intelligence acti\dties, except that in the early 1970's it explored the relationship between the CIA and the FBI in connection with foreign intelligence activities which could successfully be accomplished within the United States. Thus in June 1972, the Board recommended to the President that the jurisdictional lines be clarified, either legislatively or administratively, so that some government agency might undertake certain specific intelligence activities within the United States. ties. It Other Intelligence Committees 2. As one component services of the federal government's foreign intelligence —albeit the one with the widest authority—the CIA receives nominal direction and control from coordinating committees established by the NSC. The independence of these committees as a means of external control is limited, however, by the fact that they are chaired by the at least Director of Central Intelligence in his role as coordinator of the intelligence community. In this supervisory role over the entire intelligence community, the Director has issued directives (DCID's) addressed to all intelligence agencies including the CIA. These are similar to their NSC counterparts (NSCID's), but are more detailed. Their primary purpose is to allocate responsibility for intelligence-related activities several intelligence services. For example, one DCID among the spells out the procedures for treatment of foreign defectors within the United States and divides responsibilities in this area between the the CIA and FBI. In performing this oversight function, the Director is assisted by a staff of about 50 professionals assigned to him from the various intelligence agencies (including the CIA), normally headed by a flagrank military oificer. This Intelligence Community Staff provides the Director with support to coordinate the various intelligence services. In this role, the Director is also advised by two other organizations, the Intelligence Resources Advisory Committee and the United States Intelligence Board. The Intelligence Resources Advisory Committee, formed at the recommendation of the 1971 Schlesinger Report, advises the Director on the preparation of a consolidated intelligence program budget. The United States Intelligence Board, in existence since 1948, is composed of the heads of the principal foreign intelligence agencies. It advises the Director on the intelligence community's operating responsibilities. These include establishing intelligence needs and 74 priorities, ! producing intelligence evaluations and estimates, and super- vising the distribution of intelligence material. Of the Intelligence Board's eleven standing committees, the Security Committee has the greatest relevance to this report. It advises the Director on the protection of intelligence sources and methods from unauthorized disclosure. For example, it has proposed uniform standards of physical and personnel security and recommended investigations of some se- curity leaks. 3. Office of The Management and Budget Office of Management and Budget (0MB), an agency in the Executive Branch, supervises the budget of the federal government. In this connection, it controls the CIA's budget and, therefore, its resources, in much the same manner as it does for other government agencies. The CIA's proposed budget and support materials are revicAved by one budget examiner and his supervisor (who is also responsible for all other intelligence agencies) of the Office of Management and Budget. The impact of the 0MB budgetary process on some CIA activities is limited by the information supplied to 0MB by the CIA. For example, the proposed budget for the divisions of the Directorate of Operations lumps all personnel costs under a "Management Support" category rather than allocating them to functional areas within each division. Yet, personnel costs represent a large percentage of the directorate's budget. Budgets of other directorates reveal more de- tailed information. 0MB prepares a final CIA budget, with the President's approval, CIA disagrees with an 0MB recommendation, it may, and frequently does, appeal to the President. In accordance with the 1949 Act, the CIA budget is not identified in the budget submitted to Congress, but is included in other appropriation accounts. Congressional oversight committees are informed which for submission to Congress. If the portions of the budget are intended for the CIA. 0MB transfers them to the After Congress appropriates the funds, CIA under the authority of the 1949 Act. Other transfers of funds to the CIA may take place without approval under the Economy Act of 1932 (31 U.S.C. 686). Funds so transferred constitute significant portions of CIA expenditures. These funds are subject to oversight, however, since it reviews them when they are first proposed for inclusion in the budget of the transferring agency. also reviews CIA requests to make expenditures from its contingency reserve fund. This fund, replenished by annual appropriations as well as unobligated funds from previous CIA appropriations, is available for unanticipated needs. Although the Director has statu- 0MB 0MB OMB . i 75 tory authority to spend reserve funds without consulting 0MB, administrative practice requires that he first obtain the approval of and the chairmen of the appropriations subcommittees of the OMB Congress. OMB exercises control over resources allocated to the CIA. It does not control the CIA's operational activities, it is not an audit agency, and the budget process is not designed to establish intelligence policy is generally aware of the or to perform an oversight function. OMB large-scale trolled CIA by the but their approval or disapproval is conNational Security Council and its subordinate activities, committees. 4. The Department of Justice The Department of Justice is charged by bility of investigating statute with the responsi- and prosecuting criminal cases on behalf of the United States. In so doing, it exercises the President's Constitutional responsibility to take care that the laws are faithfully executed. Criminal prosecution is the most drastic form of external control of misconduct in official positions. In most federal agencies, a report of possible criminal conduct is investigated on a preliminary basis to determine whether there is any basis for it. If it appears to have some substance, it is referred to the Department of Justice for investigation and for a decision on whether there will be prosecution. CIA pointed out to the Department of Justice that, in many cases involving CIA, prosecution would require public disclosure of sensitive Agency operations and procedures. In 1954, the Even investigation and prosecutive consideration by outsiders would disseminate this information more widely than the Agency believed appropriate. The Department of Justice responded that the Agency should in- vestigate such allegations affecting its operations. If, after investiga- appeared that prosecution would be precluded by the need to reveal sensitive information, then the Agency should so indicate in its tion, it and not refer the case to the Department of Justice. In doing this, the Department of Justice abdicated its statutory duties and placed on the Director of Central Intelligence the responsibility for investigating criminal conduct and making the prosecutorial decision clearly law enforcement powers. (There is, however, no evidence that these powers were ever abused by the Agency.) This state of affairs continued until January' 1975, when the Department of Justice directed that cases with a potential for criminal files — prosecution be referred to it for consideration. 76 B. Control by the Congress /. Congressional Committee Oversight The armed services committees of Congress have exclusive legis- any bill, other than for appropriations, whose primary focus is on the CIA. These committees, therefore, exercise primary congressional policymaking control over the CIA. Each has delegated this authority over CIA matters to an intelligence subcommittee. The House subcommittee has seven members (and the approximate equivalent of one and one-half full-time professional staff members) The Senate subcommittee has five members (with a staff of lative jurisdiction over . similar size). Although not involved mittees also receive CIA in the appropriation process, these subcom- budget information supplied to the appro- priations subcommittees. Since there has been no substantive CIA legislation since 1947, the role of these intelligence subcommittees has generally been to exert policy-making influence informally through personal discussions with the Director of Central Intelligence. The appropriations committees also examine CIA activities in re- viewing CIA budget requests. Both appropriations committees rely on subcommittees to perform this task. The information submitted to congressional oversight subcommittees on the CIA budget is identical to that submitted to 0MB. It is considered in secret sessions of the subcommittees (whose chairmen are also chairmen of the parent committees) but is not revealed to the full committee membership or the Congress as a whole. There has been little further discussion in Congress (outside of the oversight committees) of the CIA's budget or activities except when they otherwise become matters of public discussion. After the CIA appropriation is passed, the chairmen of the appropriations subcommittees retain limited de facto fiscal control over the CIA. Before any of its contingency reserve fund is spent, they are consulted. On the other hand, the CIA is not required to notify Congress before shifting appropriated funds from one program to another. Neither the members of the oversight committees nor other members of Congress have generally received detailed information on CIA operations. Public hearings are not held. Although secret hearings are held, they are confined by the scope of the information made While it appears that the subcommittees or at least their leaders and the leaders of Congress have been informed of major available. ' ; 77 CIA activities,^ the amount of information provided does not always correspond with that available to Congress in other sensitive areas. In sum, congressional oversight of the CIA has been curtailed by and budget. At least until quite Congress has not sought substantial amounts of information the secrecy shrouding i i recently, its activities of a sensitive nature. Correspondingly, the CIA has not generally volunteered additional information. extend congressional oversight of CIA activities. Since 1967, three members of the Senate Foreign Relations Committee have been invited to attend intelligence briefings given to the Senate oversight subcommittees, but these briefings do There have been occasional not identify specific efforts to CIA operations. In addition, certain members of Congress have proposed more intensive congressional oversig'ht over the CIA. These proposals have usually been defeated. In January 1955, Senator Mansfield (Democrat-Montana) introduced a resolution to establish a Joint Committee on Central Intelligence; it was defeated 50 to 27. In 1966, the Senate Foreign Relations Committee proposed a Senate Committee on Intelligence Operations the proposal was defeated 61 to 28. However, the Hughes Amendment to the Foreign Assistance Act of 1974 prohibits CIA expenditure of funds "for operations in foreign countries, other than intelligence activities intended solely for obtaining necessary intelligence" unless the President determines that it is "important to the national security" and reports the operation to the "appropriate committees of the Congress, including the Committee on Foreign Relations of the United States Senate and the Committee on Foreign Affairs of the United States House of Representatives." Both the Senate and House recently formed select committees with temporary charters to investigate the activities of all intelligence agencies. 2. General Accounting Office The General Accounting Office (GAO) is responsible for making accounting and auditing reports to the Congress. It studies the efficiency, propriety, and legality of executive agency operations and conducts financial audits on its own initiative or at the request of a member or committee of Congress. The CIA Act of 1949 authorizes the Director of Central Intelligence to make confidential (unvouchered) payments; these payments, constituting approximately one half of total CIA spending, are beyond ^ A compilation from CIA files of its contacts -with Congress shows that over a five-year period (1967-1972) the CIA averaged 26 briefings of congressional committees or subcommittees per year and 81 briefings of individual members of Congress per year. : 78 the GAO's ing from audit authority. The 1949 Act further protects CIA spend- GAO challenge by providing that The sums made payable to the Agency may be expended without regard to the provisions of law and regulations relating to the expenditure of Government funds . For . . a time, GAO CIA; however, audited the nonconfidential expenditures of the after adoption of the 1949 Act, no challenges to the any payments were made. Any questions about the lawfulness of CIA expenditures were instead referred to the CIA's legality of Comptroller. When GAO broadened its activities in 1959 to include studies of CIA on a "trial basis." After two years, the Comptroller General (who heads GAO) decided that because of statutory and security restrictions on GAO audits of CIA activities, GAO "did not have sufficient access to make comprehensive reviews on a continuing basis which would produce evaluations help- agency efficiency, it included the ful to the Congress." GAO would not be worthwhile to continue its limited financial audits of the CIA. This decision to eliminate GAO audits of CIA activities was related to a CIA internal reorganization which increased the scope of its internal comptroller and audit operations. Since 1962, the GAO has not conducted any reviews at the CIA nor any reviews which focus specifically on CIA activities. also concluded that it C. Control by the Courts The CIA has only rarely been involved in litigation. In the CIA's have been only seven judicial decisions relating to it. None operated as a substantial check on the CIA's activities. The CIA's actions are not readily challenged in the courts. Most CIA activities relate to foreign intelligence and as a consequence are not reviewed by the courts. Moreover, since practically all of the CIA's operations are covered by secrecy, few potential challengers are even aware of activities that might otherwise be contested; nor can such history, there activities be easily discovered. The CIA from statutory requirements which often constrain government activities and are enforced by courts. For instance, the 1947 Act authorizes the Director to discharge employees whenever he deems "such termination necessary or advisable in the interests of the United States." This discharge power has been held to be unreviewable. Accordingly, employees have rarely initiated suits against the Agency for wrongful termination and have never is also specifically successfully done so. freed : 79 D. The Effects of Publicity i Eeports of CIA activities in newspapers and magazines and on vision are another form of external control on its activities. tele- Until recently, the secrecy which protected the CIA's activities effectively limited the impact of this control. Recent events indicate that the CIA will be subject to more intensive scrutiny in the press, but as a practical matter the news media cannot effectively "police" CIA activities. Publicity about the The CIA tends to be an unrefined control mechanism. relevant details; it may what cannot consider all be inaccurate and incomplete; and it may press can examine only have unintended results on is leaked; it CIA operations. E. Control by Special Commissions and Panels Since the creation of the CIA in 1947, it has been reviewed by a number of special panels, commissions and committees. Some were created in response to particular issues, most notably in 1961 after the Bay of Pigs and in 1967 after disclosure that nonprofit institutions had been used to assist the CIA. The primary studies were 1. Dulles, Jackson, Correa Report to the NSC on the CIA and study National Organization for Intelligence (January 1949) : A of the structure and organization of the CIA, existing CIA activities, and the relationship of those activities to those of other departments and agencies. 2. Jackson Report (President's Committee on International Information Activities) (June 1953) A survey and evaluation of : the international policies and activities of the executive branch. report on covert oper3. Doolittle Report (September 1954) : ations of the 4. A CIA. Clark Report (Task Force on Government Intelligence Ac- tivities) (May 1955) activities of the State : A survey of the CIA and intelligence and Defense Departments and the National Security Council. Sprague Report (President's Committee on Information A review of the impact Activities Abroad) (December 1960) of international actions of the United States government on world public opinion and on other governments, with particular reference to the CIA. 6. Kirkpatrick Report (Joint Study Group Report on Foreign Intelligence Activities of the U.S. Government) (December 1960) A series of recommendations to assist the Director of Cen5. : : tral Intelligence in coordinating foreign intelligence activities. 80 A study Kirkpatrick, Schuyler, Coyne Report (April 1962) of the organization and activities of the CIA and its relationship with other agencies in the intelligence community. review of the relation8. Katzenbach Report (March 1967) 7. : : A ships between government agencies and educational and volun- tary organizations which operate abroad. Lindsay Report on Covert Operations of the U.S. Government (December 1968) A study of supervision by Congress and 9. : within the 10. CIA of covert operations. OMB Report (Schlesinger Study of the Intelligence Com- munity) (March 1971) A study of the organization of the intelligence community and its cost-effectiveness. Most recommendations have focused on the organization of the intelligence community and were preludes to a reorganization. The Katzenbach Report ended CIA funding of educational and voluntary organizations. The issue of CIA activities within the United States was not given major attention by any other of these review panels. : Conclusions Some improvement in the congressional oversight system would be helpful. The problem of providing adequate oversight and control while maintaining essential security is not easily resolved. Several knowledgeable witnesses pointed to the Joint Committee on Atomic Energy as an appropriate model for congressional oversight of the Agency. That Committee has had an excellent record of providing effective oversight while avoiding security leaks in a highly sensitive area. One of the underlying causes of the problems confronting the CIA pervading atmosphere of secrecy in which its activihave been conducted in the past. One aspect of this has been the arises out of the ties secrecy of the budget. A new body needed to provide oversight of CIA within the' Executive Branch. Because of the need to preserve security, the CIA is not subject to the usual constraints of audit, judicial review, unlimited publicity, or open congressional budget review and oversight. Consequently, its operations require additional external control. The is authority assigned the job of supervising the sufficient power and CIA must be given significance to assure the public of effective supervision. The whereby the Agency determined whether its own employees would be prosecuted must not be permitted to recur. situation ' 81 Recommendation (3) The President should recommend to Congress the establishment of a Joint Committee on Intelligence to assume the oversight role currently played by the Recommendation Armed Services Committees.' (4) Congress should give careful consideration to the question whether the budget of the CIA should not, at least to some extent, be made public, particularly in view of the provisions of Article I, Section 9, Clause 7 of the Constitution.^ Recommendation (5) a. The functions of the President's Foreign Intelligence Advisory Board should be expanded to include oversight of the CIA. This expanded oversight board should be composed of distinguished citizens with varying backgrounds and experience. It should be headed by a full-time chairman and should have a fulltime staff appropriate to its role. Its functions related to the CIA should include: 1. Assessing compliance by the CIA with its statutory authority. Assessing Assessing Assessing Assessing the quality of foreign intelligence collection. the quality of foreign intelligence estimates. 3. the quality of the organization of the CIA. 4. 5. the quality of the management of the CIA. 6. Making recommendations with respect to the above subjects to the President and the Director of Central Intelligence, and, where appropriate, the Attorney General. 2. 3 Commissioner Griswold adds the following statement: "The assignment given to the Commission relates only to the domestic activities of the C.I. A. But the problems which have arisen in the domestic field cannot be fully understood and evaluated unless they are viewed against the role which the CIA has undertaken to play outside the United States. Because of the secret nature of its operations, legal and moral limitations may not always be kept in mind. In this situation, it should not be surprising that personnel, when working in the United States, should not always feel that they are subject to ordinary restraints. "Congress should, in my opinion, decide by law whether and to what extent the CIA should be an action organization, carrying out operations as distinguished from the gathering and evaluation of intelligence. If action operations were limited, there would be a lessened need for secrecy, and the adverse effect which the activities of the CIA sometimes have on the credibility of the United States would be modified. "One of the great strengths of this country is a deep and wide-flung capacity for goodwill. Those who represent us, both at home and abroad, should recognize the potentiality of that goodwill and take extreme care not to undermine it, lest their efforts be in fact counterproductive to the long-range security interests of the United States." * "No money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law; and a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time." 82 The Board should have access to all information in the CIA. It should be authorized to audit and investigate CIA expenditures and activities on its own initiative. (| authorized be should to c. The Inspector General of the CIA b. report directly to the Board, after having notified the Director of Central Intelligence, in cases he deems appropriate. 1 Recommendation (6) The Department of Justice and the CIA should establish written guidelines for the handling of reports of criminal violations by employees of the Agency or relating to its affairs. These guidelines should require that the criminal investigation and the decision whether to prosecute be made by the Department of Justice, Agency views regarding the impact of prosecution on the national security. The Agency should be permitted after consideration of conduct such investigations as it requires to determine whether its operations have been jeopardized. The Agency should scrupulously avoid exercise of the prosecutorial function. to r Chapter 8 Internal Controls The CIA relies on internal controls to ensure that policy commands are followed, that resources are used properly and efficiently and that activities are consistent with statutory authority. Seven major mechanisms, none of them peculiar to this intelligence agency, play a role: (1) The chain of authority; (2) requirements for coordination among various offices within the agency; (3) written internal regulations; (4) internal "watchdogs", including the legal counsel, inspector general, and auditors; (5) resource controllers of money, property, and personnel; (6) training courses; and (7) informal methods of communication. A central feature of the CIA's organization is its "compartmentation." For reasons of security, persons in one office are not informed of activities in other offices unless they have a "need to know." As a consequence, the on number activities within the of persons CIA is who are in a position to comment small. Even persons whose function it is to oversee or inspect CIA activities are sometimes denied complete access to operational details. On the other hand, compartmentation results in high-level, detailed approval of many activities more so than in most government — agencies. In addition, the secrecy of CIA activities creates additional problems for internal control. Individuals trained and accustomed to be secretive and to use unorthodox methods to perform their tasks may be tempted to employ this knowledge and experience to avoid close scrutiny. The sensitive and sometimes dangerous nature of the work of the CIA demands high standards of personal discipline, dedication, and patriotism. The investigation indicates that virtually all of the Agency activities criticized in this Report were known to top management, sometimes as a result of complaints of impropriety from lower-ranking employees. This shows, among other things, that the Agency's system of internal communication can operate. (83) 84 A. 1. Management and Administration Chain of Authority The Director of Central Intelligence is CIA and the head of the at chain of authority. He is also the principal foreign intelligence officer of the government and has duties extending beyond the the top of CIA. The its Director's duties in administering the intelligence community, handling relations with other components of the government, and passing on broad questions of policy leave him little time for day-today supervision of the Agency. His chief assistant (since 1953, of Central Intelligence by statute) is the Deputy Director (DDCI) In recent years, this position has been . occupied by a high-ranking military officer, with responsibilities for maintaining liaison with the Department of Defense, fostering the Agency's relationship with the military services, and providing top CIA management with necessary experience and skill in understanding particular intelligence requirements of the military. Generally speaking, the Deputy Directors of Central Intelligence have not been heavily involved in administration of the CIA. Each of the four major directorates within the CIA Intelligence, Operations. Administration, and Science and Technology is headed by a deputy director. They report directly to the Director of Central — — Intelligence. The Directorate of and dissemiinformation by monitoring Intelligence evaluates, correlates, nates foreign intelligence. It also collects foreign radio broadcasts. The Directorate of Operations (formerly called the Directorate for Plans) conducts the CIA's clandestine collection, covert operation, and counterintelligence activities. but it also operates an office Many of its employees work overseas, that collects foreign intelligence from Americans who volunteer information. The Directorate of Science and Technology conducts research and development projects related to devices used in intelligence collection and in counterintelligence. It also provides technical services and supplies for operating portions of the The CIA. Directorate of Administration (formerly called the Directorate of Support) handles housekeeping chores for the CIA tracting, communications, medical services, personnel security, finance such as con- management, and computer support. In addition to these operating branches, the CIA has a number of staff offices, including a General Counsel, an Inspector General and a Comptroller, Intelligence. who report directly to the Director of Central 85 The compartmented nature of CIA operations and the adherence to "need-to-know"' principles has restricted communication to lines of One directorate generally does not The Director of Central Intelligence authority within each directorate. share infornnation with another. is, as a consequence, the only person in a position to be familiar with Therefore he all activities. trol of the is the focal point for formal internal con- CIA. The impact of compartmentation is sharpened by the occasional practice of having lower echelon officers report directly to the Director of Central Intelligence. the normal chain of Such command special reporting authority outside existed both for the Office of Security and the Special Operations Group of the Counterintelligence Staff. This special reporting authority arose both from the need for tight security and the Director's interest in maintaining and continuing close contact with these sensitive activities. Informal practices have the effect of expanding the information flow within the CIA. Daily morning meetings are held by the Director with the deputy directors. Also present are the Inspector General, Comptroller, legal and legislative counsels and other top officials. These weekdav meetino-s include discussion of issues that otherwise would be handled only through the chain of authority. In addition, top CIA officials now meet regularly without the Director in the Agency Management Committee. A distinctive feature of the CIA is the absence of "outsiders"' in topmanagement. Unlike the typical executive agency, where not only the chief officer but also a group of top-level assistants are appointed from the outside, no such infusion occurs in the CIA. Almost all the top leadership for the past 28 years has been chosen from within the- level organization. 2. Coordination Requirements CIA supplement the chain of authority with requirements for consultation between offices. The need CIA for coordination has caused the to and certain types of operational activities are approved only after consultation among staff offices and sometimes sevBasic policies eral directorates. The coordination required varies with the activity. All regulations applicable to the entire agency must be reviewed by the directorates, the Inspector General and General Counsel before being approved by the Director of Central Intelligence. ^Vhenever an activity requires use of a new proprietary company, an administrative plan must be prepared by the operating component and approved both within the direct chain of authority and by the Offices of General Counsel, Finance, Comptroller, and Security, among others. 86 To the extent that CIA activities involve agency-wide regulations or proprietaries, the compartmented nature of the lessened by such coordination requirements. Agency is somewhat Nonetheless, field operational details, although they often are approved through the chain of authority, are not normally cleared at headquarters for logistic and financial support or legal authority. Decentralized control ly, effectively, is designed to allow the and rapidly, though it CIA to operate secure- sacrifices the opportunity for internal checks. Current requirements for coordination would not provide significant control over most of the CIA activities which are the subject of this Report. 3. Written Directives CIA Written regulations serve as an internal standard. The CIA by the 1947 National Security and 1949 CIA acts. Directives of the National Security Council and of the Director of Central Intelligence in his role as head of the intelligence community elaborate upon the basic guidance of Congress in setting forth the CIA's duties and responsibilities. CIA regulations translate these broad intelligence directives into specifics. In addition, CIA regulations spell out the basic missions and functions of each oiEce. They are readily available to all employees; as assignments and procedures change, amendments are made. CIA regulations are supplemented by oiRcial notices, which deal with policies of a transitory nature. Over 100 are issued each year. Handbooks give further details on administrative practices, security, salary and benefits, travel, accounting, procurement and other items of general concern. In addition, each directorate and staff office pubis given its basic policy direction lishes its own domestic activities. written guidance for employees. Some particular offices have also supplied detailed written guidance setting limits on their Agency which directives do not, in general, however, spell out in detail can or cannot be undertaken under the CIA's statute or policies. Agency-wide regulations rarely go beyond quoting the National Security Act of 1947 prohibitions in describing the limitations on CIA activities within the United States. A handbook of required regulatory reading for all CIA employees similarly does not discuss, beyond the barest outline, the 1947 Act's prohibitions on the exercise of police powers or internal security functions. Some changes have recently been made to improve guidance provided by written directives. A number of notices have been issued specifically dealing with CIA activities within the TTnited States and requiring office chiefs to prevent activities not authorized by the CIA's activities — 87 have set strict limitations on certain testing programs, surveillance of Americans at home and abroad, assistance to local law enforcement agencies, detailing of personnel to other agencies, and wiretaps, searches and seizures. Most are brief and relate to past incidents that have been questioned. These notices have not yet been written into permanent regulations. charter. Notices B. Staff Offices Three staff offices ^ are assigned responsibility to investigate activities throughout the CIA, respond to inquiries about their legality, and report their findings to the Director: the General Counsel, the Inspector General and the Audit Staff. The /. Office of The CIA's General Counsel legal counsel performs a dual role. On the one hand, supplies independent advice to the Director of Central Intelligence on the propriety under the Constitution, statutes, or regulations lie — of CIA activities. On the other hand, because the legal counsel is also part of the CIA's management that is responsible for carrying out assigned tasks, lie is subject to pressures to find legal techniques to facilitate proposed activities. The absence of clear legal standards in the many unusual situations which come to him complicates his problem in maintaining professional independence of judgment. The General Counsel and his staff of 14 lawyers are responsible for ])roviding legal advice to the Director CIA. They also and all other officials do miscellaneous legal tasks not involving of the legisla- tive liaison. Two features of this legal office are distinctive. First, one person served as the General Counsel for 27 years, from the time the Agency was created in 1947 until his retirement in 1974. Many particularly sensitive matters were handled by him personally. His successor has also served in the General Counsel's with one exception, the CIA. The General Counsel staff office for most of this period. Second, has been recruited entirely from within the involved in policy-making. He has been an active participant in drafting the basic delegations of responsibility to the CIA: the National Security Council Intelligence Directives is (NSCID's) and Director of Central Intelligence Directives (DCID's). He reviews all internal CIA regulations. 1 A fourth, the Office of Legislative Counsel, coordinates CIA relations with Congress and therefore does not exercise a significant internal control function. 88 I, implementing CIA policy. His office has been active in establishing proprietaries and other cover for operations. He is consulted on CIA immigration cases and reviews procurement contracts, administrative and liquidation plans for proprietary companies, and agreements between the CIA and non-governmental organizations. The General Counsel is sometimes asked by the Director and other officials within the CIA for formal or informal legal opinions on the The General Counsel CIA also participates in The maintains a collection of its legal opinions; they range over a wide assortment of topics from proper use of the confidential appropriated funds of the CIA to the authority for domestic activities in support of foreign intelligence. The General Counsel does not review and comment on all activities of the CIA. He does not have authority to initiate inquiries; rather he responds to requests for legal advice. Most of the activities reviewed in this Report do not appear to have been the subject of a legal opinion from the General Counsel until quite recently. Absence of written opinions alone does not necessarily indicate that the General Counsel was not consulted consultation was at times handled informally. The General Counsel and his staff have, however, testified that they were unaware of most of the specific CIA activities discussed in this Report. legality of activities. office ; The Inspector General The Inspector General and his staff of five professionals report to the Director. They review employee grievances, supervise equal em2. ployment practices, investigate reports of wrongdoing, and perform special management reviews of CIA activities. Under Directors with differing styles and management approaches, the Inspector General's role has varied. The size of the Inspector General's staff reflects the Director's view of the scope of appropriate oversight of the operating divisions and of the amount of reliance that management should place on the chain of command. Until quite recently, the Inspector General conducted component reviews of all CIA activities. Teams from the Inspector General's office visited each component and sought to determine the propriety and with which it conducted its activities. The teams were also concerned with morale, security and supervisoremployee relationships. The size of the Inspector General's staff has recently been reduced from fourteen to five professionals. As a result, it no longer conducts component reviews; instead, the Director relies on each deputy director and his staff to ensure proper management in his directorate. efficiency I ' i j \ i 89 Even when the Inspector General's office performed component views, the ability of such reviews to discover information The was re- re- could review each component only once every three to five years. In performing such reviews, the Inspector General's staff was sometimes refused access to particularly sensitive CIA activities stricted. office which the Director granted a Avaiver from inspection. Even with complete access, not all aspects of an office's activities could be exfor amined. Despite these limitations, the Inspector General frequently was aware of many of the CIA activities discussed in this Report, and brought them to the attention of the Director or other top management. The only program which was terminated as a result was one in 1963 involving exp^i-iments with behavior-modifying drugs on — unknowing persons. The focus of the Inspector General component reviews was on operational effectiveness. Examination of the legality or propriety of (!IIA activities was not normally a primary concern. In the last two yeare, the Inspector General has become a focal point for collection of information on questionable CIA In April 1973, the Director of Central Intelligence asked the Inspector General to coordinate the CIA's internal investigation of possible involvement with Watergate matters. A May 9, 1973, memorandum from the Director to all CIA employees requested that they report to him any activities that may have been improper. Although most such reports were through the chain of connnand, some came directly from employees of lesser rank. The obligation to report such activities to the Director or the Inspector General is now a standing order in the Agency. 3. activities. The Audit Staff While the Inspector General conducts general program reviews of CIA activities, more particular financial reviews are conducted by the Audit Staff. Although part of the Inspector General's office on the CIA table of organization, the Audit Staff operates separately. Its chief has direct reporting responsibility to the Director. of 36, few of whom With a staff the CIA, the have previously served elsewhere in Audit Staff conducts annual reviews of the financial records of all CIA activities. Field offices are reviewed on a random rather than an annual basis. The purpose of the audit is to ensure compliance with proper accounting procedures consistent with CIA financial regulations. To the extent possible, CIA regulations are similar to financial regula- on generally government. Auditors apply the standards of the American Institute of Certified Public Accountants. tions relied in the federal 90 In conducting a financial audit, the Audit Staff has available computerized information on all expenses of the office being audited. The Audit Staff' selects a few expenses of each office for particular examination. Activities using unusual accounting procedures or requiring large sums of money other than payroll expenses will normally be chosen. Although an auditor often is necessarily aware of the activities of an during this financial compliance review, he does not usually learn about the activities in great detail; his focus is on their financial office aspects. Within the past year, at the urging of the General Accounting Office, the Audit Staff has begun to review programs in addition to auditing for financial compliance. This is a limited project of about four program reviews per year and focuses on costly activities. Program reviews concentrate on the success of activities in achieving stated goals and on cost-effectiveness. Thev are not searches for illegal or improper conduct. C. Control of Resources 1. The Comptroller and the Budget Process Preparation of the annual troller, who CIA budget reports to the Director. is coordinated by the The Comptroller has Comp- a staff of fewer than twenty professionals, eight of whom are specifically assigned to review the budgets of the four directorates. Because these budget reviewers usually are assigned to the Comptroller from directorates and have not had budget experience, they serve as advocates for their directorates as well as comptrollers reviewing funding requests. Every division within the CIA prepares a budget which is reviewed within each directorate or staff office before being forwarded and compiled by the Comptroller. Detailed scrutiny of budgets is done pri- marily within the directorates. The Comptroller focuses only on major issues, involving large sums of money, major new initiatives or activities of special concern to the Director. In reviewing the budget, the Comptroller's staff' generally examines allocation of resources only if they exceed $30 million or employ over 200 persons. More limited activities would not be closely examined in the budget process at the Comptroller level. His focus is on questions of cost and effectiveness. Rarely, if ever, has the propriety of an activity been an issue for the Comptroller, unless some unusual funding pattern is involved. The Comptroller presents the budget to the Director of Central 91 then sent to the Oflfice of Management and Budget for review before submission to Congress. After Congress appropriates funds, the Comptroller releases them to the directorates. Lump sums are given to each directorate, with instructions that the Intelligence for approval. It is Comptroller is to be notified only of any internal apportionments of funds that constitute substantial changes from the original budget. The Comptroller also provides fiscal guidance to the directorates, including instructions on when the Director is to be kept advised of the progress of certain activities. The principal detailed budgetary control of specific —apportionment for the future— grams CIA pro- of funds, evaluation of activities, and plan- performed outside the Comptroller's office. Within the past two years, staff officers in each directorate have been using a "management-by-objectives" system that seeks to relate need for funds to the Director's program goals. Periodic reports are made to the deputy directors and to the Director of Central Intelligence. ning is The 2. Office of Finance While the Comptroller prepares the budget and apportions funds to the directorates, the Office of Finance handles actual payment of expenses. Within the Directorate of Administration, this chief finandoes not report directly to the Director of Central Intelligence. The Office of Finance's responsibilities include processing the payroll, maintaining centralized financial records, auditing private cial officer contractors, disbursing cash and purchasing foreign currencies. The responsibility most closely related to internal control of vouchers for expenditures. Finance officers assigned to each is the verification all vouchers. all They office and station must approve are responsible for preventing expenditure of funds in violation of CIA regulations. Financial regulations do not, however, explicitly describe what activities are prohibited by the CIA's charter. Finance officers therefore rarely questioned the activities 3. described in this Report. Property Controllers A number of the activities described in this Report require use of particular types of property; wiretaps, for instance, require special electronic devices. This property is maintained in various offices with- CIA. Operating components needing to use this property must obtain it from the office that maintains an inventory. Inventory management controls exist in most offices, but they have not always been in the oriented toward ensuring legitimate use of equipment. New controls have been established (since 1972) over the loan of disguise materials and alias documents. Their use must now be ap- 92 proved by designated senior plated use ; who can centralized, detailed records tions require their return 4. officials list question the contem- their location and regula- when no longer needed. Personnel Controllers General personnel policies are formulated and personnel administration is conducted in the Office of Personnel in the Directorate of Administration. The Office of Personnel has some contact with operational activities when it approves agreements with contract officers and validates job ratings and salaries. In these capacities, although the Office learns some operational details, it does not monitor the activities. Occasionally, activities whose propriety personnel office's attention. and Disability System is is questionable come to the For example, the CIA's special Retirement available only to certain employees who have served overseas or in "qualified" domestic activities; the Office has forwarded information from employee applications for this program to the Inspector General's office for scrutiny when questionable domestic activities were mentioned. D. Other Information Channels 1. Training The CIA's has long worked closely with the Directorate of Operations to train agents in Office of Training, first established in 1951, the special skills necessary for clandestine operations. In recent years, the Office has expanded its curriculum and now offers more than 60 courses on world affairs, management theories and techniques, foreign languages and intelligence evaluation and production. One course is required of all new professional CIA employees the three-week introduction to International and World Affairs deals with the nature of intelligence work and the organization ; of the CIA. iVlthough a brief introduction to the statutory framework of the CIA is included in the course, detailed discussions of the domestic limitations on the CIA is not. Communication Outside the Chain of Authority The Management Advisory Chrowp. In 1969, the Executive Director-Comptroller (a position now vacant) established a INIanageagement Advisory Group consisting of 14 mid-level officers (three from 2. — each directorate and two from the Director's staff) to discuss CIA policies and activities with the Director of Central Intelligence. The Group meets monthly with the Director and conducts inquiries into CIA practices. CIA employees are informed of the Group's existence 93 through notices and are encouraged to submit suggestions for areas needing review. The Group's focus has been on areas of improved personnel management. In 1970, however, it questioned the propriety of a number of CIA activities within the United States, particularly Operation CHAOS. The Group sought and received assurance that these domestic activities had been properly approved. Within the last two years, similar advisory groups have been created in each directorate. Conclusions In the final analysis, the proper functioning of the Agency must depend in large part on the character of the Director of Central Intelligence, The best assurance against misuse of the Agency lies in the appoint- and independence to resist improper pressure and importuning, whether from the White House, within the Agency or elsewhere. Compartmentation within the Agency, although certainly appro- ment to that position of persons with the judgment, courage, priate for security reasons, has sometimes been carried to extremes which prevent proper supervision and control. The Agency must rely on the discipline and integrity of the men and women it employs. ]Many of the activities we have found to be improper or unlawful were in fact questioned by lower-level employees. Bringing such situations to the attention of upper levels of management is one of the purposes of a system of internal controls. Recommendation (7) Persons appointed to the position of Director of Central Intelligence should be individuals of stature, independence, and integrity. In making this appointment, consideration should be given to individuals from outside the career service of the CIA, although promotion from within should not be barred. Experience in intelligence service is not necessarily a prerequisite for the a. position; management and administrative skills are at least as important as the technical expertise which can always be found in an able deputy. b. Although the Director serves at the pleasure of the President, no Director should serve in that position for more than 10 years: Recommendation (8) a. The Office of Deputy Director of Central Intelligence should be reconstituted to provide for two such deputies, in addition to 94 the four heads of the Agency's directorates. One deputy would act as the administrative officer, freeing the Director from dayto-day management duties. The other deputy should be a military officer, serving the functions of fostering relations with the military and providing the Agency with technical expertise on milltary intelligence requirements. The advice and consent of the Senate should be required for the appointment of each Deputy Director of Central Intelligence. j b. Recommendation (9) a. The Inspector General should be upgraded The to a status equiv- General should be staffed by outstanding, experienced officers from both inside and outside the CIA, with ability to understand the various branches of the Agency. c. The Inspector General's duties with respect to domestic CIA activities should include periodic reviews of all offices within the United States. He should examine each office for compliance with CIA authority and regulations as well as for the effectiveness of their programs in implementing policy objectives. d. The Inspector General should investigate all reports from employees concerning possible violations of the CIA statute. e. The Inspector General should be given complete access to all information in the CIA relevant to his reviews. f. An effective Inspector General's office will require a larger staff, more frequent reviews, and highly qualified personnel. g. Inspector General reports should be provided to the National Security Council and the recommended executive oversight body. The Inspector General should have the authority, when he deems it appropriate, after notifying the Director of Central Intelligence, to consult with the executive oversight body on any CIA Office of Inspector activity (see Recommendation I ; alent to that of the deputy directors in charge of the four directorates within the CIA. b. i 5). Recommendation (10) a. The Director should review the composition and operation of the Office of General Counsel and the degree to which this office is consulted to determine whether the Agency is receiving adequate legal assistance and representation in view of current requirements. b. Consideration should be given to measures which would strengthen the office's professional capabilities and resources : 95 among other things, (1) occasionally departing from the existing practice of hiring lawyers from within the Agency to bring in seasoned lawyers from private practice as well as to hire law school graduates without prior CIA experience; (2) occasionally assigning Agency lawyers to serve a tour of duty elsewhere in the government to expand their experience; (3) encouraging lawyers to participate in outside professional activities. including, Recommendation (11) To a degree consistent with the need for security, the CIA should be encouraged to provide for increased lateral movement of personnel among the directorates and to bring persons with outside experience into the Agency at all levels. Recommendation (12) a. The Agency should issue detailed guidelines for its employees further specifying those activities within the United States which are permitted and those which are prohibited by statute, Executive Orders, and NSC and DCI directives. b. These guidelines should also set forth the standards which govern CIA activities and the general types of activities which are permitted and prohibited. They should, among other things, specify that Clandestine collection of intelligence directed against United States citizens is prohibited except as specifically permitted by law or published Executive Order. —Unlawful methods or activities are prohibited. Prior approval of the DCI shall be required for any activities which may raise questions of compliance with the law — — or with c. Agency regulations. The guidelines should also provide that employees with in- formation on possibly improper activities are to bring it promptly to the attention of the Director of Central Intelligence or the Inspector General. Part IV Significant Areas of Investigation : Introduction This Commission was charged with determining whether any activities of the CIA within the United States exceeded its statutory authority. We have, therefore, extensively inquired into the CIA's do- mestic activities and related matters over the years. The next 11 Chapters of this Report detail our findings and analyze those activities that bear special scrutiny. The Commission met weekly, beginning on January 13, 1975, to hear testimony from witnesses familiar with CIA domestic activities. The Commission heard 51 witnesses, including the four living former Directors of Central Intelligence, rent and former of State CIA tlie current Director, 28 other cur- employees, the Director of the FBI, Secretary Henry A. Kissinger, former Secretary of State Dean Rusk three former Presidential Advisers for National Security Affairs, McGeorge Bundy, Walt W. Rostow and Gordon Gray and ; five experts and privacy. A transcript of all testimony by these witnesses was made. More than 2,900 pages of sworn testimony were collected. In addition to testimony before the Commission, many additional witnesses were questioned under oatli by the Commission staff, or signed sworn affidavits. The staff was divided into four teams for purposes of the investigation. Three two-man teams conducted the factual investigation. The fourth team researched the legislative history and other Constitutional and statutory limitations on the CIA and investigated its internal and external controls. These four teams presented the most important evidence through witnesses who appeared before the Commission. They also made available to tlie Commission summaries of all interviews and documentary evidence that they discovered. on individual liberties The Commission's and personnel, investigation attempted, within the limits of time to discover all pertinent witnesses and documents dis- closing the nature of the CIA's domestic activities. Members of the staff spent weeks at tlie CIA and elsewhere inter- viewing personnel, and reviewing files, computer systems and written memoranda on activities within the United States. (98) 99 The Commission was given access to all CIA files that the sion ascertained conld be pertinent to a full investigation. Commis- Some files were reviewed in their entirety others were sampled at random. The documentary holdings of the CIA were much too large for an investigation or examination of all papers. Nevertheless, we believe that this investigation covered all areas of the CIA likely to have been involved in domestic activities, and examined closely those witnesses and documents most likely to contain pertinent information on such ; activities. : Chapter 9 The CIA 's Mail Intercepts During the early CIA the 1950's, at the height of the so-called cold war, initiated the first of a series of programs to examine the Communist countries for purDuring the years since that time, mails between the United States and poses of gathering intelligence. interception and examination ^ of the mails for intelligence purposes was carried out at various times by the CIA at four different locations in the United States, until the last projex?t was terminated in 1973. An intercept project in New York City was the most extensive of the CIA mail operations, and lasted for twenty years. Three Postmasters General and one Attorney General were informed of the project to varying degrees. The CIA, the record discloses, was aware of the- law making mail openings illegal, but apparently considered the intelligence value of the mail operations to be paramount. The stated purpose of the New York mail intercept project was described in the report of the Chief of Counterintelligence" presented to Director James E. Schlesinger in 1973 when termination I)est of the project The mail was being considered. The report stated a basic counterintelligence asset designed to give United States intelligence agencies insight into Soviet intelligence activities and intercept project is interests.^ mail projects carried out by the Agency during the same period occurred in San Francisco. Hawaii and New Orleans. The intercept in San Francisco took place during four separate periods of a month or less in 1969, 1970 and 1971. The one in Hawaii occurred Three otlier in late 1954 and early 1955: and the New Orleans intercept lasted only about three weeks, in 1957. 1 Mail intercepts or mail openings involve the opening and examination of the contents of Mail cover operations involve only examination and copying information on the letters. outside or covers of letters. - Amonp these Soviet activities USSR is censored by the Soviets. was mail censorship. Presumably all mail to and from the (101) : 102 In addition, the Office of Security, acting alone over a 24-year period, ran over 91 separate mail cover operations and conducted about 12 mail openings relating to particular individuals within the United States. Most of the cases involved CIA employees under investigation, although some of the activity was directed against foreign nationals and some against citizens wiio had no connection with the CIA. This chapter discusses and analyzes these projects, concludes that the interceptions were illegal and improper, and recommends steps to prevent their reinstitution. A. East Coast Mail Intercept 1. Inception of the Project During 1952, interception of mail was perceived by the CIA as a was willing to devote the technical personnel and resources that would be required to carry such an operation into effect. Nevertheless, the CIA recognized the necessity for caution in approaching the subject potential source of intelligence. The Agency concluded that it with the postal authorities. The Chief of the Special Security Division said in a planning memorandum dated July 1, 1952, "I believe we should make contact in the Post Office Department at a very high level, pleading relative ignorance of the situation and asking that we, with their cooperation, make a thorough study of the volume of such mail, the channels through which it passes and particularly the bottlenecks within the United States in which we might place our survey team." The Post Office Department was initially to be approached with a request that the CIA be allowed to examine only the outside or covers of the mail. The actual ultimate intent of the CIA was, however, made clear in the last paragraph of the July 1, 1952, memorandum Once our unit was in position, its activities and influence could be extended gradually, so as to secure from this source every drop of potential information At the outset, however, as far as the Post Office is concerned, our mail target could be the securing of names and addresses for investigation and possible further contact. available. The memorandum also outlined the possible benefits of such a pro- gram. It would allow determination of the nature and point of origin of communications from the Soviet Union. Technical analysis of the mail might also reveal secret communication methods. By September 30, 1952, the Office of Security of the CIA had determined, through its investigation of the mails in the United States, the volume of mail flow from the Soviet Union. Security had also determined from the FBI that the Bureau then maintained no records 103 of correspondence between United States and Soviet citizens except that which was uncovered incidentally in investigation of internal security or espionage cases. The Security Office requested the Deputy Director for Plans to inform the Director of Central Intelligence that Security planned to undertake activities to accumulate information on all letter envelopes, or covers, passing through New York City, originating in the Soviet Union or destined for the Soviet Union. Security noted that the Operation would require the cooperation of Department and the FBI. The sensitivity of the operation was deemed "patently obvious." On November 6, 1952, the CIA wrote to the Chief Postal Inspector and asked that arrangements be made for one or two designated CIA employees to work with a Postal Inspector in securing certain information from the mails. The expressed intention was to examine the the United States Post Office outside of envelopes only. Arrangements were made on December 8, 1952, with the Chief Postal Inspector to survey all mail to and from the Soviet Union passing through New York City, and to provide for selective photographing of the envelopes or covers. The mail was removed in bulk from the regular Post Office channels for purposes of examination, and by December 18 the Office of Security had completed the survey of how all mail passing to and from the Soviet Union was handled through New York. By September 1953, the mail operation had been in progress for about a year. Analysis by the Agency of the materials examined showed that the CIA had gained both substantive and technical intelligence. This was deemed sufficiently valuable to warrant expansion of the project and the photographing of all the mail covers passing through the New York Post Office to and from the Soviet Union. On December 23, 1953, Security reported to the CIA's Director of Operations that it was ready to install the photography equipment at the Post Office and that the Post Office would cooperate by making the mail available to the CIA agents. Both sides of all first class mail were to be photographed. The December 23 memorandum closed by suggesting that the support of Allen Dulles, then Director of Central Intelligence, be solicited for securing Post Office approval of this second step Agency documents show that by (and probably as early as February 1953) selected items of the mail were already being opened and the contents analyzed by the CIA. of the venture. 2. Initial this time Contact with the Postmaster General In a memorandum to the Director of Central Intelligence dated January 4, 1954, the Director of Security explained that the Postal Inspectors were unwilling to go forward without higher authorization from within the Post Office Department. Security suggested to the 104 DCI made for a meeting between who had already been briefed that arrangements be the Postmaster General, DCI and generally on the the project by the Chief Postal Inspector and was waiting for the Director's call. The Director of Security said that in his meeting with the Postal Inspectors, no mention was In fact, the FBI made of informing the FBI. apparently did not become aware of the mail project February of 1958. On May 17, 1954, Allen Dulles and Richard Helms, the latter then Chief of Operations in the Plans Directorate, met with Postmaster General Arthur Summerfield and three of Summerfield's assistants. According to Helms' contemporaneous memorandum of the meeting, Dulles described the importance of the mail program and asked that it be allowed to continue. No mention appears to have been made of covert mail opening. Summerfield made no specific comment but, according to Helms' memorandum, it was clear that he was in favor of giving the CIA any assistance he could. Helms' memorandum pointed out that Director Dulles, during the conference, did not mention the potential for passing material on internal security matters to the FBI and thought it would be better to leave that until a later date. until four years later, in 3. Formal Counterintelligence Proposal By had eight full-time employees and several others on a part-time basis engaged in opening the mail. The project was ready to be expanded. The Chief of Counterintelligence asked Helms, by memorandum dated November 21, 1955, for formal approval of a new counterintelligence program in conjunction late 1955, the Office of Security with the mail project. The Counterintelligence which had previously not been involved with the project, proposed that the CIA expand the operation and "gain access to all mail traffic to and from the USSR which enters, departs or transits the United States." Counterintelligence further suggested that the "raw information acquired be recorded, indexed, analyzed and that various coinponents of the Agency be furnished items of infonnation." According to the November 21 memorandum, the only added function that would be performed by the Office of Security was that "more letters will be opened." "They are presently able to open only a very limited number." The project description which accompanied the November 21 memorandum noted that the mail opening did not have the express or tacit approval of the postal authorities. It also recognized that "there is no Staff, overt, authorized or legal censorship or monitoring of first-class mails which enter, depart, or transit the United States at the present time." It could be assumed, therefore, the proposal said, that foreign espionage agents used the mail as a means of communication, relying upon the policy of the government against any monitoring of mail. Because — 105 of this policy, however, it was conceded that any disclosure of the mail project would probably cause "serious public reaction in the United perhaps leading to a congressional inquiry." But, the project description said, "it is believed that any problem arising could be satisfactorily handled." The proposed counterintelligence project was approved by the Deputy Director for Plans and the Director of Security in January 1956, but dilRculties in organization delayed commencement of operations until approximately November 1956. States, FBI 4. Liaison with the Mail Project In January 1958, the FBI approached the Post Office Department for the purpose of instituting similar coverage of mail to and from the Soviet Union. The Post Office Department brought the Bureau's request to the Agency's attention, and shortly thereafter CIA representatives told the FBI of the Agency's ongoing mail project. Up to that time, the CIA had avoided telling the FBI of the mail project and no materials derived from the project were disseminated to the FBI. Discussions between Agency and Bureau representatives in February 1958 resulted in an agreement that the CIA would send to the FBI mail project items which were of internal security interest. The FBI, in turn, would provide the Agency with watch lists of particular persons or matters in which the Bureau was interested. The Bureau agreed with the CIA's suggestion that the project should be handled by the CIA alone. Eventually, the FBI would become, by far, the principal recipient of mail project materials outside of the CIA's Counterintelligence Staff. 5. The Mail Project in Full Operation The mail opening project, which started in the early months of the operation with only a few letters, had expanded by 1959 to include opening of over 13.000 letters a year. By 1961, the CIA had tlie installed a small laboratory for technical examination of letters to uncover for- eign espionage techniques of communication. physical scanning of the mail was performed by CIA officers in a facility located at the New York intercept. The envelopes of let- The during the scanning process were photographed, opened and the contents photographed. The letters were then resealed. Technical testing of some of the letters and their contents was also accomplished at a CIA facility in the region. Copies of letters were analyzed ters selected in CIA headquarters. Individuals or organizations of particular intelligence interest were specified in watch lists provided to the mail project by the Counterintelligence Staff, by other CIA components, and by the FBI. The total 106 number of names on the watch from time to time, but on the average, the list included approximately 300 names including about 100 furnished by the FBI. The watch list included the names of foreigners and of United States citizens. Operation CHAOS (see Chapter 11), in an effort to focus the mail project upon communicalist varied, tions of dissidents, provided the mail project with a American watch list of 41 citizens. Dissemination of the information derived from the mail intercept was made to those CIA departments which filed watch lists. The principal user of the information within the CIA was the Counterintelligence Staff. Information of an internal security nature derived from the intercept was forwarded to the FBI. Second Briefing of a Postmaster General With the inauguration of the Kennedy Administration in 1961 and the appointment of a new Postmaster General, consideration was again given in the CIA to briefing high postal officials on the program. The Deputy Chief of Counterintelligence pointed out in a January 27, 6. 1961, any memorandum official ing mail."' no record in any conversation with Department that we have admitted open- that "there of the Post Office is The memorandum continued that although "all conversa- tions have involved examination of exteriors," it nevertheless seemed "quite apparent that they must feel sure that we are opening mail." No further explanation was given to support the last remark. Counterintelligence suggested to Kichard Helms, then the Deputy who was about meet with J. Edward Day, the new" Postmaster General, that ". if the Postmaster General asks if we open any mail, we confirm that some mail is opened. He should be informed, however, that no other person in the Post Office has been Director for Plans, . to . so informed." Allen Dulles, Director of Central Intelligence, accompanied by Helms and another CIA officer met with Postmaster General Day on February 15, 1961. According to Helms' memorandum for the record made the following day, the CIA representative told Day "the background, development and current status (of the mail project), withholding no relevant details." The Postmaster General, according to Helms' memorandum, ended the February 15 meeting by "expressing the opinion that the project should be allowed to continue and that he did not want to be informed in any greater detail on its handling." Whether the "relevant details'* told to Day included the fact of mail openings is not entirely clear. Day testified on May 7, 1975, before the House Committee on the Post Office and Civil Service that, when Dulles came to visit on February 15, 1961, and said he had something "very secret" to talk about. - : 107 Day responded Dulles did not Helms that he would rather not tell know about the secret, and so him about it. stressed in his testimony that, while he could not recall the specific conversation, his memorandum of February 15, 1961, states was withheld. An August 1971 note on the subject, apparently written by the chief of the mail project, tends to point the other way. In any event, the mail project continued. that no information Consideration of "Flap Potential" and Cover Stories 7. Concern over the "flap potential" of the mail project appeare to have been constant. Even the CIA's Inspector General, after a review of the Office of Security in 1960, had recommended preparation of an "emergency plan" and "cover story" if the mail project were some- how revealed. Despite general realization in the Agency of the dan- gers involved, the Inspector General in the 1960 review did not suggest termination of the project or raise the issue of its legality.^ Detailed consideration of the "flap" problem was set forth in a memorandum sent by the Deputy Chief of Counterintelligence to the Director of Security on February 1, 1962. This attention. It conceded that everyone realized memorandum warrants from the outset of the mail project that "... a flap would put us [the project] out of business immediately and give rise to grave charges of criminal misuse of the mail by government agencies." It had been decided, however, that "the effort was worth the risk." It was assumed that any compromise of the project would "unavoidably be in the form of a charge of violations of the mails." The memorandum continued Since no good purpose can be served by an official admission of the violation, and existing Federal Statutes preclude the concoction of any legal excuse for the violation, it must be recognized that no cover story is available to any govern- ment agency. * * * * * - ')' Unless the charge is supported by the presentation of interior items from the project, it should be relatively easy to "hush up" the entire affair, or to explain that it consists of legal mail cover activities conducted by the Post Office at the request of authorized Federal Agencies. Under the most unfavorable circumstances, including the support of charges with interior items from the project it might become necessary, after the matter has cooled off during an extended period of investigation, to find a scapegoat to blame for unauthorized tanii>ering with the mails. The response of the CIA to this Commission's inquiries on the mail project was the opposite of that suggested in the CIA files and personnel connected with the mail A memorandum. All project appear to have July 1969 Inspector General review of the Counterintelligence Staff, however, did of Plans discuss with the Director of Central Intelligence the transfer of the mail operation to the FBI or in the alternative that the project be cancelled. The recommendation was not followed. 3 recommend that the Deputy Director 108 made Commission staiT, and a detailed, accurate description of the project was provided to the Commission by the former Chief of Counterintelligence. The 1962 memorandum is, however, significant because it shows the thought processes of those involved and illustrates the need for a method of periodic review of CIA operations by objective persons. A further indication that the CIA was aware of the possible criminality of the mail project exists in a September 26, 1963, memorandum by the officer in charge of the mail project to an officer in the CIA's Operations Division. That memorandum states "there is no legal basis for monitoring postal communication in the United States except dur." The Commission staff ing time of war or national emergency found nothing in the CIA records indicating that the Agency's legal counsel was asked to give an opinion on the mail intercept prior to its been available to the . inception. As . previously noted, the Inspector General, in looking into the project in 1960, simply proposed that an adequate "cover story" be developed. Substantial consideration was given again to the possible efforts of exposure of the operation, after testimony before a Senate subcommittee in April 1965 had apparently indicated that governmental agencies were "snooping into the mail." According to a contemporaneous memorandum of an April 25, 1965, conference which included Deputy Director for Plans, Thomas Karamessines, consideration was given to suspending the mail project pending the conclusion of the Senate hearings. The idea was rejected because the project was deemed sufficiently secure and the project's facilities at the post office could be dismantled and removed on an hour's notice. Consideration was given during the April 25 meeting to briefing the Assistant Postmaster General Gronouski about the project because no officials then in the Post Office Department had been briefed. This was rejected because of testimony which Mr. Gronouski had given before the Senate subcommittee. The Assistant Deputy Director for Plans instead gave instructions that "steps be taken to arrange to pass this information through McGeorge Bundy to the President" after the subcommittee investigation was completed. No evidence could be found to confirm that President Johnson was ever advised of the project. 8. The Appointment of William Cotter, a Former CIA Officer, as Chief Postal Inspector On April 7, 1969, William J. Cotter, previously a security officer in the Plans Directorate, was sworn in as Chief Postal Inspector of the United States Post Office Department. Cotter was recommended for the position by Richard Helms, who, along with the heads of other governmental components, had been asked by Postmaster General Blount for suggestions as to persons who might fill the Chief Inspec- 109 Cotter was considered the best qualified among three or four persons suggested to Helms by the CIA's Director of Security. Cotter had been with the Agency since 1951, and from 1952 through tor's job. 1955 he had served as deputy head of the CIA field office which coordinated the East Coast mail intercept. Cotter knew of the project from and he was aware that letters were opened surreptitiously. Although Cotter had no direct contact with the mail intercept project from 1956 to 1969, when he was appointed Chief Postal Inspector, he knew that it was still in operation. As Cotter left the CIA headquarters on April 8, 1969, to be sworn in as Chief Postal Inspector, he coincidentally met an officer in the outset its Counterintelligence Staff. A CIA memorandum for the record of the same date sets forth the substance of the conversation which ensued. According to that memorandum. Cotter was concerned that circumstances in his new position might compel him to reveal the existence of the mail project. If he were asked about mail intercepts under —unlike oath. Cotter his predecessor —could not truthfully state he tliought the project involved only mail "covers." Further, because of his if CIA background, he would be in a particularly precarious position the project were compromised. According to the April 8 memorandum. Cotter said he planned to enter his new job without making inquiries about the project, and he planned to do nothing about the project unless it was mentioned to him. Cotter said that eventually he would probably inspect the mail intercept facility and might find it necessary to brief Postmaster General Blount. But, according to the memorandum. Cotter assured the counterintelligence officer that he would not take any action without consulting first with the CIA. 9. Cotter's Dilemma About the Mail Project In January 1971, Cotter, as Chief Postal Inspector, received a letter from an association of American scientists inquiring about possible Post Office acquiescence in opening first-class mail. Cotter apparently forwarded a copy of the letter to the CIA. A CIA memorandum in March 1971 indicates that Cotter also was concerned that the impending alteration of the Post Office Department from a governmental agency to a corporation in mid-1971 might cause organizational changes which would result in revelation of the mail project. Before tliis Commission, Cotter testified that the reorganization was not of major concern to him in this respect. In any event. Director Helms convened a meeting of his associates on May 19, 1971, to discuss the mail project. The May 19 meeting was attended by the Deputy Director for Plans, the Director of Security, the Chief and the Deputy Chief of Counterintelligence, and the officer in charge of the mail project. According to a memorandum made no I after the meeting, the discussion in part concerned the extent of knowledge of the project outside the CIA and the likelihood of exposure. Thomas Karamessines, now Deputy Director for Plans, was particularly concerned about compromise of the project because it would cause the CIA "the worst possible publicity and embarrassment." Cotter's "dilemma" was evident. While he was presumably loyal to the CIA, he could not deny knowledge of the project under oath and, furthermore, in his master General. new job his loalty belonged to the Post- Karamessines suggested during the meeting that the mail project be handled by the FBI. As he said, "they could better withstand such publicity, inasmuch as it is a type of domestic surveillance." The Counterintelligence Chief responded that his staff regarded the operation as foreign surveillance and that the FBI did not have the facilities or trained personnel to take care of the operation. The Chief of Counterintelligence also contended that the CIA could live with the — known risks and should continue the project. Director Helms decided to discuss the matter with Cotter and deter- mine whether Postmaster General Blount should be informed. Helms then met with Cotter, and it was agreed that higher level approval in the Post Office Department for the mail project was necessary. Helms said he would first talk with the Attorney General. 10. Helms Briefs the Attorney General and the Postmaster Gen- on the Mail Project The Director met with Attorney General Mitchell on June 1 and with Postmaster General Blount on June 2, 1971, to discuss the mail project. Helms reported on June 3, 1971, to the Deputy Director for Plans, the Director of Security, and the Counterintelligence Chief that Attorney (xeneral Mitchell had fully concurred in the value of the operation and had no "hang-ups" concerning it. Mitchell also reportedly encouraged Helms to brief the Postmaster General. Helms said he met with Postmaster General Blount and showed him selected items derived from the project and explained Cotter's situaeral according to Helms, was "entirely positive regarding the operation and its continuation." Further, Blount felt "nothing needed to be done" and rejected a "momentarily held thought" to have someone review the legality of the project because to do so would widen tion. Blount, the circle of knowledgeable persons. The project was therefore con- tinued with Director Helm's admonition that if there were even a sus- picion of a leak, the project was to be stopped; investigation could be made later.* staff, Mr. Blount said he could not Helms. Mr. Mitchell's attorney, in response to a staff inquiry, said that Mitchell could recall the conversation with Helms but thought they had only discussed mall covers. * In a telephone Interview with the Commission recall the specifics of his conversation with | Ill Termination of the East Coast Mail Project 11, Postmaster General Blount resigned his cabinet post later in 1971 and Attorney General Mitchell resigned at the end of February 1972, leaving Cotter as once again the senior governmental official outside the CIA with knowledge of the mail project. Cotter expressed his misgivings about the propriety of the project and his continuing concern about the conflict in his loyalties in a conversation with Mr. Karamessines and the Chief of the Cotter said that unless the Office of Security. Finally, in early 1973, CIA obtained higher level approval for the February 15, 1973, it would have to be terminated. This ultimatum was brought to the attention of James R. Sclilesinger, who was then Director of Central Intelligence. The Counterintelligence Staff forwarded a memorandum to the Director arguing the importance to both the CIA and the FBI of continuing the project. The correspondence was reviewed at a meeting on February 15, 1973, between Schlesinger and "William Colby, who was the CIA Executive Director-Comptroller. Schlesinger determined at the meeting that the project should be turned over to the FBI and that he was not convinced that "the product to the CIA [from the mail project] was Avorth the project by risk of CIA involvement." a result of another meeting shortly thereafter, with both Colby and the Counterintelligence Chief, Schlesinger decided that Cotter should be asked to defer termination of the project while the CIA took As But Cotter refused the request for delay, stating that the project should be shut down now and could be renewed once appropriate authority was obtained. The New York mail project was therefore terminated by the Agency on February 15, 1973. There is no record to indicate that the CIA attempted to obtain it to a "very high level." President Nixon's approval of the project in 1973. Indeed, although CIA files reflect suggestions made in January 1954 (Eisenhower Administration) and in April 1965 (Johnson Administration) that the President be advised of the mail project, no evidence could be found that any briefing of any President occurred. Evaluating the Mail Project Statistics gathered by the CIA show that in the last full year of its operation, the New York mail intercept handled approximately 4,350,000 items of mail and examined the outside of over 2,300.000 of those items. Photographs were taken of the exteriors of approximately 33,000 items. Some 8,700 items were opened and the contents analyzed. Selections for opening were made on the basis of a watch list given to the crew and upon various other intelligence factors. During the 12. approximately 5,000 of the selections were made on the basis of the watch list. last year, 112 In the last year, the program made over 3,800 separate disseminations of information derived from the project Avithin the Agency and some 1,400 separate items of information to the FBI. At the end of 1972, the active watch list of names totaled approximately 600. The number of names watch-listed varied from month to month as they were supplied by CIA components and the FBI. Although only mail coming into the United States was intercepted in the early years of the project, both outgoing and incoming mail were involved during most of the project's operation. CIA personnel sent estimate that, overall, approximately 30 percent of the mail intercepted was outgoing. The project not only disseminated current information but provided data back to 1955 in a compartmented, computerized machine record system containing almost 2,000,000 entries. Institutional and organizational files were also maintained for reference and analytical file purposes. The is not easy to assess. While the Commission staff examined materials derived from the mail intelligence value of the mail project intercept, it is difficult to judge their significance without knowing a great deal about the cases to which the materials may relate. All components of the Agency seemed to agree that the project was useful as a source of technical communications intelligence on such matters as secret writing, censorship techniques and the like. There are also indications that the FBI found the mail project valuable in internal security matters. The Counterintelligence Staff regarded the mail project as a unique source of intelligence of strategic importance. It was, they said, a source of counterintelligence leads and of confirmation of otherwise questionable information. During his 1973 review of the project, however. Director Schlesinger was not convinced that the intelligence derived from the mail intercept was worth the risk of continued CIA involvement. B. An August West Coast Mail Intercept two CIA from the technical division of the Plans Directorate spoke with the Deputy Chief Postal Inspector for the United States about commencing a CIA mail cover operation on the West Coast. The proposed operation was to encompass international mail from the Far East. According to a contemporaneous CIA memorandum, the Agency officers said during the August 26 meeting that the proposed activity would not involve opening the mail; rather, the Agency wanted only to analyze the exteriors of 26, 1969, officers \ I ] ' 113 relevant envelopes. The postal official stated that he wanted to look further into the matter. The same CIA met with the Deputy Chief Postal Inspector on September 12, 1969, to make arrangements for a survey on the West Coast of the mail flow from the designated communist-conofficers The postal official agreed to the proposed survey. CIA memorandum made shortly after the September 12 meeting trolled areas overseas. A indicates that "the key factor" in the official's decision to permit the would be oj)ened.'' Several days after the meeting on September 12, the two CIA officials visited a postal facility in the San Francisco area. They conducted a week-long survey of the incoming mail from the Far East. In all, over 1500 envelopes were reviewed. No indication could be found that any mail was opened during this survey. CIA records do not show that any high level approval was requested or obtained within the Agency for the September 1969 mail survey was survey. "'the fact The CIA that no en\elopes officers who undertook the survey apparently did so in order to determine the feasibility of the mail project before they sought approval for it. October 6, 1969, the two officers who had conducted the survey convinced the chief of their division in the Plans Directorate that the project was feasible and that approval should be sought for it. The proposal was also discussed on October 23, 1969, with the Director of Security, who agreed with it but said that the approval of On Director Helms had to be obtained. The Director of Security also suggested during this meeting that, in view of the obvious sensitivity of the proposal, all CIA personnel should "avoid preparing or exchanging any formal communications on the project." (No such com- munications were located, but hand-written notes made by one CIA officer detailed the events occuring throughout the formative stages of the project.) Thomas Karamessines, the Deputy Director for Plans, orally approved the project on November 4, 1969. He had secured Director Helms' approval for the project the prior week. Karamessines testified that he approved of the project because it was the only way to obtain intelligence vital to the safety of agents involved in certain ongoing operations. Later in November 1969, the CIA Director of Security explained the project to Chief Postal Inspector Cotter, who gave his approval. Cotter, of course, was familiar with the New York mail intercept project. He said he wanted the West Coast project "to go slow and develop gradually." Neither Cotter nor any other postal official appears to have been told that the West Coast project would involve opening mail. CIA records indicate that the Agency representatives ostensibly agreed 114 with the Post Office instructions that no mail was to be removed from Post Office premises or opened. Nevertheless, the CIA's plan from the outset was to open the mail, if possible, without informing postal authorities. The CIA officers involved in the West Coast project were aware that questions might be raised as to its propriety under United States laws, but they believed the likely intelligence potential from the proj- was worth the risk. The successful operation of the mail project in New York over the prior 16 years also played a part in the decision to proceed with the West Coast project. The first formal operation of the San Francisco project occurred in early 1970, and another operation was run later that year. A third effort was made in 1971. Each of the operations lasted for approximately two or three weeks and followed the same pattern Late in the evening, CIA personnel went to the postal facility, where a special official met them and opened the relevant bags of mail. The postal official remained present while the CIA representatives performed tests on the outside of envelopes. During virtually every session, the CIA officers, apparently without the knowledge of the postal official, concealed selected pieces of mail in an equipment case or a handbag. The selected items were then taken surreptitiously from the post office facility, opened, photographed, analyzed, resealed and returned to the ect : mail flow during the next visit to the facility. CIA records indicate that a great majority of the mail examined had originated outside the United States, although, on at least one bag of outgoing mail was opened for the CIA officers. The primary objective of the San Francisco mail intercept, unlike the East Coast mail project, was to obtain technical intelligence concerning foreign censoi-ship, secret writing and the like. Agency records indicate the San Francisco project was highly successful in meeting this occasion, a objective. C. An Hawaiian Mail Intercept from the Far East was carried out in the territory of Hawaii from late 1954 until the end of 1955, when the intercept was terminated. The project was initiated by a single CIA officer, who photographed, opened and analyzed selected items of intercept of mail mail. CIA Headquarters was not informed of the one-man Hawaiian operbeginning, nor was express approval ever granted for it. Tacit approval of the project may nevertheless be implied from the favorable response given to the operation report submitted by the ation prior to its charge of the project. The Hawaiian intercept appears to have been successful in producing technical postal intelligence. officer in 115 D. New Orleans Mail Intercept A fourth mail intercept was conducted in New Orleans for approximately three weeks in August 1957 as a counterintelligence operation. Approximately 25 sacks of international surface mail were examined each day. The mail examined did not originate in the United States, nor was it destined for delivery in the United States; it was simply in transit. Approximately 200 items were opened and photographed, but no substantive intelligence was gained and the project was terminated. Conclusions CIA's domestic mail opening programs were unlawful. United States statutes specifically forbid opening the While in operation, the mail. The mail openings also raise Constitutional questions under the Fourth Amendment guarantees against unreasonable search, and the scope of the Xew York project poses possible difficulties with the First Amendment rights of free speech and press. Mail cover operations (examining and copying of envelopes only) are legal when carried out in compliance with postal regulations on a limited and selective basis involving matters of national security. The New York mail intercept did not meet these criteria. The nature and degree of assistance given by the CIA to the FBI in the New York mail project indicate that the primary purpose eventually became participation with the FBI in internal security functions. Accordingly, the CIA's participation was prohibited under the National Security Act. Recommendation (13) a. The President should instruct the Director of Central Intelli- gence that the CIA is not to engage again in domestic mail openings except with express statutory authority in time of war. (See also b. Recommendation 23.) The President should instruct the Director of Central In- telligence that mail cover examinations are to be in compliance with postal regulations; they are to be undertaken only in fur- therance of the CIA's legitimate activities and then only on a limited and selected basis clearly involving matters of national security. ; Chapter 10 Intelligence Community Coordination Introduction In the late 1960's and continuing into the early 1970's, widespread A'iolence and civil disorder arose in many cities and on many campuses across the country. President Johnson and later President Nixon acted on a number of fronts to organize the resources of the Federal government to determine the facts about those responsible for the turmoil. Both Presidents persistently demanded to know whether this violence and disorder was in any way supported or directed by foreign elements. Inevitably, the CIA became a major factor in these undertakings, with action including: (1) Participation in coordinated intelligence community ef- forts to deal with the disturbances Creation of a Special Operations Group ("Operation CHAOS") to investigate and analyze any foreign connections of domestic dissident groups (Chapter 11) and, (3) Efforts of CIA's Office of Security to protect CIA's in(2) ; and campus recruiters from potentially violent dissent (Chapter 12). stallations activity. A. Summary In 1967, the Justice Department under Attorney General Ramsey Clark established the first in a series of secret units designed to collate and evaluate information concerning the growing domestic disorder and violence. The Justice Department's initial effort failed to produce the desired intelligence results. The CIA was consulted for advice on intelligence evaluation, and the Department of Justice under Attorney General John Mitchell (116) 117 created another unit in 1969. This effort, too, failed to produce results satisfactory to the Administration. Therefore, in June of 1970, President Nixon instructed the directors of four principal intelligence agencies to develop a plan for increased coordination and evaluation of domestic intelligence. This led the Nixon Administration in December of 1970 to create an inter- including representatives from the CIA the FBI, and other principal intelligence agencies, for coordination and evaluation of intelligence related to domestic dissidence. This agency committee and staff, committee produced reports for President Nixon and cert^ain other top governmental officials from February 1971 tlirough May joint 1973. All these efforts resulted from a realization in both the Johnson and the Nixon administrations that the Government of the United States had no effective capacity for evaluating intelligence domestic events. The FBI, concerning as an investigative agency, produced data but did not produce evaluated intelligence. raw The CIA produced was limited to foreign intelligence or counterintelligence. The problem was further complicated by the FBI's refusal during one period to cooperate fully with other components of the intelligence community. This realization appears to have caused the White House to pressure the CIA into expanding the Agency's own activities related to domestic dissidence (see Chapter ll) The White House evidently also concluded that without some formal interagency coordination, it would not have intelligence evaluations, but its jurisdiction . an adequate source of domestic intelligence evaluations or estimates upon which to rely in attempting to deal with domestic disturbances. The CIA's participation in these joint efforts w^arrants particular attention. Any involvement of the Agency in activities of the Department of Justice or in a domestic intelligence evaluation group could, at least on the surface, raise a question of impropriety, under 50-USC sec. 403(d), which prohibits the CIA from having ". law enforcement powers or internal security functions." . The B. . "Interdivision Information Unit" In early fall. 1967, Attorney General Clark asked John Doar, Assistant Attorney General for Civil Rights, to report on the Department's facilities for organizing information on individuals involved in civil disordei-s. On September 27, 1967, Doar recommended establishment 577-475 O - 75 : 118 ; I of a "single intelligence unit to analyze the about certain persons and groups FBI information we receive who make 1 the urban ghetto their \ base of operation." The FBI was to constitute only one source of infonnation for the proposed unit. As additional sources, Doar suggested federal poverty programs. Labor Department programs, and neighborhood legal services. Doar recognized the "sensitivity" of using such additional sources, but he nevei-theless thought these sources would have access to relevant facts. Other sources of dissident information suggested by Doar included the intelligence unit of the Internal Revenue Service and perhaps the Post Office Department. The CIA was not among the proposed sources. Attoi-ney General Clark, by memoi-andum dated November 9, 1967, approved Doar's recommendation. Clark found it "imperative" that the Justice Department obtain "the most comprehensive intelligence possible regarding organized or other purposeful stimulation of domestic dissension, civil disorders and riots." He appointed a committee of four Assistant Attorneys General to make recommendations concerning the organization and functioning of the proposed unit. "Planning and creation of the unit must be kept in strictest confidence," Clark's memo!andum stated. On December new the 6, 1967, the committee unit, in addition to analyzing recommended FBI in part that information, should de- velop contacts with other intelligence agencies, including the CIA, Following his committee's recommendation, Attorney General Clark on December 18, 1967, directed the organization of the Interdivision Information Unit ("IDIU"). Objectives of the new Unit were as possible sources of information. reviewing and reducing to quickly retrievable form all information that may come to this Department relating to organizations and individuals throughout the country who may play a role, whether purposefully or not, either in instigating or spreading civil disorders or in preventing or checking them. . . . After its establishment, the IDIU commenced collecting, collating, and computerizing information on antiwar activists and other dissidents. The IDIU produced daily and weekly reports on dissident occurrences and attempted to predict significant future dissident activities. C. Development of Justice Department-CIA Liaison Problems of domestic dissidence were of immediate concern to the Nixon Administration when it took office. Attornev General John Mitchell met with Director Helms of the ' 119 CIA May problems arising from domestic unrest and, more specifically, to discuss where within the government the entire question of domestic dissident intelligence could be handled. The Attorney General explained that he felt the FBI was not acquiring the necessary intelligence concerning domestic unrest, although Mitchell also was of the opinion that the IDIU was improving in that regard. Helms ojffered to have a CIA liaison established with the Department of Justice to provide advice on the Department's intelli- on 14, 1969, to discuss gence efforts; but, because of the "political implications" involved, Helms rejected the Attorney General's suggestion that CIA person- Department unit. Helms then asked the Chief of CIA's Special Operations Group, which ran Operation CHAOS,^ to establish the liaison with the Justice Department. He was to make contact with Jerris Leonard, the Assistant Attorney General in charge of the Civil Hights Division, and James Devine, another member of the Justice Department. Leonard coordinated the Department's efforts concerning civil disorders, and Devine, under Leonard, headed the IDIU. The Chief of the CIA Special Operations Group met with Leonard on May 19 and with Leonard and Devine on May 27, 1969. According to notes taken at those meetings by the CIA officer, the Justice Department representatives explained that they and their units were responsible for receiving and evaluating information used to advise the Attorney General and the President as to when federal aid would be needed in civil disorders. The IDIU was the unit which received and indexed the information. Coordination and evaluation of that information was supposed to be the responsibility of a relatively inactive entity known as the Intelligence Evaluation Committee ("lEC"), which was composed of representatives from the Department of Justice, the Department of Defense and the Secret Service. Conceding their ignorance of matters relating to intelligence e^'aluation, Leonard and Devine requested the CIA's assistance and advice in processing intelligence on civil disorders. Leonard also pressed the CIA officer to sit as a member of the lEC which, Leonard explained, was an informal group and would therefore j^ermit any CIA role in it to remain hidden. The officer declined, saying that the CIA had no domestic jurisdiction and that Helms was reluctant to "have the Agency appear to be too deeply involved in domestic matters." Hownel be assigned to the Justice CIA could probably bo of assistance in supplying information on the foreign travel and contacts of individuals of interest, as well as in providing advice relating to the orga- ever, the officer suggested that the nization and evaluation of intelligence information. iThe activities of the CIA through Operation CHAOS are discussed fully in Chapter 11. 120 When the CIA officer reported to Hehns on these meetings, the Di- rector agreed with his position on the nature of the liaison and confirmed that there should be no formal participation by the CIA on the Intelligence Evaluation Committee. cer not to inform liaison. anyone else in the The Director suggested Helms CIA also instructed the offi- of the newly established that, perhaps, the Chief of Counter- immediate supervisor, might be told depending on developments. As a matter of fact, no at a later date one in the CIA other than Helms, his Executive Assistant and the liaison officer himself knew of the CIA's liaison with the Justice Department during the following year. intelligence, the liaison officer's — D. Exchange of the IDIU Computer Listing Devine briefed the CIA liaison officer on the IDIU machine records system. Devine explained that the IDIU had often been unsuccessful in providing advance warning of incipient civil disordere because information concerning the disorders was not available far enough in advance. It was agreed that Devine would furnish the IDIU computer listing to the CIA for checking against the foreign travel records of dissidents, as held by Operation CHAOS, and to allow the CIA's analysts the opportunity to suggest how the Justice Department might use its list more effectively. The IDIU listing apparently contained the names of approximately On June 18, 1969, 10,000 to 12,000 individuals, as well as brief narratives about their The head of Operation CHAOS found that the IDIU listing consisted principally of information derived from FBI reports. He concluded that any meaningful comparison with Operation CHAOS records was not reasonably feasible. In September of 1969, the officer asked Devine for a duplicate of the actual IDIU computer tape and program. The idea was that, by matching the duplicate IDIU tape with the computer tape maintained by Operation CHAOS, it could possibly be determined whether the CIA had indexed information which the FBI had not already pro- dissident activities.^ vided to the IDIU. The duplicate IDIU computer tape and program were delivered to CHAOS and held by him personally in his private safe. Only the Chief, Director Helms, and a CHAOS computer programmer knew of the CIA's possession of the Justice the Chief of Operations ' The evidence reviewed by tlie Commission indicates that the listing of 10,000-12,000 names held by the IDIU and the compilation of 7,200 personality files held by Operation CHAOS (see Chapter 11) were developed independently of one another. 121 Department materials. Subsequently, the Chief and the computer programmer attempted to match the Department of Justice tape with the Operation CHAOS computer system, but concluded that the matching would require too much time and effort. None of the information contained in the IDIU tapes was used by Operation CHAOS or incorporated into the CIA records. The IDIU materials were finally destroyed when Operation CHAOS was terminated in March 1974. E. The "Civil Disturbance Group" In a further attempt to coordinate the efforts of the Department of Justice to control civil disorders, Attorney General Mitchell, on July 22, 1969, established the "Civil Disturbance Group" (CDG). Both the IDIU and the lEC were placed under the jurisdiction of the Civil Disturbance Group, which was instructed to coordinate intelligence, policy, and action within the Department of Justice concerning domestic civil disturbances. Although the plan establishing the CDG made no mention of the CIA, Helms was told of the plan almost immediately. On July 25. 1969, three days after the plan had been put into effect, the Attorney General met w^ith Helms. According to handwritten notes made by Helms during that meeting, Attorney General Mitchell explained that the CDG had been created because the FBI could not provide the needed analysis of intelligence on civil disturbances. The FBI, the Attorney General noted, was an "investigative not [an] intelligence outfit.'' Mitchell asked Helms to have the CIA investigate the adequacy of the FBI's collection efforts in dissident matters and to persuade the FBI to turn over its material to the CDG. Apparently the Attorney General was experiencing some difficulty in obtaining cooperation within his own Department. the Civil Disturbance Group appears to was established in July have been minimal. Shortly after the 1969, the Chief of Operation CHAOS, acting as the CIA liaison, assisted Jerris Leonard, as Chief of Staff for the CDG, and other The CIA connection with CDG Justice Department officials in establishing relationships with the military intelligence departments. In November 1969, the CIA liaison took part in a series of meetings with Leonard concerning preparations for handling an antiwar rally scheduled to take place in Washington, D.C. Intermittent contacts between the liaison officer and other Justice Department officers also occurred over the following two officer or three months. 122 F. The "Interagency Committee on Intelligence (Ad Hoc)" The CDG did not satisfy the government's requirements for coordi- nated and evaluated intelligence on domestic upheaval. Both the Attorney General and the White House continued to receive only raw, unevaluated data from the FBI. In addition, cooperation within the intelligence community upon intelligence matters deteriorated substantially during late 1969 and early 1970. In late Februaiy 1970, J. Edgar Hoover forbade the Bureau to engage in anything but formal, written liaison with the CIA, because Helms had refused to compel a CIA officer to disclose to Hoover the name of an FBI agent who had given the officer certain FBI information late in 1969. President Richard M. Nixon called a meeting at the White House on June 5, 1970, of the directors and officers from four of the major components of the intelligence community. Those attending included J. Edgar Hoover for the FBI, Richard Helms for the CIA, Vice Admiral Gayler for the National Security Agency and Lt. General Bennett for the Defense Intelligence Agency. The purpose of the meeting was to discuss problems relating to domestic disorders. The President directed those present to make greater efforts to cover the activities of dissidents in the United States. He made it plain that he was dissatisfied with the quality of intelligence concern- ing the extent of any foreign connections with domestic dissidence. The possible relationship of Black radicalism in the Caribbean to Black militancy in the United States was discussed, and the President directed that a study on the subject be prepared.^ Finally, the President said that Mr. Hoover was to organize the group to draft a plan for coordination of domestic intelligence. Four days on June 9, 1970, the "Interagency Committee on Intelligence (Ad Hoc)" ("ICI") held its first meeting. The committee was composed of the directors of the FBI, CIA, NSA, and DIA. Simultaneously, a subcommittee of representatives from the same agencies was established to accomplish the drafting of the ICI report. The CIA Counterintelligence Chief was designated as the CIA's representative on the subcommittee, and the Chief of Operation CHAOS served as an "observer" in the group. The subcommittee was officially constituted within the United States Intelligence Board, but this appears to have been done simply to provide an organizational cover for the activities of the subcommittee. Minutes of the subcommittee's meetings show that, in fact, the subcommittee was "an inde3 Operation later, CHAOS ture of Director the President. eventually did prepare such a study. It was delivered over the signaHelms to Tom Huston on July 6, 1970, for handing to Richard : 123 pendent, ad hoc, inter-agency group with a specific mandate," and that the "scope and direction of the review [conducted by the sub- committee] will be determined by the White House." Two of the stated objectives for the ICI were: (1) to assure a "higher priority by lection efforts" and agencies on internal security col- all intelligence (2) to assure "maximum use of all special investi- and informant penetration by both the FBI and CIA." An unstated objective was to effect greater cooperation and evaluation of data by the FBI. Charles Huston, the White House liaison on the ICI, stated the problem during the first meeting of the Committee: "The President receives uncoordinated information which he has to put together," or, as Helms told the CIA's observer later in June 1970, "the heart of the matter" was to "get the FBI to do what it was not doing." Huston made it clear at the initial ICI meeting that President Nixon wanted the Committee to assume that all methods of gathering intelligence were valid. The President, Huston said, wanted the Committee, gative techniques, including increased agent reviewing matters wliich "obstructed" intelligence gathering, to consider that "everything is valid, everything is possible." All restrictions on methods were to be listed, according to Huston, so that the President could make a final decision on which methods would be employed. A forty-three page "Special Keport" was issued by the ICI on June 25, 1970. The Report assessed the internal security threat posed by the major domestic dissident groups as well as by foreign organizain tions. The CIA's contribution to this section of the Report was entitled, —Foreign," and encompassed "Definition of Internal Security Threat- only the foreign aspects of the problem. and constitutional safeguards limiting the methods which the government could employ in the collection of domestic intelligence. The enumerated methods which were subject to "restraints" included electronic surveillance, mail coverage, surreptitious entry and development of campus sources. Covert mail coverage and surreptitious entry were specifically described as illegal. The Special Report listed the benefits or detriments to be derived from employing such methods but did not expressly recommend their use instead, it specified possible alternatives concerning each of them. The FBI expressed opposition to any change in existing procedures. Finally, the ICI's Report conchided that The ICI's Report also considered the effect of legal restraints ; currently no operational body or mechanism specifically charged with the overall analysis, coordination and continuing evaluation of practices and policies governing the acquisition and dissemination of intelligence, the pooling There is of resources and the correlation of operational activities in the domestic field. 124 The ICI recommended establisliment of an interagency group for evaluation and coordination of domestic intelligence, a proposal which the CIA representatives had supported throughout the Committee's meetings. Director Hoover opposed the recommendation. July 9, 1970, Huston advised Director Helms that all communications to the White House on domestic intelligence or internal security matters were thereafter to be addressed to Huston's exclusive attention. At approximately the same time, Huston recommended to the President, through H. K. Haldeman, that almost all the restraints on methods of intelligence collection discussed in the ICI's Special Report should be relaxed. Haldeman advised Huston on July 14, 1970, tliat the President had approved Huston's recommendations. By memorandum dated July 23, 1970, Huston informed Helms and On the other members of the ICI of the President's decision. Under the "Huston Plan," prohibitions against covert mail coverage, surreptitious entrv and electronic surveillance were to be relaxed or removed. Huston further advised the ICI members that a committee composed of representatives from the FBI, the CIA, the NSA and the DIA was to be constituted effective August 1, 1970, to provide domestic intelligence evaluations. Apparently Attorney General Mitchell was not aware of the June 5, 1970, meeting between the President and the heads of the intelligence community or of the course of meetings and events leading up to the President's decision and direction on the Huston Plan. Attorney General Mitchell told Helms on July 27, 1970, that he had not heard of the Huston Plan until earlier that same day, when Hoover had complained to him about Huston's July 23 memorandum. In a memorandum he made of their meeting, Helms said Mitchell had been "frank" in stating that no action should be taken on Huston's directive until Mitchell had spoken with the President. Subsequently, Mitchell expressed his opposition to the Huston Plan, apparently with success. The next day, July 28, the White House asked Helms to return his copy of Huston's July 23 memorandum. Soon thereafter, in late August or early September, John Dean was assigned White House responsibility for domestic intelligence on internal security matters. Sometime during this same period, the Attorney General discussed with Director Helms the continuing lack of evtvluated domestic intelligence and the absence of coordination on that matter within the intelligence community. Mitchell said that he was considering the possibility of a small unit within the Department of Justice for the assembling and evaluation of domestic intelligence. A luncheon for the Attorney General was arranged at the CIA Headquarters on September 17, 1970, to discuss this possibility. 125 In addition to Mitchell and Helms, the Deputy Director for Plans, the Chief of Counterintelligence, and the Chief of Operation CHAOS were present for the discussion on September 17. According to notes made at the luncheon meeting, the group discussed problems of the existing domestic intelligence procedures. Specificallly, it was again FBI did not have any "organization for evaluation of domestic intelligence." Further, the Justice Department's IDIU w^as characterized as "useless" for evaluation purposes because the unit often did not receive information until after the events happened. The luncheon group proposed that a unit be established within emphasized that the the Justice Department to "provide evaluated intelligence from sources" and "allow preventive action" to be taken in time. all of the options discussed was the revival within the Justice Department of the Intelligence Evaluation Committee. The revived lEC One would include the CIA and perhaps a White House representative, and it would be charged with the responsibility of coordination and evaluation. To avoid duplication of effort, the new lEC would draw upon the files and indices maintained by the participating agencies, rather than setting up its own files. Shortly after the September 17, 1970, luncheon. Attorney General Mitchell met w^ith John Dean to discuss the prompt organization of the new domestic intelligence unit. It was Dean's suggestion that an interagency domestic intelligence unit be used for both operational and evaluation purposes. Dean further suggested that, wdiile initially there would be no blanket remoA\al of the restrictions on the methods of intelligence collection, eventually restraints could be removed as far as necessary to obtain intelligence on a particular subject. Dean also thought that the existing but inactive IDIU would provide an "appropriate Justice Department cover" and eliminate the chance of public discovery of a ment of new intelligence operation within the Depart- Justice. G. The "Intelligence Evaluation Committee" and reactivate the moribund Intelligence Evaluation Committee (lEC) of the Department of Justice. The initial meeting of the reconstituted lEC occurred on December 3, 1970, in John Dean's office in the Old Executive Office Building. Several other meetings of an organizational nature were held from time to time through February 1971. The Committee was composed of representatives from the Department of Justice, the FBI, the CIA, the Department of Defense, the Tlie Administration thus decided to revise 126 A representative of Secret Service and the National Security Agency. the Treasury Department was invited to participate in the last two lEC meetings. The Chief sentative on the of Counterintelligence was the lEC, and the Chief of Operation CIA CHAOS repre- was his alternate. Robert C. Mardian, Assistant Attorney General for the Internal Security Division, was technically Chairman of the lEC, while John House representative. The ultimate authority over the Committee was somewhat fuzzy both Mardian and Dean stated requirements and made assignments to the Committee. The lEC was not established by Executive Order. In fact, according to minutes of the lEC meeting on February 1, 1971, Dean said he favored avoiding any written directive concerning the lEC because a directive "might create problems of Congressional oversight and dis- Dean served as the "VVliite ; were nevertheless made to draft a charter for the Committee, although none appears to have been accepted by all of the lEC members. The last draft which could be located, dated Februaiy 10, 1971, specified the "authority" for the lEC as "the Interdepartmental Actional Plan for Civil Disturbances," something which had been issued in April 1969 as the result of an agreement between the Attorney General and the Secretary of Defense. Dean thought it was sufficient just to say that the lEC existed "by authority of the closure." Several attempts President." Revitalization of the lEC in December 1970 appears clearly to have sprung from the suggestions of the ICI's Special Report. Helms testified that he understood that the lEC had been organized to focus and coordinate intelligence on domestic dissidence. Handwritten notes made by the CIA Counterintelligence Chief during an lEC meeting on January 25, 1971, indicate that the lEC was in part an "implementation of the ad hoc committee report." But, because Hoover had objected so strongly to the ICI's report, no reference was to be made to it during the lEC meetings. The Counterintelligence of the sion's Chief's notes also reflect that the operation lEC was to be "done with the tools we now have." This Commis-' staff did not find any indication that the lEC attempted to adopt the suggestions in the Huston Plan for ignoring legal tions on intelligence gathering in the United States. The January restric- meeting of the lEC also concerned recruiting a staff for the Committee. Mardian suggested that each of the participating agencies should contribute an individual to work on the staff, although Hoover had already made it clear the FBI would 25, 1971, refuse either to contribute to the for the staff. lEC budget or to provide personnel ; 127 H. The "Intelligence Evaluation Staff" A lEC was organized by the end of January 1971. That group, called the Intelligence Evaluation Staff ("lES"), held its first meeting on January 29, 1971. Unlike the Committee, which was intended to function as a "think tank," the Staff was to do the staff for the work of coordination, evaluation and preparation of estimates for issuance by the Committee. The Chief of Operation CHAOS was the CIA representative on the lES. He attended such lES meetings as were called, and he coordinated the CIA's contributions to the lES evaluations and estimates. The Operation Chief was not assigned to the lES on a full-time basis. Representatives of the NSA, the Secret Service and the military intelligence services also served on the lES. Finally, in May 1971, the FBI also assigned a representative to aid the staff. Although the Department of Justice's IDIU was not actually involved in the work of the lES, the lES was "attached to [the IDIU] for cover purposes." The Intelligence Evaluation Committee met on only seven occasions the last occasion was in July 1971. The Intelligence Evaluation Staff, on the other hand, met a total of one hundred and seventeen times between January 29, 1971, and May 4, 1973. The lES prepared an aggregate of approximately thirty studies or evaluations for dissemination. It also published a total of fifty-five summaries called intelligence calendars of significant events. The preparation of these studies, estimates or calendars was directed by John Dean from the White House or by Robert Mardian as Chairman of the lEC. The initial studies related to the in 1971, and "May Day" demonstrations later reports concerned other held proposed antiwar demon- planned violence. From January to August 1972, the lEC/IES issued, and regularly revised, reports covering the potential for disruptions at lx)th the 1972 Republican and Democratic National Conventions. Many of the lEC reports contained information having both domestic and international aspects. The CIA made a number of contributions to the lEC/IES publications. Those contributions were prepared by Operation CHAOS personnel (see Chapter 11). However, the contributions appear to have been a by-product of ongoing activities strations, racial protests or abroad. Review of all the contributions reveals that the CIA re- ported, with only minor exceptions, on matters relating strictly to foreign or international events or organizations. It appears the only participation by the CHAOS Chief in the lES, 128 from serving as the CIA liaison in preparing tlie Agency's contributions, was to edit drafts of the Staff's reports. Mardian himself did ask the Chief to use the CIA's computer index for name traces in connection with the March 1971 Capitol bombing incident, the ''Pentagon Papers" case and the Berrigan Brothers case.^ But no evidence was found that the CIA was asked by either the lEC or aside the lES to collect domestic intelligence. The agents run by the CIA's Operation CHAOS appear on only one occasion to have been directed to collect information domestically which was used for lEC/IES purposes. That was the use of one agent during the 1971 May Day demonstrations in Washington, D.C., which is described more fully in Chapter 11. CHAOS forwarded the information supplied by that agent to the FBI, and some of the information ultimately may have been incorporated in lEC publications concerning the May Day demonstrations. Helms CIA during a meeting on December 5, 1972, that the Agency "should minimize its contributions to the lEC, with the expectation that eventually the organization may disappear." Helms in his testimony was unable to recall the basis for this instruction. By then, however, the fact that Attorney General Mitchell and Robert Mardian had long since resigned to work on President Nixon's reelection campaign, plus the Director told the liaison officer substantial decline in the incidence of civil disorder, all contributed lEC/IES activity. The lEC and lES were terminated to the lapse in in July 1973 by Assistant Attorney General Henry Petersen. Conclusions The CIA's Department of Justice and the Agency's participation in interagency intelligence groups resulted from attempts to utilize the CIA's expertise in intelligence evaluation and its collection of intelligence abroad having a bearing upon domestic liaison with the dissidence. This attempted use occurred because two Administrations 'believed the government of the United States lacked an effective capacity to coordinate and evaluate intelligence on mattei-s affecting internal security. The CIA's participation in meetings of the lES was limited to providing advice on foreign intelligence and evaluation techniques and to editing reports. The 3 to available evidence indicates that the This appears to have been a short cut of the general procedure In the Justice Department for name checks by the CIA through the FBI. make requests 129 Agency's substantive contributions to the eign aspects, The if lES were restricted to for- any, of the relevant problems. statutory prohibition on internal security functions does not preclude the CIA from providing foreign intelligence or advice on evaluation techniques to interdepartmental intelligence evaluation organizations having some domestic aspects. The attendance of the CIA liaison officer at over 100 meetings of the Intelligence Evaluation Staff, some of them concerned wholly with domestic matters, nevertheless created at least the appearance of impropriety. Tlie Director of Central Intelligence was well advised to approach such participation reluctantly. The liaison officer acted improperly in the one instance in which he directed an agent to gather domestic information within the United States which was reported to the Intelligence Evaluation Staff'. Recommendation (14) A capability should be developed within the FBI, or elsewhere in the Department of Justice, to evaluate, analyze, and coordinate intelligence and counterintelligence collected by the a. FBI concerning espionage, terrorism, and other related matters of internal security. b. The CIA should restrict its participation in any joint intelli- gence committees to foreign intelligence matters. c. The FBI should be encouraged to continue to look to the CIA for such foreign intelligence and counterintelligence as is relevant to FBI needs. Chapter 11 Special Operations Group''Operation CHAOS'' Responding to Presidential requests to determine the extent of foreign influence on domestic dissidence, the CIA, upon the instruction of the Director of Central Intelligence, established within the Counterintelligence Staff a Special Operations collect, Group in August 1967, to coordinate, evaluate and report on foreign contacts with American dissidents. The Group's activities, which CHAOS, led the CIA later came to be to collect information known as Operation on dissident Americans from its overseas stations and from the FBI. Although the stated purpose of the Operation was to determine whether there were any foreign contacts with American dissident groups, it resulted in the accumulation of considerable material on domestic dissidents and their activities. During six years, the Operation compiled some 13,000 different files, including files on 7,200 American citizens. The documents in these files and related materials included the names of more than 300,000 persons and organizations, which were entered into a computerized index. This information was kept closely guarded within the CIA to prevent its use by anyone other than the personnel of the Special Operations Group. Utilizing this information, personnel of the Group prepared 3,500 memoranda for internal use; 3,000 memoranda for dissemination to the FBI; and 37 memoranda for distribution to high officials. The Operation ultimately had a staff of 52, who were from of which isolated any substantial review even by the Counterintelligence Staff' they were technically a part. Beginning in late 1969, Operation CHAOS used a number of agents (130) I — 131 abroad on any foreign connections with American dissident groups. In order to have sufficient "cover" for these agents, the Operation recruited persons from domestic dissident groups or recruited others and instructed them to associate with such to collect intelligence groups in this country. Most of these recruits were not directed to collect information domestically on American dissidents. On a number of occasions, however, such information was reported by the recruits while they were developing dissident credentials in the United States, and the information was retained in the files of the Operation. On three occasions, agents of the Operation were specifically used to collect domestic intelligence. Part of the reason for these transgressions was inherent in the nature of the task assigned to the Group to determine the extent of any foreign influence on domestic dissident activities. That task necessarily partook of both domestic and foreign aspects. The question could not be answered adequately without gathering information on : American the identities and relationships of the citizens involved in CIA was bound, from the outset, to raise problems as to whether the Agency was looking into internal security matters and therefore exceeding its the activities. Accordingly, any effort by the in this area legislative authority. The Presidential demands upon the CIA appear to have caused the Agency to forego, to some extent, the caution with which it might otherwise have approached the subject. Two Presidents and their staffs made continuing and insistent re- CIA for detailed evaluation of possible foreign involvement in the domestic dissident scene. The Agency's repeated conclusion in its reports that it could find no significant foreign connecquests of the — tion with domestic disorder —led CIA White House demands the Agency's investigation and to further account for any gaps in that it remedy any lack of resources for gathering information. The cumulative effect of these repeated demands was the addition of more and more resources, including agents, to Operation CHAOS that the Agency attempted to support and to confirm the validity of its conclusion. These White House demands also seem to have encouraged top CIA management to stretch and, on some occasions, to exceed the as the legislative restrictions. The excessive secrecy surrounding Operation CHAOS, its isola- removal from the normal chain of command prevented any effective supervision and review of its activities by officers not directly involved in the project. tion within the CIA, and its : 132 A. Origins of Operation CHAOS—August 1967 In the wake of racial violence and civil disturbances, President Johnson on July 2, 1967, formed the National Commission on Civil Disorders (the Kerner Commission) and directed it to investigate and make recommendations with respect to the origins of the disorders. At the same time, the President instructed all other departments and agencies of government to assist the Kerner Commission by supplying information to it. On August 15, 1967, Thomas Karamessines, Deputy Director for Plans, issued a directive to the Chief of the Counterintelligence Staff instructing him to establish an operation for overseas coverage of subversive student activities and related matters. This memorandum relayed instructions from Director Richard Helms, who, according to Helms' testimony, acted in response to continuing, substantial pressure from the President to determine the extent of any foreign connections with domestic dissident events. Helms' testimony is corroborated by a contemporaneous FBI memorandum which states The White House recently informed Richard Helms, Director, CIA, that the Agency should exert every possible effort to collect information concerning U.S. racial agitators who might travel abroad * * * because of the pressure placed upon Helms, a new desk has been created at the Agency for the explicit purpose of collecting information coming into the Agency and having any significant bearing on possible racial disturbances in the U.S. The question of foreign involvement in domestic dissidence com- bined matters over which the FBI had jurisdiction (domestic disorder) and matters which were the concern of the CIA (possible foreign connection). The FBI, unlike the CIA, generally did not produce finished, evaluated intelligence. Apparently for these reasons, the President looked to the Director of Central Intelligence to produce a coordinated evaluation of intelligence bearing upon the question of dissidence. When the Kerner Commission's Executive Director wrote to Helms on August 29, 1967, requesting CIA information on civil disorders. Helms offered to supply only information on foreign connections with domestic disorder. Ultimately, the CIA furnished 26 reports to the Kerner Commission, some of which related largely to domestic dissident activities. B. Evolution of Operation CHAOS—The November 1967 Study The officer selected to head what became the Special Operations Group was a person already involved in a counterintelligence effort 133 in connection with an article in Ramparts magazine on CIA associ- American youth overseas. In connection with his research and analysis, the officer had organized the beginnings of a computer system for storage and retrieval of information on persons involved ations with in the "New Left." By October 1967, this officer had begun to establish his operation concerning foreign connections with the domestic dissident scene. In a memorandum for the record on October 31, 1967, he indicated that the CIA was to prepare a study on the "International Connections of the United States Peace Movement." The CIA immediately set about collecting all the available government information on dissident groups. All field stations of the CIA clandestine service were polled for any information they had on the subject of the study. Every branch of the intelligence community was called upon to submit whatever information it had on the peace movement to the Special Operations Group for cataloging and storage. Most of the information was supplied by the FBI. All information collected by the Special Operations Group was forwarded to the CIA Office of Current Intelligence, which completed the study by mid-November. Director Helms personally delivered the study to President Johnson on November 15, 1967, with a covering note stating that "this is the study on the United States Peace Movement you requested." The study showed that there was little evidence of foreign involvement and no evidence of any significant foreign financial support of the peace activities within the United States. As a result of the information gathered for the study, however, the Special Operations Group gained an extensive amount of data for its later operations. On November 20, 1967, a new study was launched by the CIA at the request of the Director of Central Intelligence. This study was titled "Demonstration Techniques." The scope of the study was world-wide, and it concentrated on antiwar demonstrations in the United States and abroad. The procedure used on the earlier study was also employed to gather information for this new project. The CIA sent an updated version of the Peace Movement Study to the President on December 22, 1967, and on January 5, 1968, Director Helms delivered to the White House a paper entitled "Student Dissent and Its Techniques in the United States." Helms' covering letter to the President described the January 5 study as "part of our continuing examination of this general matter." Again, the information bank of the Special Operations increased by the intelligence gathered for these studies. Group was • : 134 C. Evolution of Operation CHAOS —Domestic Unrest in 1968 Continuing antiwar demonstrations in 1968 led to growing White House demands for greater coverage of such groups' activities abroad. Europe in the summer of 1968, the CIA, with concurrence from the FBI, sought to engage European liaison As disorders occurred in services in monitoring United States citizens overseas in order to produce evidence of foreign guidance, control or financial support. In mid- 1968, the CIA moved to consolidate its efforts concerning foreign connections with domestic dissidence and to restrict further the dissemination of the information used by the Special Operations Group. The Group was given a cryptonym, "CHAOS." The CIA sent cables to all its field stations in July 1968, directing that all information concerning dissident groups be sent through a single restricted channel on an "Eyes Only" basis to the Chief of Operation CHAOS. No other dissemination of the information was to occur. Some time Helms, in response to the President's continued concern about student revolutionary movements around the world, commissioned the preparation of a new analytic paper which was eventually entitled "Restless Youth." Like its predecessor, in 1968, Director Youth" concluded that the motivations underlying student radicalism arose from social and political alienation at home and not from conspiratorial activity masterminded from abroad. "Restless Youth" was produced in two versions. The first version "Restless contained a section on domestic involvements, again raising a question £is to the propriety of the CIA's having prepared it. This version was delivered initially only to President Johnson and to Walt W. Rostow, the President's Special Assistant for National Security Affairs. Helms' covering memorandum, dated September 4, 1968, stated, "You will, of course, be aware of the peculiar sensitivity which attaches to the fact that CIA has prepared a report on student activities both here and abroad." Another copy of the first version of "Restless Youth" was delivered on February 18, 1969, after the change in Administrations, to Henry A. Kissinger, then Assistant to President Nixon for National Security Affairs. Director Helms' covering memorandum of February 18 specifically pointed out the impropriety of the CIA's involvement in the study. It stated In an effort to round-out our discussion of this subject, we have included a section on American students. This is an area not within the charter of this Agency, so I need not emphasize how extremely sensitive this makes the paper. Should anyone learn of all concerned. its existence it would prove most embarrassing for ; ; : 135 A second version of "Restless Youth" with the section on domestic activities deleted was later given a somewhat wider distribution in the intelligence community. The CHAOS the "Restless group did not participate in the Youth" paper, although it initial drafting of did review the paper at some point before any of its versions were disseminated. Intelligence derived from the paper was, of course, available to the group. E. The June 1969 White House Demands Tom Charles Huston, Staff Assistant to President Nixon, wrote to the CIA that the President had directed preparaOn June 20, 1969, tion of a report on foreign communist support of revolutionary pro- movements in this country. Huston suggested that previous reports indicated inadequacy of intelligence collection capabilities within the protest movement area. (Helms testified that this accurately reflected the President's attitude.) According to Huston's letter, the President wanted to know AMiat resources were presently targeted toward monitoring foreign communist support of revolutionary youth activities in test — this country — How effective the resources were —What gaps existed because of inadequate resources or low priority of attention and, —What steps could be taken to provide maximum possible ; coverage of the activities. Huston said that he was particularly interested in the CIA's ability to collect information of this type. ten-day deadline was A set for the CIA's reply. The Agency responded on June 30. 1969, with a report entitled, "Foreign Communist Support to Revolutionary Protest Movements in the United States." The report concluded that while the communists encouraged such movements through propaganda and exploitation of was very little evidence of communist funding and training of such movements and no evidence of communist direction and control. The CIA's covering memorandum, which accompanied the June 30 report, pointed out that since the summer of 1967, the Agency had attem])ted to determine through its sources abroad what significant communist assistance or control was given to domestic revolutionary international conferences, there with the FBI and that "new sources were being sought through independent means." The memorandum also said that the "Katzenbach guidelines" of 1967 protests. It stated that close cooperation also existed 136 i had inhibited access to persons who might have information on efforts by communist intelligence services to exploit revolutionary groups in the United States.^ E. By CHAOS in Full-Scale Operation— Mid-1969 CHAOS took on the organizational form which would continue for the following three years. Its staff had increased to 36. (Eventually it totaled 52.) In June 1969, a Deputy Chief was assigned to the Operation to assist in administrative matters and to assume some of the responsibilities of handling the tightly-held comnumications. There was a furtlier delegation of responsibility with the appointment of three branch chiefs in the operation. The increase in size and activity of the Operation was accompanied by further isolation and protective measui'es. The group had already been physically located in a vaulted basement area, and tighter security measures were adopted in connection with communi'^ations of the Operation. These measures were extreme, even by normally strict CIA standards. An exclusive channel for communication with the FBI was also established which severely restricted dissemination both to mid-1969, Operation and from the Bureau of CHAOS-related matters. On September 6, 1969, Director Helms distributed an internal memorandum to the head of each of the directorates within CIA, instructing that support was to be given to the activities of Operation CHAOS. Both the distribution of tlie memorandum and the nature of the directives contained in it were most unusual. These served to underscore the importance of its substance. Helms confirmed in the September 6 memorandum that the CHAOS group had the principal operational responsibilities for conducting the Agency's activities in the "radical milieu." Helms expected that each division of the Agency would cooperate "both in exploiting existing sources and in developing new ones, and that [the Special Operations Group] will have the necessary access to such sources and operational assets." Helms further stated in the memorandum CIA had "the proper approach in discharging that he believed the this sensitive respon- while strictly observing the statutory and de facto proscription on Agency domestic involvements." sibility The September 6 memorandum, prepared after discussions with 1 In 1967 President Johnson appointed a committee including Nicholas Katzenbach, John Gardner, and Richard Helms to Investigate charges that the CIA was funding the National Student Association. The charges were substantiated, and the Katzenbach Committee's recommendation that the government refrain from covert financial support of private educational organizations was adopted as government policy. 137 the Chief of the Operation, tant f mictions: First, which Operation it among others, served at least three impor- confirmed, beyond question, the importance CHAOS had attained in terms of Agency objectives. Second, it replied to dissent which had been voiced within the CIA concerning the Operation. Third, it ensured that CHAOS would receive whatever support it needed, including personnel. F. Agent Operations Relating to Operation CHAOS Within a month after Helms' memorandum of September 6, an operations or "case" officer was assigned from another division to Operation CHAOS. The Operation thus gained the capacity to manage its own agents. A full understanding of the Operation's use of some appreciation of similar previously developed by other components of the CIA. agents, however, requires 1. "Project pi'oposals r In February 1968, the CIA's Office of Security and a division in its Plans Directorate jointly drafted a proposal for "Project 1," which was initially entitled "An Effort ... in Acquiring Assets in the 'Peace' and 'Black Power' Movements in the United States." The project was to involve recruitment of agents who would penetrate some of the prominent .dissident groups in the United States and report information on the communications, contacts, travel and plans of individuals or groups having a connection with a certain foreign area. The proposal was rejected by Director Helms in March 1968 on the ground that it "would appear to be" beyond the Agency's jurisdiction and would cause widespread criticism when it became public knowledge, as he believed it eventually w^ould. Shortly thereafter, the proposed Project was modified to include a prohibition against domestic penetration of dissident groups by agents recruited by CIA. Any contact with domestic groups w^ould be incidental to the overall objective of gaining access overseas to information on foreign contacts and control. This modification was consistent with Helms' instruction that the Agency w^as not to engage in domestic operational activity directed against dissident groups. The modified plan was approved by the Deputy Director of Plans, subject to conditions to ensure his tight supervision and control over its activities, but no evidence could be found that the project ever became operational. The history of Project 1 clearly reflected the CIA's awareness that statutory limitations applied to the use of agents on the domestic : 138 dissident scene. "Penetration" of dissident groups in the United States to gain information on their domestic activities was prohibited. '^Project 2" 2. A second program, "Project 2," was initiated in late 1969 by the same office in the CIA's Plans Directorate wdiich had developed Project Under Project 1. 2, individuals without existing dissident affilia- would be recruited and, after recruitment, would acquire the theory and jargon and make acquaintances in the "New^ Left" while attending school in the United States. Following this "reddening" tion or "sheepdipping" process (as one CIA officer described it), the agent country on a specific intelligence mission. Project 2 w\as approved on April 14, 1970, by the Assistant Deputy Director for Plans, who stated that no Project 2 agent was to be would be sent to a foreign directed to acquire information concerning domestic dissident activi- such information was acquired incidentally by the agents during the domestic "coloration" process would it be passed to Operation CHAOS for forwarding to the FBI.Renewals of Project 2 were approved annually during 1971-1973 ties. Only if by the Deputy Director for Plans. The Project was also reviewed and approved in the fall of 1973 by William E. Colby, by then Director of Central Intelligence. In granting his approval on September 5, 1973, Director Colby, in language which paraphrased the original Project 1 guidelines, stated that Care taken that, during the training period of [Project 2] agents within the United States, they will not be operated by CIA against domestic will be targets. During the period 1970-1974 a total of 23 agents were recruited for the project, of which 11 completed the prescribed development process in the Ignited States. Each agent was met and debriefed on a regular schedule in this country by Project 2 case officers. The agents were told repeatedly of the limitations on their activities in the United States. The Project method precisely and 2 case officers used debriefing sessions as one of assessing an agent's effectiveness in reporting facts accurately, obviously an essential skill to any intelligence agent. "Contact reports" were prepared after the sessions. Although the reports contained a substantial amount of information on agents' observations of domestic activities, no evidence was found that Project 2 itself opened any files based upon any of the information. 2 Prior to the April 14 approval of Project 2, Operation CHAOS personnel had requested that a proviso be added to the Project that Operation CHAOS would coordinate Project 2 recruits during the "coloration" process in the United States. The proviso was rejected. 139 Copies of all contact reports with Project 2 agents, however, were provided to Operation CHAOS, and that Operation made a detailed review of the information contained in the reports. Information on both individuals and activities which was contained in the reports and which was deemed significant by CHAOS was incorporated into the raw data files of the operation and indexed into its computer system. Depending upon the nature of the information, it might eventually be furnished by Operation CHAOS to the FBI. Thus, while Project 2 agents were not assigned collection missions in the United States, the tandem operation of CHAOS with Project 2 nevertheless did result in collection and dissemination by the CIA of a limited quantity of intelligence on domestic dissident activities. Director Helms testified that he was not aware of this collection and dissemination. Furthermore, despite efforts by Project 2 case officers to have their agent trainees avoid taking an activist role in domestic dissident groups, that did occur upon occasion. One of the agents became an officer in such a group, and on at least one occasion the agent provided Project 2 with copies of minutes of the group's meetings. A Project 2 agent also became involved as an adviser in a United States congressional campaign and, for a limited period, furnished reports to CHAOS of behind-the-scenes activities in the campaign. 3. CHAOS Agents During the first ' two years of its existence. Operation CHAOS gathered the bulk of its information from reports issued by other governmental agencies or received from CIA field stations abroad. By October 1969, this approacli had changed almost completely.' Operation CHAOS' new case officer was beginning to contact, recruit, and run agents directly for the operation. This reversal of approach appears to be attributable primarily to three factors: First, and most important, an increasing amount of "White House pressure (for example, the June 20, 1969, letter from Tom Charles Huston, Staff Assistant to the President) was brought — to bear on the CIA porting on the role more extensive and detailed reof foreign connections with American disto provide sident activities; — Second, Operation CHAOS had been relatively unsuccessful in obtaining meaningful information through agents associated with other agencies; Third, the tempo of dissident activities had increased sub- — stantially in the T'^nited States. The extent of CHAOS agent operations was limited to fewer than ; 140 30 agents. Although records of the Operation indicate that reporting was received from over 100 other agent sources, those sources appear to have been directed abroad either by other governmental agencies or by other components of the CIA. The information which these sources reported to Operation CHAOS was simply a by-product of other missions. Operation CHAOS personnel contacted a total of approximately 40 potential agents from October 1969 to July 1972, after which no new agent recruitments were made. (The case officer left the Operation on July 12, 1972.) Approximately one-half of these individuals were referred to the Operation by the FBI, and the remainder were developed through various CIA components. All contact, briefing and debriefing reports prepared by the case officer concerning all potential and actual agents, from whatever source, became part of the records of the Operation. These reports, often highly detailed, were carefully reviewed by CHAOS personnel all names, organizations and significant events were then indexed in the Operation's computer. Upon occasion, the information would be passed to the FBI. The individuals referred to Operation CHAOS by the FBI were past or present FBI informants who either were interested in a foreign assignment or had planned a trip abroad. Eighteen of the referrals were recruited. Only one was used on more than one assignment. In each instance the Operation's case officer briefed the individual on the CHAOS "requirements" before his trip and debriefed him upon his return. After debriefing, the agents once again became the responsibility of the FBI. In one instance, the FBI turned an individual over to Operation CHAOS for its continued use abroad. Before going overseas, that agent was met by the Operation's case officer on a number of occasions in the United States and did report for several months upon certain domestic contacts. Seventeen agents were referred to Operation CHAOS by other CIA components. Ten were dropped by the Operation for various reasons after an initial assessment. Four were used for brief trips abroad, with reporting procedures which essentially paralleled those used for the FBI referrals. The remaining three left, individuals had an entree into anti-war, radical or black militant groups before they were recruited by the Oper- They were used over an extended period abroad, and they were met and debriefed on numerous occasions in the United States. One of the three agents travelled a substantial distance in late ation. 1969 to participate in and report on major demonstrations then 141 occurring in one area of the country. CHAOS case officer met and organthe demonstrations. Detailed contact reports were and questioned the agent izations involved in The at length concerning individuals prepared after each debriefing session. The contact reports, in turn, provided the basis for 47 separate disseminations to the FBI, the bulk of which related solely to domestic matters and were disseminated under titles such as: "Plans for Future Anti-War Activities on the West Coast." The second of these agents regularly provided detailed information on the activities and views of high-level leadership in another of the dissident groups within the United States. Although a substantial amount of this agent's reporting concerned the relationship of the dissident group with individuals and organizations abroad, information was also obtained and disseminated on the organization's purely domestic activities. The was formally recruited in April 1971, having been initially contacted by Operation CHAOS in October 1970. During the intervening months the CIA had asked the agent questions posed by the FBI concerning domestic dissident matters and furthird agent nished the responses to the Bureau. Two days after the official recruitment, the agent was asked to travel Washington, D.C. to work on an interim basis; the mission was to "get as close as possible" and perhaps become an assistant to certain prominent radical leaders who were coordinators of the imminent "May Day" demonstrations. The agent was to infiltrate any secret groups operating behind the scenes and report on their plans. The agent was also asked to report any information on planned violence toward government officials or buildings or foreign embassies. This third agent travelled to Washington as requested, and was met two or three times a week by the CHAOS case officer. After each of these meetings, the case officer, in accordance with the standard procedure, prepared contact reports including all information obtained from the agent. These reports, many of which were typed late at night or over weekends, were passed immediately to the Chief of Operation CHAOS. And when the information obtained from the agent was significant, it was immediately passed by the Chief to an FBI repreto sentative, generally orally. The Operation's use of these three agents was contrary to guide- Helms rejected the initial proposal Helms testified that he was not aware of lines established after Director for Project 1 in March 1968. the domestic use of these agents. The Commission found no evidence CIA officers that any of the agents or involved with any of the dissident operations em- 142 ployed or directed the domestic use of any personal or electronic surveillance, wiretaps or unauthorized entries against any dissident group or individual. Any reporting by CHAOS agents in the United States was based upon information gained as a result of their personal observations and acquaintances. G. Collection, Indexing, and Filing of Information by Operation The volume CHAOS of information passing through the by mid-1969 was As Director Helms pointed memorandum to the Directorates, great. CHAOS group out in his Sep- tember 6, 1969, the Operation's main problem was a backlog of undigested raw information which required analysis and indexing. Not only was the Agency receiving FBI reports on antiwar activi- but with the rise of international conferences against the war, and student and radical travel abroad, information flowed in from the Agency's overseas stations as well. The Operation had gathered all the information it could from the Agency's central registry. According to the Chief of the Operation, that information for the most part consisted of raw data gathered on individuals by the FBI which had not been analyzed by the Agency because the information contained nothing of foreign intelligence ties, value. CHAOS through the CIA's New York mail intercept. The Operation supplied a watch list of United States citizens to be monitored by tlie staff of the mail intercept. The number of mail items intercepted and sent to CHAOS during its operation were sufficient in number to have filled two drawers in a filing cabinet. All of these items were letters or similar material between the United States and the Soviet Union. In addition, Operation CHAOS received materials from an international communications activity of another agency of the government. The Operation furnished a watch list of names to the other agency and received a total of approximately 1100 pages of materials overall. The program to furnish the Operation with these materials was not terminated until CHAOS went out of existence. All such materials were returned to the originating agency by the CIA in November 1974 because a review of the materials had apparently raised a question as to the legality of their being held by CIA. The materials concerned for the most part anti-war activities, travel to international also availed itself of the information gained peace conferences and movements of members of various dissident 143 The communications passed between the United States and foreign countries. None was purely domestic. During one period, Operation CHAOS also appears to have received copies of booking slips for calls made between points in the United States and abroad. The slips did not record the substance groups. of the calls, but rather showed the identities of the caller and the receiver, and the date and time of the call. The slips also indicated whether the call went through. assigned to the Operation were analysts who read the materials received by it and extracted names and other information for indexing in the computer system used by the Operation Most of the officers and for inclusion in the Operation's many files. It appears that, because of the great volume of materials received by Operation CHAOS and the time pressures on the Operation, little judgment could be, or was, exercised in this process. The absense of such judgment led, in turn, to the inclusion of a substantial amount of data in the records of the Operation having little, if anything, bearing upon its foreign intelligence objective. The names of all persons mentioned in intelligence source reports received by Operation CHAOS were computer-indexed. The computer printout on a person or organization or subject would contain refer- where the name appeared. Eventually, approximately 300,000 names of American citizens and organizations were thus stored in the CHAOS computer ences to all documents, files or communications traffic system. The computerized information was streamed "need to know" basis, progressing from the least sensitive. A special or categorized on a sensitive to the most computer "password"" was required in order to gain access to each stream. (This multistream characteristic of the computer index caused it to be dubbed the "Hydra" system.) The computer system was used much like a library card index to locate intelligence reports stored in the The files, CHAOS library of files, like the computer index, were also divided into different A "201," or personality, file levels of security. would be opened on an when enough information had been collected to warrant a file or when the individual was of interest to another government agency that looked to the CIA for information. The regular 201 file individual generally contained information such as place of birth, family, occupa- and organizational affiliation. In addition, a "sensitive" file might also be maintained on that same person. The sensitive file generally encompassed matters which were potentially embarrassing to the Agency or matters obtained from sources or by methods which the tion ; ; 144 Agency sought to protect. Operation CHAOS also maintained nearly on numerous organizations.^ Random samplings of the Operation's files show that in great part, the files consisted of undigested FBI reports or overt materials such as new clippings on the particular subject. An extreme example of the extent to which collection could go once a file was opened is contained in the Grove Press, Inc., file. The file apparently was opened because the company had published a book by Kim Philby, the British intelligence officer who turned out to be a Soviet agent. The name Grove Press was thus listed as having in1000 "subject" files and the CHAOS analysts collected all available information on the company. Grove Press, in its business endeavors, had also produced the sex-oriented motion picture, "I Am Curious Yellow'' and so the Operation's analysts dutifully clipped and filmed cinema critics' commentaries upon the film. From among the 300,000 names in the CHAOS computer index, a telligence interest, approximately 7,200 separate personality files were developed on citizens of the United States. In addition, information of on-going intelligence value was digested in summary memoranda for the internal use of the Operation. Nearly 3,500 such memoranda were developed during the history of CHAOS. Over 3,000 memoranda on digested information were disseminated, where appropriate, to the FBI. A total of 37 highly sensitive memoranda originated by Operation CHAOS were sent over the signature total of of the Director of Central Intelligence to the Secretary of State, to the Director of the FBI White House,. to the or to the Secret Service. H. Preparation of Reports for Interagency Groups Commencing Operation in mid-1970, CHAOS produced reports for the interagency groups discussed in the previous chapter. One such s The organizations, to name a few, included Students for a Democratic Society (SDS) : ; Young Communist Workers Liberation League (YCWLL) National Mobilization Committee to End the War in Vietnam Women's Strike for Peace Freedomways Magazine and Freedomways Associated, Inc. American Indian Movement (AIM) Student Non-Violent Coordinating Committee (SNCC) ; ; ; ; ; ; Draft Resistance Groups (U.S.) Cross World Books and Periodicals, Inc. U.S. Committee to Aid the National Liberation Front of South Vietnam ; ; Grove Press, Inc. Nation of Islam Youth International Party (YIP) ; ; ; Women's Liberation Movement Black Panther Party (BPP) ; Venceremos Brigade Clergy and Laymen Concerned About Vietnam. ; 145 report was prepared by the Operation in June 1970. Unlike the June 1969 study, which was limited to account all CIA sources, the 1970 study took into available intelligence sources. In the 1970 analysis, entitled, "Definition of Existing Internal Security Threat — Foreign," the Agency concluded that there was no evidence, based on available information and sources, that foreign governments and intelligence services controlled domestic dissident movements or were then capable of directing the groups. The June 1970 Report was expanded and I'epublished in January 1971. It reached the same conclusions. I. Relationship of Operation CHAOS to Other CIA Components Substantial measures were taken from the inception of Operation CHAOS was highly compartmented. Knowledge of was restricted to those individuals who had a definite to ensure that its activities "need to know" of The two it it. or three week formal training period for the operation's agents was subject to heavy insulation. According to a memorandum in July 1971, such training was to be carried out with "extreme caution" and the number of people who knew of the training was to be kept to "an absolute minimum." The Office of Training was instructed to return all communications relating to training of CHAOS agents to the Operation. The Operation was isolated or compartmented even within the Counterintelligence Staff which, itself, was already a highly com- partmented component of the CIA. The Operation was physically moved from re- Knowledge within the Counterintelligence Staff of proposed CHAOS operations was restricted to the Chief of the Staff and his immediate assistants. The Counterintelligence Chief was technically responsible in the chain of command for Operation CHAOS, and requests for budgeting and agent recruitment had to be approved through his office-. But the Counterintelligence Staff. - the available evidence indicates that the Chief of Counterintelligence had connection with the actual operations of ing to a CIA memorandum in May 1969, Director little instructed the Chief of the Operation to refrain CHAOS. Helms Accord- specifically from disclosing part of his activities to the Counterintelligence Chief. The Counterintelligence and the CHAOS Chiefs both agree that, because of the compartmentation and secrecy of CHAOS, the actual supervisory responsibility for the Operation was vested in the Director of Central Intelligence. This was particularly so beginning in mid- 146 1969. In fact, the Chief of CHAOS, sought unsuccessfully to have his tion, later in histoiy of his office Opera- attached directly to that of the Director. Helms testified that he could recall no specific directions he gave to the CHAOS Group Chief to rejwrt directly to him. To the contrary, Helms said, he expected the Chief to report to the Chief of Counterintelligence, who in turn would report to the Deputy Director Director for Plans and then to the Director. The sensitivity of the Operation was deemed so great that, during one field survey in November 1972 even the staff of the CIA's Inspector General was precluded from reviewing CHAOS files or discussing its specific operations. (This incident, however, led to a review of the Operation by the CIA Executive Director Comptroller — in December 1972.) On another occasion, an inspection team from the Office of Management and Budget was intentionally not informed of the Operation's survey of CIA field operations. activity during an 0MB There no indication that the CIA's General Counsel was ever is consulted about the propriety of Operation CHAOS activities. most programs within the ClA clandestine service, Operation CHAOS was not subjected to an annual review and approval procedure. Nor does there appear to have been any formal review of the Operation's annual budget. Such review as occurred seems to have been limited to requests for authority to assess or recruit an American citizen as an agent. The result of the compartmentation, secrecy and isolation which did occur seems clear now. The Operation was not effectively supervised and reviewed by anyone in the CIA who was not operationally It further appears that, unlike involved in it. Witnesses testified consistently that the extreme secrecy and security measures of Operation CHAOS derived from two considerations First, the Operation sought to protect the privacy of the American citizens whose names appeared in its files by restricting access to those names as severely as possible. Second, CHAOS personnel were concerned that the operation would be misunderstood by others within : the CIA if they learned only bits of information concerning it with- out being briefed on the entire project. It is safe to say that the CIA's top leadership wished to avoid even the appearance of participation in internal security matters and were cognizant that the Operation, at least in part, was close to being a proscribed activity and would generate adverse public reaction if revealed. Despite the substantial efforts to maintain the secrecy of Operation CHAOS, over six hundred persons within the CIA were formally : 147 briefed on the Operation. A considerable number of CIA officers had know of the Operation in order to handle its cable traffic abroad. Enough information concerning CHAOS was known within the CIA so that a middle level management group of 14 officers (organized to and develop possible solutions to various CIA problems) was in a position to write two memoranda in 1971 raising questions as to the propriety of the project. Although only one of the authors had been briefed on CHAOS activities, several others in the group apparently had enough knowledge of it to concur in the preparation of the memoranda. to discuss Opposition to, or at least skepticism about, the CHAOS activities was also expressed by senior officers in the field and at headquarters. Some area division chiefs were unwilling to share the authority for collection of intelligence from their areas with the Operation and were reluctant to turn over the information for exclusive handling and processing by the Oj^eration. When CHAOS undertook the placement of agents in the field, some operations people resented this intrusion by a staff organization into their jurisdiction. In addition, some of the negativism toward CHAOS was expressed on philosophic grounds. One witness, for example, described the attitude of his division toward the Operation as "total negativeness." A May 1971 memorandum confirms that this division wanted "nothing to do" with CHAOS. This was principally because the division personnel thought that the domestic activities of the Operation were more properly the function of the FBI. As a result, this division sup- plied the Operation with only a single lead to a potential agent, and do with the on-going CHAOS activities. Apparently the feelings against Operation CHAOS were strong, enough that Director Helms' September 6, 1969 memorandum was its personnel has little to required to support the Operation. That memorandum, sent to all deputy directore in the CIA, assured them that the Operation was within the statutory authority of the Agency, and directed their support. Director Helms' attitude toward the views of some CIA officers toward Operation was further summarized in a memorandum CHAOS for the record on CHAOS is December 5, 1972, w^hich stated a legitimate counterintelligence function of the Agency and can- not be stopped simply because some members of the organization do not like this activity. J. By Winding Down Operation 1972, with the ending of the Vietnam War CHAOS American involvement and the subsequent lower in the level of protest activities at 148 CHAOS began to lag. The communications traffic decreased, and official apprehension about foreign influence also abated. By mid-1972, the Special Operations Group began to shift its attention to other foreign intelligence matters. At the end of August 1973, William E. Colby, the new CIA Director, in memoranda dealing with various "questionable" activities by the Agency, ordered all its directorates to take specific action to ensure that CIA activities remained within the Agency's legislative authority. In one such memorandum, the Director stated that Operation CHAOS was to be "restricted to the collection abroad of information on foreign activities related to domestic matters. Further, the CIA will focus clearly on the foreign organizations and individuals involved and only incidentally on their American liome, the activities of Operation contacts.-' The Colby memorandum also specified that the CIA was not to be engaged in surveillance or other action against an American abroad and could act only as a communications channel between the FBI and foreign services, thus altering the policy in this regard set in 1968 and reaffirmed in 1969 by Director Helms. By August 1973, when the foregoing Colby memorandum was written, the paper trail left by Operation CHAOS included somewhere in the area of 13,000 files on subjects and individuals (including apdirectly proximately 7,200 personality or "201" files) * over 11,000 memoranda, reports and letters from the FBI; over 3,000 disseminations to the FBI; and almost 3,500 memoranda for internal use by the Operation. In addition, the CHAOS group had generated, or caused the generation of, over 12,000 cables of various types, as well as a handful of memoranda to high-level government officials. On top of this veritable mountain of material was a computer system containing an index of over 300,000 names and organizations vvhich, with few exceptions, were of United States citizens and organizations apparently unconnected with espionage. ; K. Operation On March 15, 1974, the Directions were issued to future policy, CHAOS Terminated Agency terminated Operation CIA CHAOS. matter of when information was uncovered as a byproduct of a all field stations that, as a foreign intelligence activity indicating that a ITnited States citizen abroad was suspect for security or counterintelligence reasons, the formation was to be reported to the FBI. * A CIA statistical evaluation of the files indicates that nearly 65 percent of opened to handle FBI information or FBI requests. in- them were " 149 CHAOS termination cable, no unilateral action against the suspect was to be taken by the CIA without the specific direction of the Deputy Director for Operations and only after re- According to the ceipt of a written request from the FBI and with the knowledge of the Director of Central Intelligence. and computerized index are still intact and are being held by the Agency pending completion of the current investigations. According to the group chief who is custodian of the files, many of the files have little, if any, value to ongoing intelligence operations. The CIA has made an examination of each of the CHAOS personality files and has categorized those portions which should be eliminated. The files Final disposition of those files, as noted, awaits the completion of the current investigations. Conclusions Operation CHAOS unlawfully exceeded the CIA's statutory authority, even though the declared mission of gathering intelligence abroad as to foreign influence on domes- Some domestic tic activities of dissident activities was proper. IVIost significantly, the Operation became a repository for large quantities of information on the domestic activities of zens. This information *was derived principally from American FBI citi- reports or from clandestine collection by the CIA. Much of the information was not directly related to the question of from overt sources and not. the existence of foreign connections with domestic dissidence. It was probably necessary for the tion base on domestic dissident CIA to accumulate an inf orma- activities in order to assess fairly whether the activities had foreign connections. The FBI would collect information but would not evaluate it. But the accumulation of domestic data in the Operation exceeded what was reasonably required to make such an assessment and was thus improper. The use of agents of the Operation on three occasions to gather information within the United States on strictly domestic matters was beyond the CIA's authority. In addition the intelligence disseminations and those portions of a major study prepared by the Agency which dealt with purely domestic matters were improper. The isolation of Operation CHAOS within the CIA and its independence from supervision by the regular chain of command within the clandestine service made it possible for the activities of the Operation to stray over the bounds of the Agency's authority without the knowledge of senior officials. The absence of any regular review of these activities prevented timely correction of such missteps as did occur. 150 Recommendation (5) Presidents should refrain from directing the CIA to perform what are essentially internal security tasks. b. The CIA should resist any efforts, whatever their origin, to involve it again in such improper activities. c. The Agency should guard against allowing any component (like the Special Operations Group) to become so self-contained and isolated from top leadership that regular supervision and review are lost. d. The files of the CHAOS project which have no foreign intelligence value should be destroyed by the Agency at the conclusion of the current congressional investigations, or as soon thereafter as permitted by law. a. — : Chapter 12 Protection of the Agency Against Threats of Violence Office of Security — During the period of widespread domestic disorder from 1965 to 1972, the CIA, along with other government departments, was subject to threats of violence and disruption by demonstrators and self-styled revolutionary groups. In the fall of 1968, a bomb destroyed a CIA recruiting office in Ann Arbor, INIichigan. Bomb threats required the evacuation of other Agency buildings on several occasions. Agency recruiters on college campuses were harassed and occasionally endangered. Protesters held massive demonstrations, sometimes with the announced purpose of preventing operation of the government. Throughout this period, the government was determined not to permit such activities to disrupt its functioning. The Office of Sec\irity of the CIA was charged with the responsibility of ensuring the safety of CIA buildings, employees, and activities and their continued functioning. Three programs to accomplish this mission are of particular concern to our inquiry —Assistance to recniiters on college campuses. —Infiltration of dissident groups in the Washington, D.C., area. —Research and analysis of dissident activity. A. Assistance to Recruiters In light of the increasingly hostile atmosphere on many college campuses, the CIA's Deputy Director for Support (now Administration) directed the Office of Security in Februaiy of 1967 to institute a Agency program of rendering assistance to CIA contacts with college and university officials field offices made recruiters. to determine the general level of dissident activity on each and the nature and extent of activity directed against the (151) campus CIA in par- 152 ticular. The Office of Security tlieii advised tlie recruiter scheduled to visit a particular campus of its findings and recommendations. found nothing to indicate that the CIA collected this information by any means other than openly published materials and conversations with law enforcement and other authorities. If a recruiter elected to visit a campus where there were indications of trouble, the Office of Security would provide him with monitoring and communications support. If trouble arose while the recruiting interviews were in process, appropriate warnings were communicated to the recruiter, law enforcement agencies in the vicinity were alerted, and arrangements were made for terminating the interviews and leaving tlie campus. The Agency had a clearly-expressed policy of avoiding confrontations. If the recruiter elected not to conduct interviews on a college or university campus, the Office of Security would arrange for alternative We interviewing space in ofl^-campus facilities, if possible. Where nec- and communications support was provided In some instances, the campus atmosphere was essary, similar monitoring at the off-campus site. so hostile that scheduled recruitment visits were simply cancelled. The program By that was discontinued of assistance to recruiters time, revisions the Agency's in recruitment in 1970. program eliminated the need for such security precautions. B. Infiltration of Dissident Groups in the Washington, D.C., A Area second program conducted by the Office of Security involving providing timely advance notice of impending demonstrations in the Washington, D.C., area in order to protect the facilities, employees and operations of the Agency. The Director of Central Intelligence knew of this program and approved dissident activity its initial was aimed at scope and purpose. This project began in February 1907.^ It was initially aimed at monitoring' public demonsti-ations which might develop into picketing of Agency buildings. Almost from the outset, however, it became a project for placing "assets" in suitable organizations in order to obtain information concerning intended demonstrations directed at 1 There was testimony from one Agency employee that he had been asked as early as 1964 to monitor certain groups. If such monitoring did occur, it appears to have been confined to one or two men operating on their off-duty hours. 2 According to Director Helms, to "monitor" a group is merely to attend its public meetings and hear what any citizen present would hear to "infiltrate" a group is to join it as a member and appear to support its purposes in general to "penetrate" a group is to gain ; ; a position of leadership and influence or direct its policies and actions. ' 153 CIA properties. ("Asset" is a term used by the CIA to refer to agents and informants other than employees.) A small number of persons employed by the CIxA., either directly or through an Office of Security proprietary, and several of their relatives were recruited to work on this project on a part-time basis. In the early phase of the project, only four or five such part-time "assets" were involved. They were instructed to mingle with others at demon- and meetings open to the public, to listen for information and pick up literature, and to report promptly on any indications of activities directed against Government installations, particularly CIA strations installations. By April 1967. four specific organizations in the "Washington metropolitan area had been designated for infiltration the Women's Strike for Peace, the Washington Peace Center, the Student NonViolent Coordinating Committee and the Congress of Racial Equality. — The part-time agents were instructed to attend meetings organizations, to show an interest in their purposes, and of these to make modest financial contributions, but not to exercise any leadership, initiative or direction. The Agency provided funds for their suggested financial contributions. They were also directed to report how many persons attended the meetings or demonstrations, who the speakers and leaders Avere, what they said and what activities were conducted and planned. These "assets" reported r-egularly, usually in longhand. The reports were not confined to matters relating to intended demonstrations at Government installations. They included details of the size and makeup of the groups and the names and attitudes of their leaders and speakers. By tion it June Agency sought whatever informacould regai'ding the sources and amounts of income of each of late 1967, the to obtain the infiltrated organizations. One was New York, Philadelphia and Baltimore. One was called upon to maintain a continuous check on the movements and activities of certain prominent dissident leaders whenever they arrived in Washington. D.C. Infiltrators were charged from time to time with obtaining specific information on individuals, groups or planned demonstrations. In some instances, the Agency identified leaders or speakers at a meeting by photographing their automobiles and checking registration records. In other cases, it followed them home in order to identify them through the city directory. Photographs were also taken at several major demonstrations in the Washington area and at protest activities in the vicinity of the White House, infiltrator sent to dissident rallies in 154 In September 1967, the National Mobilization Committee to End the War was added to the list of monitored organizations in anticipation of large demonstrations planned for the Washington, D.C., area in the following month. The assets were instructed to gather biographical data on its leaders and participants, and information regarding the location of the organization's identity office, the source of its funds, and the of other organizations which would participate in that demonstration. In mid-August 1968, additional organizations were added to the list for monitoring: the Southern Christian Leadership Conference, School of Afro-American Thought, Washington Ethical Society, American Humanist Association, Black Panthers, War Resisters' League, Black United Front, Washington Mobilization for Peace, Washington Urban League, Black Muslims and Niggers, Inc. Assets were instructed to include within their reports the details of meetings attended, including the names of the speakers and the gist of their speeches, any threatening remarks against United States government leaders, and an evaluation of attitudes, trends, and possible developments within the organization. Funds and personnel adequate to carry out the program in full were never made available. There are strong indications in the CIA's files, and there was testimony before the Commission, that some of the named organizations were never monitored at all. On the other hand, some of them had already been infiltrated before August 1968. On one occasion, in the course of infiltrating one of the dissident organizations, an asset learned that the organization was receiving financial support from a foreign source. The Director of Central Intelligence and the President were informed of this development. Concerned that further investigation of this matter might involve the Agency in forbidden domestic activity, the Director made immediate arrangements to turn the information and the asset over to the FBI. From that point forward, the asset engaged in no further activity on behalf of the CIA. Information gathered in the course of this program was regularly supplied to Operation CHAOS. Indeed, both testimony and circumstantial evidence indicate that the broad sweep of the information collected was in part a result of requests levied on the Office of Security by that Operation. By the latter part of 1968, the Washington Metropolitan Police Department had developed its own capability to collect information on dissident groups in the area, and the Office of Security phased out its project. In his testimony, Director Helms confirmed that these two events were related. The Office of Security has continued to maintain liaison with police departments in the Washington area. 155 Duiino- the period of the operation of this ])ro^ram (February 1967 December 1908), the maximum number of afjents employed at any one time appears to have been tAvelve. None of them was a professionally-trained intellif^ence gatherer. All were residents of the Washington metropolitan area. ]Most of them were manual laborers. They were paid nominal salaries by the CIA, in most cases $100 per month or less. Exto cept for several housewives who were otherwise unemployed, all of had full-time jobs unconnected with dissident groups or activities. During major demonstrations in the Washington metropolitan area, some of them were called upon to put in long hours on evenings and weekends, and for this extra service they received compensation on a modest hourly basis. The primary motive of these assets these assets appears to have been patriotism rather than pay. C. Research and Analysis on Dissident Activity In 1966 and 1967. the Deputy Director for Support ordered the Office of Security to prepare several studies relating to dissidents and dissident groups. One of the studies centered on the individuals and groups who were charging the CIA with involvement in the assassination of Malcolm X, the Black Muslim leader. The study provided background information relating to those accusing the CIA.'' Shortly thereafter, the Deputy Director for Support ordered a further study on dissidents in general. Such a study was prepared, relying primarily upon public news sources. In December 1967. the Office of Security launched a program under which it was to maintain for several years a continuing study of dissident activity throughout the Ignited States. The stated purposes of this project were to identify threats to CIA personnel, projects and installations, and to determine Avhether there was foreign sponsorship or ties to any such groups. All field offices were directed to forward to headquarters whatever relcA'ant information they might find in their respective geographic areas. Such information was to be obtained from willing sources and from newspapers and similar publications. No penetrations, infiltrations or monitoring of dissident groups was ordered or expected. A substantial floM- of material, primarily newspaper clippings, began arriving at headquarters in early 1968. At that point, there was only one employee in the Office of Security charged with the responsibility of studving and evaluating such incoming material. In short order, the arriving material inundated him. No evidence was found which would support such a cliarge. ; : ; ; 156 soon created a special branch to handle the task. The branch began operation in May 1968. Its staff varied slightly in size from time to time, normally consisting of four or five persons. One of the jobs of this branch was to organize and study the material from the field offices. It also gathered relevant information from a The Office variety of other sources, including Newspapers of general circulation in Washington, D.C., New — York and Chicago —Underground newspapers such as the Los Angeles Free Press and the Berkeley Barh; The communist press, such as The Woi^her and Peoiyle^s World; —Organizational publications, such as the Black Panther; All college papers the branch could get and had time to read Any relevant newspaper clippings it found News magazines and Books and articles in general. These materials dealt with activities and plans of dissident groups, the names and travels of their leaders and speakers, and the attitudes and intentions of such figures. The branch had little or no input from the separate element within the Office of Security engaged in monitoring dissident groups in the Washington metropolitan area during 1967 and 1968. It used no infil- — — — — — ; trators, penetrators, or monitors. Occasionally, the branch asked local police department intelligence information on dissident activities, and it always received cooperation. It also received the minutes of meetings of police department intelligence officers from the Washington metropolitan area held from time to time to plan for the handling of demonstrations and potential riots. Finally, it received continuing reports from the FBI relating to activities of dissidents and dissident groups. The end products of this branch were weekly and special reports called "Situation Information Reports" (SIR). These SIR's usually officers for one an analytical approach to events which had been occurring; the other a calendar of forthcoming events. For the most part, the SIR's were published weekly. The only regular recipient of the full SIR's outside the Office of Security was the Chief of Operation CHAOS. A United States Secret Service agent regularly came to the Agency to pick up a copy of the calendar of forthcoming events. Branch personnel and the Secret Service agent also conferred whenever their information conflicted on the times and dates of forthconsisted of two sections coming : events. The sir's were not furnished to the FBI. Neither were copies fur- : 157 nished to local police departments. They were never released to the press or otherwise made public. In addition to providing information from which to prepare the sir's, the materials received from the field and studied by the special branch were used for several other related purposes (1) The Office of Security developed some insight into dissidents and dissident groups. It could identify certain individuals whose participation in an event w^ould suggest the possibility of violence. It analyzed the relationships between some of the individuals and groups and noted the frequent alterations and reorganizations of some of the groups. on dissident groups and their leaders for reference purposes. These files were intended, in part, for use in making security clearance determinations on applicants for employment by the Agency. (According to those in charge of security clearance evaluations, participation in the activities of a dissident organization, even one that was prone to violence, did not necessarily disqualify an applicant for employment with the Agency, although it was considered relevant to his objectivity and willingness to accept Agency secui'ity (2) It developed files discipline.) The information w^hich helped it assess risks posed to CIA offices, recruiters, agents and contractors by upcoming demonstrations and other dissident activity. Although estimates varied somewhat, approximately 500 to 800 files were created on dissenting organizations and on individuals related in various ways to dissident activity. The chief of the special branch "guessed*' that somewhere between 12,000 and 16,000 names were indexed to these files. The great majority of individuals and organizations indexed, or on whom files were opened, were dissidents and dissident groups. This was not true in all cases. Exceptions included Dr. S. I. Hayakawa of San Francisco State College and Father Theodore M. Hesburgh of Xotre Dame University, because they were publicly involved in coping with dissident activities. Few if any of the files opened during this project were destroyed before the commencement of the Commission's work. The Agency intends to retain these files until the current investigations are concluded, when it will destroy them as pemiitted by law. In January 1971 the field offices were directed to limit their activities in support of this project to sending in newspaper clippings and (3) Office of Security obtained the literature of dissident organizations. In late 1972, publication of the Situation Information Reports was discontinued because dissi- dent activity had tapered off markedly. In June 1973, the entire project relating to dissident individuals and groups was discontinued. : 158 During the lifetime of this project (late 1967 to mid-1973), several made by the Office of Security (1) Branch personnel prepared a special report evaluating risks that dissidents would interfere with CIA contract projects at about twenty universities. (2) On at least one occasion, a branch officer briefed the police departments of Arlington and Fairfax Counties, Virginia, on what to expect from large demonstrations planned for the Washington incidental uses were of it metropolitan area. (3) A branch officer delivered a briefing to security officers of the Atomic Energy Commission on the subject of dissident groups in connection with a training program on home-made bombs. (4) Branch personnel served at the Command Center operated by the Office of Security during several large demonstrations in order to provide continuing analyses of developments and an assessment of risks to Agency personnel and installations. During the same period of time, the FBI maintained its own pro- gram CIA however, that the FBI reports concentrated primarily on whether the person or organization was subversive, whereas the needs of the Office of Security extended beyond loyalty or subversion. This was so in connection with screening employment applications and in assessing the degree of risk to Agency facilities and operations by any particular organization or combination of organizations. Knowledgeable FBI officials did not disi)ute these observations, which were offered to explain why CIA mounted its own effort rather than using FBI of reporting on dissident activity. officials testified, reports. Conclusions The program under which the Office of Security rendered assistance to Agency recruiters on college campuses was justified as an exercise of the Agency's responsibility to protect its own personnel and Such support were not undertaken for the purpose of protecting the facilities or operations of other governmental agencies, or to maintain public order or enforce laws. The Agency should not infiltrate a dissident group for security purposes unless there is a clear danger to Agency installations, operations or personnel, and investigative coverage of the threat by the FBI and local law enforcement authorities is inadequate. The Agency's infiltration of dissident groups in the Washington area went far beyond steps necessary to protect the Agency's own facilities, personnel and operations, and therefore exceeded the CIA's statutory authority. operations. activities 159 In addition, the Agency undertook to protect other Government departments and agencies a police function prohibited to it by statute. Intelligence activity directed toward learning from what sources a domestic dissident group receives its financial support within the United States, and how much income it has, is no part of the authorized security operations of the Agency. Neither is it the function of the Agency to compile records on who attends peaceful meetings of such dissident groups, or what each speaker has to say (unless it relates to disruptive or violent activity which may be directed against the Agency). The Agency's actions in contributing funds, photographing people, activities and cars, and following people home were unreasonable under the circumstances and therefore exceeded the CIA's authority. With certain exceptions, the program under which the Office of Security (without infiltration) gathered, organized and analyzed information about dissident groups for purposes of security was within the CIA's authority. The accumulation of reference files on dissident organizations and their leaders was appropriate both to evaluate the risks posed to the Agency and to develop an understanding of dissident groups and their differences for security clearance purposes. But the accumulation of information on domestic activities went beyond what was required by the Agency's legitimate security needs and therefore exceeded the CIA's authority. — Recommendation (16) The CIA should not zations of Americans groups or other organiin the absence of a written determination by the Director of Central Intelligence that such action is necessary to meet a clear danger to Agency facilities, operations, or personnel and that adequate coverage by law enforcement ageninfiltrate dissident cies is unavailable. Recommendation (17) on individuals accumulated by the Office of Security in the program relating to dissidents should be identified, and, except where necessary for a legitimate foreign intelligence activity, be destroyed at the conclusion of the current congressional investigations, or as soon thereafter as permitted by law. All files Chapter 13 Other Investigations by the Office of Security The on a world-wide basis, for ensuring proper security of CIA facilities, operations and personnel. The protection of classified material from unauthorized disclosure is prominent among the responsibilities of the Office. The Office also administers the Agency's security clearance program and investigates breaches or suspected breaches of security by persons affiliated with the Agency. Occasionally it has investigated persons with no connection with the Agency, for various reasons reOffice of Security is responsible, lated to the protection of classified material. The Office is also responsible for providing proper security for sons who have defected to the United States from other nations. per- In the course of conducting investigations, the Office has, on infrequent occasions, engaged in wiretaps, buggings, surreptitious entries and other improper conduct. Some of these activities were clearly illegal at the time they were conducted. Others might have been lawful at the time, but would be prohibited under current legal standards. A. Security Clearance Investigations of Prospective Employees and Operatives The Office of Security conducts security investigations of all pro- Agency employees and and of the employees of private contractors doing business with the Agency on classified projects. Employees are subject to reinvestigation at five-year intervals. Such investigations are undertaken to ensure that persons likely to be security risks are not hired or retained by the Agency and are not used by private companies on sensitive jobs for the Agency. Proper security investigations of prospective Agency employees and operaspective operatives, atives are essential. All such investigations begin with routine (160) name . 161 checks with otlier agencies to determine if there are any recent investigations of the subject on file. If no satisfactory recent investigation has been conducted, the Office of Security conducts its own investi- which includes making contact with friends, neighbors and business associates of the prospective employee or operative. Although the Commission has not attempted to review the thousands of files compiled during the course of security investigations, testimony before it has not given any reason to suspect that the gation, has abused its authority in this regard or made improper use of information so gathered. Charges have been made implying that, on one occasion in 1968, the Johnson Administration improperly used the Agency to investiOffice of Security gate a member of the Nixon campaign staff. The individual involved had received some unclassified materials from the Agency, and the Agency contemplated furnishing him with classified materials as well. A routine security investigation was begun. When the Agency learned that this individual had been asked by Mr. Nixon to work on his campaign, it immediately curtailed its investigation, restricting further inquiry to name checks from other agencies. The Commission finds no basis for criticizing the Agency's actions in this instance. Conclusions The CIA has properly performed the necessary function of screening persons to whom it will make available classified information. The Office of Security's activities in this (^entral Intelligence's statutory intelligence from unauthorized regard help fulfill the Director of duty to protect sources and methods of disclosure. B. Investigations of Possible Breaches of Security Aside from routine security clearance investigations and reinvestigations, the Office of Security has conducted other investigations within the United States in response to specific allegations of jeopardy to intelligence sources and methods. Most of these allegations have been resolved through routine investigative techniques such as name checks or interviews. In a relatively small number of cases, more intrusive methods (physical and electronic surveillance, unauthorized entry, mail covers and intercepts, and reviews of individuals' tax returns) euphemistically known in the Office of Security as "special coverage" were used. While the Commission cannot be certain that it has found every — — 162 instance of "special coverage" within the United States during the last 28 years, it believes most of the significant operations have been discovered. Two questions are involved in the analysis of these investigations: 1. Was it proper for the CIA to conduct the investigation of the particular subject by any 2. 1. Were lawful means ? investigative techniques employed ? Persons Investigated a. By own Persons Affiliated with the CIA ^ far the largest category of investigations involved the Agency's found a total of 76 employees or former employees. We investigations, involving "special coverage" 90 persons, was used. Almost all in which some form of of the persons involved were United States citizens. Approximately one-fourth of the investigations of Agency employees and former employees resulted from information obtained from defectors to the United States that several employees of the Agency might be working for foreign intelligence services. Almost all of the remaining investigations were the result of the discovery of suspicious activities on the part of employees with access to sensitive classified information. For example, investigations were undertaken concerning employees associating with known or suspected foreign intelligence agents; employees spending beyond their means and employees suspected of engaging in conduct which might subject them to blackmail or compromise. A few investigations directed against valued employees with many years of service to the Agency were initiated as much to clear up suspicions concerning the employee as to ensure the Agency that the employee was not a security risk.^ All Agency employees are fully informed by the Office of Security, when they first seek employment, of the possibility that their activities* might be closely scrutinized if they should be suspected of being a ; security risk. The next largest category of cases involved the investigation of 1 If a person affiliated with the Agency who was investigated also falls Into another category of subjects investigated, he has been included in the category with persons affiliated for purposes of the Commission's analysis. Significantly different Issues, however, are raised by investigations falling within the various groups. 2 Under the National Security Act of 1947, the Director of Central Intelligence has the absolute right to discharge any employee without explanation where an employee is suspected of being a security risk. The Director would thus be justified in requesting and receiving that employee's resignation. One of the stated purposes for having undertaken an Investigation of suspected employees was to permit innocent employees to continue their work with the Agency without knowing that they were suspected of having been disloyal. ; 163 Of 49 foreign nationals living in this country. operatives and 11 were defectors. In almost all these, 38 were Agency of these cases, the Office of Security investigated the foreign national at the request of one of the operational arms of the Agency. case. The reasons varied from case to Examples include: —Determining whether the subject was controlled by a foreign intelligence service —Verifying the subject's sources of information; —Ascertaining the bona of a defector;^ —Determining the propriety of using the subject fides for opera- tional purposes in the future. In a few a CIA coverage was initiated in order to protect trouble arose, or to j^rovide a record of conversa- cases, special case officer if tions for later evaluation. In many instances, the employee or operative under investigation was surveilled for only one or two days, or his telephone was tapped so as to overhear only one or two specific telephone conversations. In some other instances, the investigations were more extensive. One investigation by the Office of Security spanned approximately eight years in the late 1940's and early 1950's. The employee involved was alleged to have engaged in Communist Party activities in the 1930''s and was suspected of still being in contact with Communist sympathizers. A combination of physical surveillance, wiretaps and bugging were used front time to time. The apartment occupied by the subject was entered surreptitiously on two separate occasions. The Director of Central Intelligence closely followed this particular investigation. The investigation led eventually to termination of the employment. An extreme example of how far an investigation can go occurred in the late 1960's. A CIA employee who attended meetings of a group which the Agency suspected of foreign left-wing support, had been subject's privy to extremely sensitive classified information. Physical surveillance of the employee Avas conducted for almost one year. surrepti- A was made into the employee's apartment by cutting through the walls from an adjacent apartment so that microphones could be installed. Seven microphones were placed so that conversations could be overheard in every room of the apartment. A cover was placed on the employee's mail for two months during one period and five months tious entry during another. Several of the subject's tax returns were also reviewed. This investigation yielded no evidence of disloyalty. The Agency employees and operatives were congeneral understanding with the FBI. The Bureau investigations of ducted pursuant to a ^ Several American citizens worl^ing with, but not employees of. the Agency have been surveilled to determine their bona fides or the validity of their sources of information, in the same manner as foreign nationals in similar positions. 164 was unwilling (partly due to a lack of sufficient manpower) to under- take every investigation of a breach of security involving employees or operatives of the cies. It CIA or other intelligence departments and agen- expected those departments and agencies to conduct any neces- sary preliminary investigation and would enter the case itself only when hard evidence of espionage was discovered. Further, each member agency of the United States intelligence community had been given primary responsibility by the National Security Council for protecting intelligence sources and methods within 6. its own organization. Newsmen The Commission found two men were tapped in an intelligence information. The other occurred cases in which telephones of three news- effort to identify their sources The in 1962, first of sensitive such instance took place in 1959. apparently with the knowledge and con- Kennedy. Three additional investigations were found in which reporters were followed in an effort to identify their sources. These activities took place in 1967, 1971 and 1972. Presidential concern was continually voiced, during every administration since the establishment of the CIA. that the sources of news leaks be determined and the leaks tliemselves stopped by whatever means. In addition, the committee of the United States Intelligence Board charged with investigating news leaks has historically taken no definitive action to solve the problem.* The attitude of the FBI during the 1960's and early 1970's also remained unwavering. The Bureau would not liandle leak cases unless directed to do so by the Attorney General. The Bureau's procedure in such cases was to submit a request for investigation to the Attorney General for a prosecutive opinion and not to proceed unless the Attorney General issued a favorable opinion and a directive to sent of Attorney General — investigate. Faced with own this set of circumstances, the CIA chose to conduct investigations of "leak" cases by physically surveilling c. On newsmen and its electronically to learn their sources of information. Other Persons Not Affiliated With the CIA several occasions, the Office of Security placed "special cover- age" on other persons with no relationship to the Agency. In 1971, six United States citizens and one alien wore followed for a period of some three months as the result of a report that they intended to *The Chairman of the USIB Security Committee during the early 1970's, when several surveillances were initiated against newsmen by the Office of Security, was also the CIA's Director of Security. At several Security Committee meetings he stated that surveillance of newsmen (which had been suggested at the meetings) was improper. At the same time, he carried out such surveillance at the direction of the Director of Central Intelligence. 165 assassinate the Director of Central Intelligence President. This investigation was conducted and kidnap the Vice in close cooperation with FBI and the Secret Service. On two occasions, investigations the were directed against employees of other government agencies with access to sensitive intelligence material.^ Significant breaches of security were suspected in both cases. On at least one occasion, physical surveillance was placed on a citizen who had approached an Agency employee under circumstances suggesting that he might be attempting to penetrate the Agency. Several investigations of Americans have been initiated for other reasons directly associated with suspected security violations at the CIA. In addition, on approximately eleven occasions, investigations of employees or former employees of the CIA have resulted in some type of coverage of other United States citizens with whom those employees had contacts. Tlie Commission discovered no evidence suggesting that any of these investigations were directed at any congressman, judge, or other public official. Conclusions Investigations of alle'gations against Agency employees and oper- atives are a reasonable exercise of the Directors statutory duty to and methods from unauthorized disclosure, provided they are lawfully conducted. Such investigations also assist protect intelligence sources the Director in the exercise of his unreviewable authority to terminate the employment of any Agency employee. Although such investigations may take on aspects of domestic counterintelligence or enforcement of domestic laws, they are propemnless their principal purpose becomes law-enforcement or the maintenance of internal security. A^Hienever an investigation develops substantia] evidence of espionage or other criminal activity, it should be coordi- nated with the FBI. Investigation of the bona fides of alleged defectors function, lawfully assigned to the CIA by is an important the National Security Council. The Director's responsibility to protect intelligence sources and methods, however, cannot be read so broadly as to permit investiga5 Two additional cases Involved investigations of military officers temporarily assigned These have been included in the figures for investigations of persons affiliated to the Afrency. with the Agency. 166 tions of persons having no relationship whatever with the Agency. The CIA has no authority to investigate newsmen simply because have published leaked classified information. Investigations by the CIA should be limited to persons presently or formerly affiliated with the Agency, directly or indirectly. Where an employee or other person under investigation has suspicious contacts with an unknown individual, sufficient investigation may be conducted to identify that person. Further investigation of the contacts of persons properly under investigation should be left to the FBI or other appropriate law enforcement agencies. tliey The investigation directed against several persons allegedly threat- ening to assassinate the Director of Central Intelligence and kidnap the Vice President was probably an exception to the general rule restricting CIA investigations to persons with some relationship to the Agency. The circumstances were obviously extreme, the threats involved the Agency's director, and the investigation was undertaken with the full knowledge and consent of both the FBI and the Secret Service. Recommendation a. The Director (18) of Central Intelligence should issue clear guide- lines setting forth the situations in which the CIA is justified in conducting its own investigation of individuals presently or formerly affiliated with it. b. The guidelines should permit the CIA to conduct investigations of such persons only when the Director of Central Intelligence first determines that the investigation is necessary to protect intelligence sources and methods the disclosure of which might endanger the national security. c. Such investigations must be coordinated with the FBI whenever substantial evidence suggesting espionage or violation of a federal criminal statute Recommendation is discovered. (19) In cases involving serious or continuing security violations, as determined by the Security Committee of the United States a. Intelligence Board, the Committee should be authorized to recommend in writing to the Director of Central Intelligence (with a copy to the National Security Council) that the case be referred to the FBI for further investigation, under procedures to be developed by the Attorney General. b. These procedures should include a requirement that the FBI accept such referrals without regard to whether a favorable prosecutive opinion is issued by the Justice Department. The CIA should not engage in such further investigations. I 167 Recommendation (20) The CIA and other components and agencies of the intelligence community should conduct periodic reviews of all classified matewithin that department or agency, with a view to declassifying as much of that material as possible. The purpose of such a review would be to assure the public that it has access to all information that should properly be disclosed. rial originating Recommendation (21) The Commission endorses legislation, drafted with appropriate safeguards of the constitutional rights of all affected individuals, which would make it a criminal offense for employees or former employees of the CIA willfully to divulge to any unauthorized person classified information pertaining to foreign intelligence or the collection thereof obtained during the course of their employment. 2. Investigative Techniques Used Direction of some investigations at proper subjects does not mean that all the investigative techniques used were proper. A great many cal surveillance of the cases (directed at 96 persons) involved physi- —that of an individual. is^ observation of the public comings and goings Some of the cases were trivial. In one case, an Agency employee was suspected of working at his private business establishment when he should have been working for the Agency. Employees of the Office of Security went to his place of private business and established that he was in fact there when he should have been at the CIA. Other cases of physical surveillance were more extensive, involving dawn-to-dusk coverage for a period of months. The last case of physical surveillance by the Agency was in 197-3. Current directives ])i'ohibit surveillance off Our Agency property. investigation also disclosed thirty-two wii'etaps, thirty-two in- stances of bugging,*^ and twelve unauthorized entries. used by the CIA was in 1965; the last bug in 1968; The last and the wiretap last unau- thorized entry was in 1971. 8 These figures do not include cases in which the eavesdropping was done with the consent of one or both parties. Such instances were done for convenience in maliinp: a record of a conversation, such as the debriefing of a defector or a recruitment interview. Approximately thirty-four such instances were discovered. In addition, a technical log (for recording OflBce of Security wiretaps and buggings) for the period from December 1961 March 1967, showing eleven telephone taps and sixty-five "mike and wire" operations conducted during that period, suggests that there may actually have been more "mike and wire" operations than the Commission has otherwise been able to document. Witnesses before the Commission testified that most of those installations were used where one or both parties were aware that their conversation was being recorded. In all cases where doubt existed as to whether the CIA had subjected an individual to any questionable investigation, the benefit of that doubt was not given to the Agency, and the investigation has K^nn {»»1,,^n,3 i* until 168 None of these activities was conducted pursuant to a search warrant, and only in connection with the 1965 wiretap did the Agency obtain the prior written approval of the Attorney General. In at least fourteen instances, involving sixteen people, the CIA obtained access to information on individual Federal income tax returns. The Agency was apparently seeking information w^hich would indicate possible connections between the subject and foreign groups. Ninety-one mail covers were used in 63 investigations. Only 12 occasions, mail was actually opened and photographs Avere taken of the contents. Conclusions Physical surveillance, while not reaches the point of harassment. itself The unlawful, may become so if it possible invasions of privacy by physical surveillance and the proximity of that activity to proscribed law enforcement functions indicate that it should be undertaken only after high level authorization within the Agency. Such authorization would include a finding that the proposed surveillance is necessary to protect intelligence sources and methods. When a legitimate CIA investigation reaches the point that a search or some form of electronic eavesdropping is appropriate, the case should be turned over to the FBI or other law enforcement agencies. The unauthorized entries into the homes and offices of American citizens were illegal when they were conducted and would be illegal if done today. Because the law as to electronic eavesdropping has been evolving, the Commission has not attempted to delineate specifically which of the CIA's investigations over the years utilizing eavesdropping were unconstitutional under then-announced standards. Some of those investigations within the United States were proper under the constitutional standards of the time, but many others were not. Under constitutional standards applied today, it is doubtful whether any of those investigations would have been proper, with the possible exception of the one wiretap installed in 1965 where prior written approval of the Attorney General was sought and obtained. Today, eavesdropping would at a minimum require the prior written approval of the Attorney General, based on a showing that the national security was involved and that the circumstances included a significant connection with a foreign power. The Supreme Court has left, open the question whether such approval would be sufficient or whether a judicial search warrant would be required. The execution of a search warrant involves the exercise of a lawenforcement power of a type expressly forbidden to the CIA. If the approval of the Attorney General is an adequate substitute for a warrant in some cases, similar problems may arise in conducting searches or eavesdropping under that authority. . 169 Under the provisions of the Internal Revenue Code, no person has without special authorization, to any information supplied by a taxpayer pursuant to a requirement of the tax law relating to income and other taxesJ Formal procedures for obtaining the necessary authorization have been in effect for some time. They require the applicant (here the Director of Central Intelligence) to make written application to the Commissioner of Internal Revenue for each tax return desired, setting access, forth the reason why the return is needed.* The Commission has found no evidence that this procedure was ever followed by CIA personnel. Mail covers are not unlawful they are conducted in compliance with postal regulations and do not reasonably delay the mail. The opening of mail, however, violated specific statutes prohibiting such if conduct and was unlawful (see chapter 9) In many instances the Agency's files do not clearly indicate the nature of an investigation, the specific evidence suggesting that the pereon investigated was a security risk and thus a proper subject of investigation, the authority giving approval for special coverage, the reasons underlying the decision to investigate, or the results of the investigation. Several past Directors of Central Intelligence testified that they believe they authorized all investigations in which wiretaps, bugs or unauthorized entries were utilized. Yet, in over half of the investigative records, a clear showing of the authorizing official is missing. Investigative files should contain documentation showing the basis and authority for undertaking each investigation. This will assure that such investigations are authorized and have a lawful basis. Recommendation (22) The CIA should not undertake physical surveillance (defined as systematic observation) of Agency employees, contractors or related personnel within the United States without first obtaining written approval of the Director of Central Intelligence. Recommendation (23) In the United States and its possessions, the CIA should not intercept wire or oral communications ° or otherwise engage in activities that would require a warrant if conducted by a law enforcement agency. Responsibility for such activities belongs with the FBI. '25 U.S.C. sec. 26 C.F.R. sec. 8 As 610 (a) and (b). 301.6103(a). defined In the Omnibus Crime Control and Safe Streets Act, 18 U.S.C. sees. 2510-20. 170 Recommendation (24) The CIA should adhere to established legal procedures governing access to federal income tax information. Recommendation CIA strictly (25) investigative records should show that the investigation was duly authorized, and by whom, and should clearly set forth the factual basis for undertaking the investigation and the results of the investigation. C. Handling of Defectors CIA under a National Security Council Intelligence Directive, assigning this duty Investigation of defectors is the responsibility of the Agency as a "service of common concern"' to the intelligence community as a whole. Within the CIA, the Office of Security is charged with providing to the proper security for the handling of persons who have defected to the United States from other nations. A careful procedure has been developed for such handling. (xenerally a defector can be processed in a fevv' months' time. In one instance, however, a defector was involuntarily confined to a CIA installation for approximately three years. For much of this time, the defector was held in solitary confinement under extremely spartan living conditions. The defector was apparently not jDhysically abused. The justification given by the CIA for the lengthy confinement arose out of a substantial concern regarding the defector's bona fides. When the issue was finally resolved, the defector was given total freedom and became a United States citizen. The confinement of the defector was approved by the Director of Ontral Intelligence on the written advice of the General Counsel. The FBI, the Attorney General, the Ignited States Intelligence Board, and selected Members of Congress were all aware to some extent of the continued confinement. In one other case, a defector was physically abused, although not seriously injured. The Director of Central Intelligence discharged the employee involved. Conclusions Such treatment of individuals by an agency of the United States is unlawful. The Director of Central Intelligence and the Inspector General must be alert to prevent repetitions. 171 D. Other Activities of the OflSce of Security The Commission has examined other domestic activities of the Office cover operations, its use of the polygraph as an aid in security investigations, its use of informants among employees or contractor employees to assist in preventing sabotage of its premises of Security, including or penetrations of certain CIA its offices, its organization, and its efforts its use of recording systems in to test the physical security sys- tems of certain private corporations under contract to the Agency. No violations of the CIA's charter have been found in connection with such activities. Chapter 14 Involvement of the CIA in Improper Activities for the White House During 1971, the CIA, at the request of members of the White House staff, provided alias documents and disguise materials, a tape recorder, camera, film and film processing to E. Ho^Yard Hunt, It also complied with a request to prepare a psychological profile of Daniel Ellsberg. This assistance was requested by various members of the White House staff and some of the materials provided were later used in connection with improper activities, including the break-in into the office of Dr. Lewis Fielding, Ellsberg's psychiatrist. President Nixon and his CIA sitaff also insisted in this period that the turn over to the President highly classified files relating to the Lebanon landings, the Bay of Pigs, the Cuban missile crisis, and the Vietnam war. Th^ request was made on the stated ground that these files were needed by the President in the performance of his duties, but was in fact made to serve the President's personal political ends. The Commission's has investigated the facts and circumstances surrounding these events.^ On the basis of this investigaJtion, the staff 1 Documentation supporting this chapter is contained In the statement of information In Hearings before House Judiciary Committee on H.R. 803 (Impeachment of President Nixon) Booli VII (May-June 1974) transcript of trial testimony in United States v. Ehrlichman et al., No. 74-116 (June 28-July 9, 1974) transcript of testimony before House Special Subcommittee on Intelligence of the Armed Services Committee (May 1973July 1974) transcripts of Executive Session Testimony before the Senate Select Committee on Presidential Campaign Activities (Watergate Hearings), principally between December 17, 1973, and March 8, 1974 the testimony and affidavits of witnesses examined by the Commission and its staff and the files and records of the Central Intelligence Ajency. The Commission also requested permission to examine relevant papers of President Nixon's administration which are currently in the custody of the General Services Administration under the terms of an interim order of the United States District Court for the District of Columbia. The provisions of that order permit counsel for the former President to object to such requests and he in fact did so, threatening to seek sanctions from the court to prevent such an examination. With the limited period of time available to complete the Commission's work, it was not possible to obtain a determination by the ; ; ; ; ; court of the validity of the request. (172) 173 Commission concludes that the CIA neither participated in nor knew in advance of the Fielding or Watergate break-ins. The Agency provided certain assistance to the White House staff because the sitaff (and, in the case of the production of certain sensitive files, the President) insisted that it do so, it it appears to have provided that knowledge that the White House assistance without actual engaging in but staff was illegal activities. The Agency knew, however, that some of the demands made on by the White House, such as the demand for a psychological profile of Dr. Ellsberg, were of doubtful propriety, and it is subject to having at times failed to make sufficient efforts to resist those demands. Nevertheless, the principal responsibility for drawing the Agency into these activities falls on the White House staff. Once it became known, however, following the arrest of the Watergate burglars, that some of the activities under investigation involved persons with past or present CIA connections, the Agency's leaders should have undertaken a thorough inquiry and should have disclosed all relevant information to investigating agencies. The Commission considers the Agency's delay of nearly a year in instituting such an investigation, the Agency's failure promptly to disclose relevant information in its possession, and the Agency's destruction of some materials which may have contained relevant information to reflect poor judgment and to be subject to criticism. The evidence bearing on these matters is discussed in this chapter. criticism for A. Employment Howard Hunt by Robert and Company of E. R. Mullen In April 1970, E. Howard Hunt retired from the Central Intelligence Agency after having served in it for over twenty years. With the help of the Agency's External Employment Affairs Branch, he obtained a job with Robert R. Mullen and Company, a Washington, D.C., public relations firm. The Mullen Company itself had for years cooperated with the Agency by providing cover abroad for Agency officers, carrying them as ostensible employees of its offices overseas. Hunt, while employed by Mullen, orchestrated and led the Fielding and Watergate break-ins and participated in other questionable activities. The Mullen Company had tangential associations with some activities of the A^Hiite House staff. These circumstances have led to suspicions and allegations of CIA involvement in or advance knowledge of some of Hunt's improper activities. In this section we review the circumstances of Hunt's em- , 174 ployment and the nature of the Hunt-Mullen-CIA relationship in the light of these allegations. Hunt number from the Agency having held a of responsible positions in the Directorate for Plans (now the Directorate of Operations), After initial service in Europe, Hunt served in various Western Hemisphere stations. In the early 1960s he supervised a group of Cubans forming a skeleton government-in-exile in connection with the Bay of Pigs operation and subsequently was responsible for certain foreign publishing activities conducted under cover by the Agency. Hunt retired on his own volition and in good standing with the Agency. In the course of looking for post-retirement employment, Hunt contacted the Agency's External Employment Assistance Branch, which retired in April 1970 after among other things helps retirees find positions. One of Frank O'Malley, had known both Hunt and Mullen from work on the Agency's cover its officers, his earlier In view of Hunt's interest in the public relations field, O'Malley, with the help of the CIA case officer assigned to Mullen, contacted Mullen for help in placing Hunt. Mullen, who had know^n Hunt at a time after World War II when both had served in the European Cooperation Administration in Paris, arranged several interviews for Hunt during March 1970, none of which produced results. Meanwhile, Mullen decided to expand the operations of his company, and about April 10, 1970, offered Hunt a job which he accepted. Although in early testimony Mullen had claimed that Director Helms or others in the Agency had put pressure on him to hire Hunt, he later acknowledged that this was not correct and that he had hired Hunt on his own initiative. There does not appear to be support for the position taken by Mullen in his early testimony. While Helms had given Hunt permission to list Helms' name as a reference on Hunt's resume, and luid written a letter of recommendation to a friend at another company (a copy of which Mullen might liave seen) there is no evidence that he either wrote or communicated with Mullen* about Hunt, or took part in Mullen's hiring of Hunt. Helms' testimony is that he did not even know Mullen. Within the Agency, staff. Mullen's hiring of Hunt was in fact considered undesirable })ecause it could attract attention to the existing cover relationship between Mullen and the Agency. The Mullen Company was a legitimate public relations firm with a number of clients having no known relationship to the CIA. Robert Mullen had, however, for many years cooperated with the CIA by making some of liis overseas offices available at different times as a cover for Agency employees opei'ating abroad. The existence of INIullens' relationship with the CIA was, of course, kept secret to 175 protect the secrecy of the cover arrangements and this led to complications when, after Watergate, the Mullen Company came under investigation. The existence of the cover arrangements did not involve the Mullen Company in the collection or transmission of intelligence itself. Its only involvement was in the administrative arrangements for operating the offices in which an Agency employee worked during various periods of time, maintaining the appearance of public relations activity by the employee, and handling tive details. The necessary transactions were generally handled be- tween the CIA'S case retired in secret the related administra- officer and Mullen's bookkeeper who was a CIA accountant. After Hunt came to work for Mullen he was told, with CIA's consent, of the existing cover arrangement so that he could deal with administrative matters when necessary during ^Mullen's frequent absences from "Washington. To this end his security clearance was extended by the Agency in October 1970. The record, however, discloses only two instances of Hunt's involvement in these cover arrangements. On one occasion he suggested a new arrangement which the Agency declined; on another, he successfully urged the Agency not to terminate an existing arrangement. There is no evidence of other sigTiificant contacts between Hunt and the Agency from the time of his joining Mullen until July 1971 when he became a "Wliite House consultant. The only documented contacts were inconsequential in nature. Hunt corresponded with the Agency's General Counsel in an unsuccessful effort to change his election of survivorship benefits under the Agency's retirement program. In the fall of 1970. he was asked by the Agency to prepare a citation for a Civil Service award. And some time during this period. Hunt repaid a loan made to him by the employee's association pay medical expenses incurred on behalf of his children. Eiglit months after Hunt was hired by the Mullen Company, Robert Bennett joined the company. Bennett, the son of Senator Wallace Bennett (R-I^tah), had been active in Republican Party affair's and served as Congressional relations officer of the Department of Transportation until January 1971 when he came to the JMullen firm. His political connections led him to be involved in some of Hunt's later to activities, discussed Mullen, below. who was planning to retire, president of the firm and purchase it. had invited Bennett to become This was a disappointment to Hunt who had himself expected to become president and owner of the business. Attempts by Hunt to negotiate a joint ownership arrangement with Bennett failed and Hunt began to think of leaving the firm. There is no evidence of Bennett's having had prior CIA contacts. He 176 stated that he learned of the Mullen-CIA arrangement in February when he was examining Mullen's books preliminary to negol iating purchase price for the company. At that time, he first met the CIA 1971 a case officer and was briefed; occasional meetings followed from time to time to discuss the cover arrangements. Bennett brouglit Hughes Tool Company (now Summa Corporation) as a client to Mullen. He had met Hughes representatives while at the Department of Transportation. Later in 1971, he introduced Hunt to representatives of Hug'hes and various contacts occurred Avhich are discussed further below. Conclusions The investigation disclosed no participation by retirement in any operation of the CIA, other than Hunt after his as described. Nor has this investigation disclosed evidence of participation by the Mullen Company or its employees during the period following Hunt's employment in any operations of the CIA other than those described. There is evidence that various companies who were clients of the Mullen firm may in turn have had relationships with the CIA, but no evidence has been found that either the Mullen firm or any of its employees pai'ticipated in those relationships. Those activities of Hunt which culminated in the Fielding and Watergate break-ins, for some of which he sought CIA support, were, so far as the record shows, conducted independently of his Mullen employment. No evidence has been found that the Mullen Company or its employees were either involved in those activities or that they served as a vehicle for CIA involvement in them. These matters are discussed in greater detail in later sections. B. CIA Assistance to Hunt In July 1971 the CIA, at the request of Hunt, who had been hired as a White House consultant, provided him with personal disguise materials and alias identification. Within the next month the CIA provided Hunt witli additional assistance, including a tape recorder and concealed camera, and disguise materials and for G. (jordon Liddy. Some alias identification of these materials v.ere used by Hunt and preparing for and carrying out the entry into the office of Dr. Fielding, Daniel EllSberg's psychiatrist. In particular, the CIA at Hunt's request developed pictures taken by him of that office in Liddy in the course of his reconnaissance for the break-in. 177 These circumstances have led to suspicions and allegations of CIA involvement in or knowledge of Hunt's unlawful activities. In this section we review the record concerning CIA's assistance to Hunt. Early in July 1971, Charles W. Colson, Counselor to President Nixon, invited Hunt to become a part-time consultant for the White House. Colson and Hunt were acquainted and had occasionally met for lunch. Hunt had expressed interest in Colson's "White House work. Colson was looking for someone to become familiar with the Pentagon Papers and to coordinate White House efforts resulting from by the New York Times. Colson introJohn D. Ehrlichman, Assistant to the President, either their recent publication duced Hunt to immediately before or just after he was hired. Shoi'tly after told him Hunt started to work at the White House, Bennett of an acquaintance, Clifford de Mott, who claimed to have derogatory information about the Kennedy family. Bennett knew and had approved of Hunt's White House job and thought de Mott might be of interest to the White House. Hunt and Colson agreed that de Mott should be interviewed. Hunt felt, however, that his identity as a White House staff member should be concealed and proposed to obtain a disguise from the CIA. At Hunt's request, relayed by Colson, Ehrlichman called General Robert E. Cushman, Jr., then Deputy Director of the CIA, on July 7, 1971. According to notes of the conversation taken by Cushman's secretary, Ehrlichman 'alerted him that Hunt had been asked by the President to do some special consulting work on security problems, that he may be contacting Cushman, and that Cushman should consider "he has pretty much carte blanche." Ehrlichman has testified that he does not recall having called Cushman about Hunt and that he does not believe he did. Cushman routinely reported the news about Hunt's \^Tiite House employment at the Agency's July 8, 1971, Senior Staff meeting attended by Helms. He also advised the Agency's Director of Security of Hunt's assignment since it related to security, and the Director in turn may have called Hunt's office to establish contact. On July 22, 1971, Hunt met Cushman at the Agency by appointment. Hunt, who had known Cushman during his service as an Agency employee, asked to speak to Cushman alone. Hidden equipment in Cushman's office recorded the conversation. Such recordings were made by Cushman on occasion, but he was not able to explain why was recorded. Hunt explained that he had been charged with a "highly sensitive mission" by the White House and needed a physical disguise and some identification cards for what he described as a "one time operation in and out.'' Cushman has stated that he did not consider this this particular conversation — 178 request as something to be concerned about inasmuch as the request was made by an experienced ex-CIA officer with the endorsement of high-ranking- White House staff. Cushman also stated that he assumed that the Agency's technical staff would require an appropriate accounting of materials given to Hunt. Moreover, materials of the sort requested by Hunt were considered by Agency personnel implements for an unauthorized entry. And, indeed, Hunt's purpose when asking for these materials was simply to conceal liis White House's connecas being useful for disguising one's identity, not as tion while interviewing de Mott. (and a contemporaneous memorandum by his executive assistant confirms) that he reported this request to Helms routinely a few days after he had given authority to proceed, and that there was no discussion about it. Helms, however, did not recall having Cushman has testified ] learned of Hunt's requests for technical assistance until later in August, either in connection with Hunt's subsequent request for secretarial assistance or in connection with the decision to terminate further assistance to him. It was during this same period of time that Helms, at the request of David R. Young of the White House, authorized preparation of a psychological profile of Daniel Ellsberg, discussed in a later section of this chapter. The Commission has found no evidence indicating that Helms then knew that Hunt had a part in the profile project. Nor has it found evidence indicating Cushman knew of the request for prepara- j tion of the profile. In any event, Cushman directed that his executive assistant handle Hunt's request for technical assistance. Since the materials requested would be provided by the Technical Services Division (TSD) of the Directorate for Plans, the executive assistant advised the Deputy Director office of the and then contacted the Acting Chief of TSD. Hunt, at his request, was identified to TSD only as "Mr. Edward", not by his true name, but TSD was told that the request came from the White House. The materials were prepared and on the following day, July 23, 1971, a TSD technician met Hunt at a Washington apartment maintained by the Agency for clandestine meetings (where all subsequent meetings were also held) and supplied him with a wig, a pair of glasses, a speech-altering device, a driver's license and for Plans of the request miscellaneous identification cards (not including credit cards). On ' ' his return, the technician briefed the Acting Chief on the meeting with Hunt. Hunt and the technician met again week later to adjust Hunt's glasses. Hunt used at Hunt's request about a Rhode There is no evidence that he disclosed to the Agency any information beyond the fact that he needed assistance to conduct an interview in disguise. the disguise to interview de Mott in Island. > 179 The Agency's regulations required the execution of authentication forms by an authorized officer before the issuance of technical assistance. In this manner the purposes for which assistance was required had to be disclosed and the material received had to be accounted for, either by its subsequent destruction or return. In the case of the assistance supplied to Hunt, the Acting Chief assumed, f roui the maimer in which the request was given to him, that normal accounting procedures were to be dispensed with; he drew that conclusion fi'om the fact that Hunt was identified to him only by an alias and that the entire request was treated as particularly sensitive. The Acting Chief and the technician did, howevei', continually request that Hunt promptly return the materials. According to the Actinfj Chief, it was Hunt's continuing evasion of these requests that eventually led to the executive assistant later in him to express his concern August. Additional requests by Hunt for assistance followed. On August 18, 1971, he called the executive assistant requesting that a particular Agency secretary, then stationed in Paris, be detailed to him temporarily for a "highly sensitive assignment." After discussion with Cush- man. the executive assistant turned Hunt down, otfering him other qualified secretarial assistance available at Headquarters which Hunt, however, declined. On August 20, him for 1971, Hunt again met with alias business cards. He the technician and asked also i-equested a tape recorder to record conversations in a noisy enviromnent. TSD's Acting Chief approved these requests as being within the scope of the initial request. About this time, Hunt also requested a so-called backstopped New York telephone number and a backstopped dri\et"s license and credit cai'ds. Backsto])ping requires arrangements sucli as a telei)hone answering service and coo))eration witl^ the issuing authority for providinir independent vertification for the alias identification. The Acting Chief advised the technician that this request would not be met without the Director's a]iproval. He did, however, ask one of his electronic technicians to find out what would be required to provide this service, and the technician appears to have asked TSD what infoimation would be needed to provide a backstop]:)ed telephone number. A typewritten note from another officci- to the technician s])ecified some of the needed information that would have to be obtained from Hunt. It is not known what was done witli that note, but on August 2() or 27. 1971. Hunt's secretary telephoned certain of this iufoi-mation to tho technician who typed a memorandum recording it. There is no evidence, however, that steps were taken within the Agency (beyond this gathering of information) to provide backstopped service; in any event, as discussed below, by August 27, 1971. iustructions were issued cuttinof off all further assistance to Hunt. 180 Another meeting between the technician and Hunt had taken place on August 25, 1971, at which time the business cards and tape recorder were delivered to him. Hunt had brought Liddy identified only as George to this meeting and requested disguise materials for him as well as a concealed camera. These were provided by the technician later that day after approval had been given by TSD's Acting Chief. Hunt renew^ed his request for a backstopped telephone number. In the course of the meeting the technician heard Hunt and Liddy speak of being engaged in narcotics-related activities and of catching a plane that evening. In fact, Hunt and Liddy were about to fly to — — Beverly Hills for a reconnaissance of the office of Dr. Fielding, Ellsberg's psychiatrist, but the Commission has found no evidence that anyone at the Agency had knowledge of this plan. On the evening of the next day, August 26, 1971, Hunt called the technician from Los Angeles and asked him to meet him at Dulles Airport at 6:00 a.m. the next morning (August 27). Having first cleared with his Acting Chief, the technician met Hunt and received Hunt possible. The the concealed camera and a cartridge of film to be developed. asked that the pictures be delivered to him as soon as technician took the film to the CIA laboratory and then returned to his office. Meanwhile, TSD's Acting Chief became concerned over Hunt's failure to return the alias materials which had been issued with the understanding that they would be for a "one time operation'', coupled with the introduction of an unknown person (Liddy) and his requests for a concealed camera and backsto})ped alias materials. He instructed the technician to tell Hunt that no additional support would be given without fui'ther authorization from the Director. He then called Cushman's executive assistant on August 26, 1971, to report and express his concern. The executive assistant instructed that no further assistance should be provided to Hunt and directed him to get the camera and additional disguises back as soon as possible. The executive assistant also wrote a memorandum to Cushman expressing' his concern over the assistance being requested by Hunt and noting that "there was also the question of activity." He recommended its use in domestic clandestine that all further requests be cleared in advance with the Deputy Director's office and that assurance be obtained from Ehrlichman that "Hunt's latest caper is OK." On the memorandum, Cushman telephoned Ehrlichman and advised him that the Agency morning of August 27, 1971, after receipt of this could not properly meet Hunt's requests and Ehrlichman agreed that he "w^ould call a halt to this." Cushman passed the memoranda reflecting these comnninications to later and noted Helms who saw them several days his approval of the cutoff of assistance to Hunt. 181 By this tiino. the films wliicli Himt Imd delivered to the technician on Auoust 27, 11)71. had been developed and i:)rintod. The laboratory made no extra copies of the pi'ints, apparently becanse the matter was repirded as sensitive. When they Avere finished, the technician, prir>r to delivering them to Hunt, showed them to the Acting Chief who directed that xerox copies be made and retained in a file. He and the technician reviewed them briefly; their testimony is that they could not identify the subject of the pictures but speculated that it might be a California medical building having some connection with a narcotics ti-aining exercise, Liddy having previously mentioned narcotii's. Through an enlargei- they could make out the names "Dr. Fielding" and "Dr. Kothenbei-g" on the side of the building and the technician wrote the names on tlie xerox copies. The Acting Chief placed I he xerox c{)])ies, along with othei- notes and papers related to the dealings with Hunt, in a folder labeled "Mr. Edward" (Hunt's alias) and the pictures Avere delivered to Hunt by the technician who oai'ly advised him of the cut off of assistance. Later that day the executive assistant, with Cushman also on the phone, called the Acting Chief and confirmed that Hunt was to receive no more assistance. They spoke briefly about the pictures. The Acting Chief has testified that they speculated that the pictures showed a medical building in Southern California, ])0ssibly involved in a narcotics exercise, but made no attempt to ascertain what they showed. On August 31, 1071. ?Iunf called the technician once again to renew his request for a backsto])i)ed telephone number but was turned down. The ilisguise materials were not returned to the Agency and were found in the possession of some of the men arrested at the Watergate in June 1072. Copies of the pictui-es taken with tlie CIA camera were turned over by the Agency to the Justice Department during the "Watergate investigation in January 1973. eventui lly Conclusions The providing Hunt and Liddy was not within the intelligence functions The Commission of assistance to Agency's authorized foreign has found no evidence, however, indicating that the Agency was aware that Hunt's request would involve it in unauthorized activities, at least until request was made for a concealed camera aiid backstopped tele])l'.onc number at which time prompt action was taken to terminate fuither support. Xor has the investigation disclosed facts indicating that the CIA knew or had reason to believe that the assistance it provided to Hunt and Liddy would be used in connection with the planning of an illegal 182 entry. Indeed, as will be discussed below, request to when Hunt made his first Cushman, the plan for the Fielding break-in had not yet been formulated. The Agency in providing must rest primarily on responsibility for involvement of the support ultimately used for illegal activities White House staff. It is to some extent understandable that the Agency would want to accommodate high-level White House requests the which on their face do not appear Agency is to be improper. Nevertheless, the subject to criticism for having used insufficient care in controlling the use of the materials it supplied. Inasmuch as the as- from the foreign intelligence services normally provided by the CIA to the White House, the responsible Agency officials would have been well advised to insist on compliance with the normal procedures for control of materials of this sistance provided in this case differed kind, notwithstanding (or perhaps particularly because of) the air of mystery that surrounded Hunt's request. Those procedures would at have required disclosure of where and when the materials were to be used and might have served to deter the request. The Agency should also use particular care in accommodating requests by or on behalf of former employees or contractors. least C. The Ellsberg Psychological Profile In July 1971, at the request of David R. Young of the White House staff, the CIA prepared a psychological profile of Daniel Ellsberg, then under indictment for theft of the Pentagon Papers. Various materials, including FBI reports, were provided for this purpose by the White House staff to the Agency's psychiatric staff. In November 1971, a second profile was prepared at the request of the White House on the basis of additional materials supplied by it to the Agency. Daniel Ellsberg was a patient of Dr. Lewis Fielding, a Beverly Hills psychiatrist. In September 1971, Hunt and Liddy. after having* received CIA support, engineered a break-in into his office in an attempt to obtain material on Ellsberg for use in the preparation of the second profile. These circumstances have given I'ise to suspicions and allegations of Agency involvement in or prior knowledge of the Ellsberg break-in. In this section, we review the circumstances surromiding the preparation of the profile in the light of these allegations. The publication of the Pentagon Papers, coming on top of a series of unauthorized disclosures of classified materials, caused consternation in the AYhite House. It led to the creation in Julv 1971, at the j t 183 President's direction, of the Special Investigative Unit, headed by David Young and Egil Krogh. This group, which later became popuhirly known as tlie White House Plumbers, reported to Ehrlichman. Its principal purposes were to induce action by various Executive agencies to prevent unauthorized disclosures, to review classification and security practices and procedures, and to ensure thorough investigation of all aspects of the case against Daniel Ellsberg, who by then had been indicted. On July 28, 1971, Hunt submitted a written proposal to Colson for a series of overt and covert operations to assemble a file on Daniel Ellsberg that would help "to destroy his public image and credibility." Among other things, he proposed that the CIA prepare a "covert psychological assessment-evaluation'' and that Ellsbevg's file be obtained from his psychiatrist. Colson passed the proposal Young and Krogh with Ehrlichman's approval. Young in July 1971 contacted the CIA's Director of Security Avith the request that such a profile be prepared. Young had previously been in contact with Helms in connection with to and, White House projects to revicAv classification and security procedures and Helms had authorized him to deal directly with the Director of Security. Young told the Director of Security that the White House wanted a personality assessment on Ellsberg similar to others previously done by the Agency on foreign leaders to assist in determining the motivation for an implication of the theft of the papers, and that Ehrlichman had a personal interest In this project. his concern to Young and ! I I A few days later, he discussed the request with Helms. The Director approved it, stating that he believed that since the request dealt with a major security leak, providing assistance would fall within his obligation to protect intelligence methods and sources. A CIA stud}' had found that release of the Pentagon Papers disclosed the identity of certain CIA operations and connections. In addition, shortly before the decision was made, the Director had received a report that a full set of the Pentagon Papers had come into the possession of a major foreign embassy, and this report may have influenced his decision. Xevertheless, the approval had been given reluctantly. As Young later put it in a memorandum to Ehrlichman reporting on CIA's preparation of the profile the Director. 1 stated that The Security Director expressed he would have to take it up with : CIA has been understandably but, responsive August On to the reluctant to involve itself in the domestic area, President's wishes, has done so. (Memorandum of 20, 1971, p. 7) July 29, 1971, the Director of Security directed the Agency's Chief of Medical Services to prepare the profile, and he in turn assigned the task to the Chief of the Psychiatric Staff, who had had prior 184 experience along these lines. prepare a first draft. The latter called in a staff psychiatrist to All three doctors had reservations about the project as being outside the Agency's charter since it involved an came from the Director of Security instead of their superior, the Deputy Director for Support. Nevertheless, when copies of FBI reports, newspaper and magazine clippings, and State Department security and evaluation reports arrived from the White House in a few days, a draft profile was prepared for the Director of Security, who sent it to Young on AuAmerican citiezn. They were also disturbed that the order gust 11, 1971. Young, Hunt and Liddy reviewed the profile and considered it inadequate. On August 12, 1971, they met with the Chief of the Psychiatric Staff to discuss what could be done to improve it. He stated that the information given to him was insufficient. Liddy said that Ellsberg had been under the care of a psychiatrist named Dr. Fielding and that more information was available, but he did not specify what it was. Young and Liddy made the suggestion, rejected by the CIA psychiatrist, that the Agency could interview Ellsberg's former wife. Liddy and Hunt also stated that they wished to "try Dr. Ellsberg in public." The Agency psychiatrist had known Hunt when he was with the Agency and had rendered services to his family. At the end of the meeting, Hunt took him aside and asked him not to tell anyone at the Agency of his presence. Later, the psychiatrist telephoned Hunt to say he could not conceal his presence, and he subsequently discussed it, as well as the substance of the meeting, with the other doctors involved. was after the meeting with the psychiatrist that Hunt, Liddy, Young and Krogh decided that an effort should be made to obtain It Dr. Fielding's file on Ellsberg. This led to the Fielding break-in of September 3, 1971, discussed in the following section. Meanwhile, also on August 12, 1971, Ehrlichman and Young met with Helms and the Director of Security apparently to impress on them the importance of the Pentagon Papers investigation and the* problem of leaks, as well as the status of Young as Ehrlichman's representative. The Agency shortly received additional materials of the same nature from Hunt there is no evidence, however, that they included ; any psychiatric reports. On August -20, 1971, the doctors met with the Deputy Director of Support to discuss this project. They concluded new material did not assist in preparing a personality assessment, that Ellsberg's former wife should not be interviewed, that the prospective use of the study as well as Hunt's participation were matters of concern, and that these matters should be taken up with the Director of Central Intelligence. The doctors hoped, however, that that the i a : 185 inasmuch as no significant new material had been received, the matter would simply come to an end at this point. On August 23, 1971, the psychiatrist called Young to acknowledge receipt of the material. Young told him Hunt would contact him. No further work was done on the profile. On September 30, 1971, however (some few weeks after the break-in at Dr. Fielding's office), Young called to reactivate the project and set up a meeting with the j)sychiatrist. On October 12, 1971, additional materials of the same kind as before were received from Hunt. They did not include, so far as could be ascertained, any psychiatric reports. On October 27, 1971, the psychiatrist met Avith Young, Liddy and Hunt and was asked to prepare a new profile incorporating the additional information supplied. A second profile was then prepared. The doctors were still concerned that the Agency might be exceeding its charter but believed that the question liad been considered and resolved by the Director. On November 8, 1971. the profile was sent to Helms who On November 9, 1971, Helms wrote to Young reviewed it. have seen the two papers which [the psychiatrist] preparied for you. We glad to be of assistance. I do wish to underline the point that our involvement in this matter should not be revealed in any context, formal or informal. I am sure that you appreciate our concern. I are, of course, The psychiatrist himself delivered the profile November 12, 1971. Young-, Hunt and Liddy were it and At a brief discussion of its contents was to Young's all present to receive office on held. CIA's activities in connection with the psychological profile appear to have ended. Only after the Fielding break-in was disclosed by testimony to the Watergate Grand Jury in April 1973 did these activities come to light. this point, the Conclusions The preparation of a psychological profile of an American citizen who is not involved in foreign intelligence activities is not wnthin the Agency's statutory authority. Although Ellsberg, by leaking the Pentagon Papers, may have jeopardized sources and methods of intelligence for which the Director is responsible, no evidence appears to have been presented to the Agency that the profile Avas desired for the purpose of protecting intelligence sources and methods. Indeed, by the time the second profile was prepared, at least one of the CIA doctors had reason to believe it might be leaked to the public — highly improper activity and one not connected with the CIA's proper area of responsibility. 186 The Agency was induced to accept this assignment by pressure from the White House in the name of tlie President and purported national security. This request came from Young, who had previously served as the National Security Council's liaison to the Agency, but all of the CIA officers involved knew that it was of doubtful propriety. However, the investigation has disclosed no evidence indicating that the Agency had prior knowledge of the break-in into Dr. Fielding's office or generally of efforts to secure additional information on Ellsberg by unlawful means. As a result of the Agency's normal practice of compartmentation, i.e., restricting knowledge of an activity to —evidently followed with particular care in the case of the White House projects because they were regarded as sensitive there apparently was no communication between the two Directorates with which Hunt was dealing during the period. While the Directorate of Support was preparing the profile, the Operations Directorate was giving Hunt assistance, and neither seems to have those participating in it j — known what the other was doing. Only Director Helms appears had some knowledge of both activities, but the evidence indicates that his information was general and fragmentary and that he knew neither of Hunt's involvement in to have the profile project nor of the photographs of Fielding's produced Hunt. Although it would seem inappropriate to place responsibility on the Director on the basis of hindsight for failing to connect two seemingly unrelated series office as a result of the technical support given Commission that procedures should be established which would allow sufficient information about White House of events, it is clear to the requests to be gathered together at one point so that, in the future, the propriety of Agency participation can be judged with the benefit of all of the relevant facts. In any event, the Commission concludes that the Agency is subject to criticism for proceeding with the preparation of a project considered to be of doubtful authority without consultation with its own counsel and other responsible White House officials. Moreover,' the Agency's medical officers, in spite of their repeatedly expressed reservations, were negligent in failing to insist that those reservations (and all underlying facts) be presented to the Director, particularly after learning of the purpose to use the profile to try Ellsberg in public. The Commission realizes that requests such as that for the profile confront the Director with a dilemma between his obligation to serve the President and compliance with his understanding of the Agency's statutory limitations; at times, as hereafter discussed, a Director may well have to conclude that he has no alternative but to submit his resignation. They also confront Agency staff with a similar dilemma I 187 between obeying orders and acting within what they understand to be the Agency's authority. At the very least, the staff must make certain that their superiors have all the facts and considerations before them before they make their final decision. D. The Break-in On September 3, of Dr. Fielding's Office 1971, three Cuban emigres, under Hunt and Liddy, broke into the office of Dr. psychiatrist. One of the Cubans was at the time of the CIA in IMiami ; another had served the for several years until 1966. CIA the command Fielding, Ellsberg's a paid informer of as a contract agent Hunt and Liddy had previously recon- using the CIA-supplied camera and disguises. Their objective was to obtain psychiatric information useful in the preparation of the profile which the CIA had been asked to prenoitered the Fielding office, pare. Suspicions have arisen from these circumstances and charges have been made that the least acquired prior CIA was involved in the Fielding break-in or at knowledge of it. The relevant facts are reviewed in this section. Following receipt of the first Ellsberg profile, which they regarded as unsatisfactory, Young and Krogh. in a memorandum to Ehrlichman, proposed an operation to obtain Ellsberg's psychiatric file. Hunt and Liddy made the reconnaissance of Dr. Fielding's office on August 26, 1971, referred to above. After their return, a so-called "covert operation" to obtain the file was authorized by Ehrlichman. Hunt went to Miami and recruited Bernard Barker and he in turn recruited Rolando Martinez and Felipe de Diego for the operation. Both Barker and Martinez had a long history of association with the Agency. Barker was an American citizen who had lived in Cuba. He had joined the Cuban police force in the 1950's as a result of which he lost his American citizenship. While in the Cuban police, he was recruited by the Agency which helped him escape to the United States in 1959. Barker worked for Hunt during the Bay of Pigs period helping to organize a Cuban government-in-exile. He continued to serve in various CIA operations relating to Cuba until 1966, when the Agency no longer needed him and terminated entered the real estate business in his contract. Miami but made it Barker had clear to the Agency that he would be willing at any time to return to its service. There is, however, no record of any contacts or connections between Barker and the Agency after 1966. Martinez was recruited by the Agency in Miami in 1961. Until 1969, he participated in a large number of maritime operations relating to 188 Cuba and When comi)iled what the CIA considered a distinguished record. these operations ended, Martinez obtained a real estate license and went to work for Barker. The Agency, in recognition of his services, had continued his contract payments until early 1970. At that time, the Agency had planned to terminate him but agreed to pay him $100 per month for a year to help him make the transition to civilian life. In return he was required to report monthly to a CIA case officer in Miami on developments in the Cuban community. In July 1971 it was agreed that the retainer would be continued for one more year because of Martinez' ability to report illegal attempts by Cuban exiles to infiltrate Cuba, but it was intended that it should end in July 1972. There is no record that Felipe de Diego, the third participant, ever had a CIA connection of any kind. In April 1971, Hunt, on the occasion of a business trip to Miami, had renewed his acquaintance with Barker. Barker introduced Hunt to Martinez and de Diego and together they attended the tenth anniversary commemoration of the Bay of Pigs in Miami on April 17, 1971. In August 1971 Hunt contacted Barker and asked him to recruit a crew to undertake what he described as an important security operation. On September Fielding's 3, office in The 1971, Barker, Martinez and de Diego broke into Dr. Beverly Hills. Hunt and Liddy supervised the op- were pried open but, although the testimony has been conflicting, it appears that no files on Ellsberg were found. The office was left in a shambles to cover the group's tracks by making it appear that someone looking for drugs had broken in. That night the Cubans returned to Miami Hunt and Liddy left Los Angeles the next morning. eration. file cabinets in the office ; Shortly after the break-in, the Los Angeles police picked up one Elmer Davis who was wanted on several charges. In return for the dismissal of other charges, he pleaded guilty to the Fielding burglary, although there is no evidence he had had any part in it, and the police on was thereafter closed. As a result, the burglary received no* publicity, and it was not until John Dean and Hunt testified before the Watergate Grand Jury in April 1973 that the facts of this operation came to light. The Agency, of course, had in its files xerox copies of the pictures taken by Hunt in August which showed Dr. Fielding's office building with his name on the wall above his parking space. Those copies had been placed in a folder in the safe of the Acting Chief of the Technical Services Division on August 27, 1971, and appear to have been examined only by him and his technician. The medical staff working on the Ellsberg profile evidently was not aware of them. The pictures were discovered after the Watergate break-in and turned over to the Defile it > 189 partinent of Justice in January 1973. There in the Agency was aware of is no evidence that anyone their significance until the Fielding break-in Avas disclosed to the Watergate Grand Jury in April 1973. In addition, personnel in the Agency had certain contacts, described below, with participants in the break-in after it took place, but there is no evidence that as a result the Agency received any information about it. Hunt, of course, had contacts with the CIA psychiatrist in October and November in connection with the preparation of the final version of the profile (discussed above). Hunt for Plans for lunch in October 1971 to cover arrangement with Mullen met the Deputy Director ask him to continue the existing also Company Europe. In preparation for the lunch, the Deputy Director for Plans was briefed on the technical support which had been given Hunt in July and August by the Technical Services Division and was briefly shown the xerox copies of the Hunt photographs in the files. He and the Chief of TSD glanced at the pictures which, according to their testimony, meant nothing to them. At the lunch, the conversation was confined to the Mullen matter. Hunt did not talk about his other activities. Shortly thereafter. Hunt asked an officer in the European Division for some unclassified information concerning a French security leak in 1954, which was supplied. There is no evidence of further Agency contacts with Hunt during the period immediately in following the break-in. Martinez serv^ed as a paid informer of the Agency's Miami Station during the period both before and after the break-in. Although he saw^ his case officer about once a month, there is no evidence that he ever disclosed anything about his activities for Hunt. Martinez testified that late in 1971 he casually mentioned to his case officer that Hunt had been in ]\Iiami and was working for the White House. The case officer later told him that he had run a name check on Hunt at the Station (as indeed he had) and that there was no information respecting Hunt's being employed by the White House. Martinez took that response to mean that Hunt was on a secret CIA mission of which the Miami Station was not to know. On the strength of his past experience with maintaining the secrecy of CIA operations, he therefore disclosed none of the Hunt-related activities to his case officer. Conclusions The investigation has disclosed no evidence to suggest that the Agency kncAv or suspected that Hunt had participated in a burglary or other illegal operations in the period in } occurred. which the Fielding break-in — 190 Helms knew that the Agency was preparing the Ellsberg profile at the time when it was also providing certain technical support to Hunt. The Commission has found no evidejice. however, that either the Director or any other Agency em- As discussed above, only Director ployee had knowledge of facts sufHcient to disclose the plans for or the carrying out of the Fielding break-in. E. White House Efforts to Declassify CIA Files During 1971, a major etfort was undertaken by the White House staff on instructions from the President to declassify documents and files of historical interest. Within the White House, the declassification campaign, although inherently legitimate, was also sought to be used for political purposes by to critics of the administration. providing materials embarrassing The White House staff at first, and Nixon, brought pressure to bear on the CIA to turn over to the President highly sensitive materials ostensibly for legitimate government purposes, but in fact for the President's personal political ends. These events, which took place during the same time period in which CIA support for Hunt was sought and the Ellsberg profile was ordered, and which involved the same group of White House aides, are reviewed in this section. During 1971, the White House staff, largely through David Young, conducted a major campaign to bring about the declassification of the many files and documents of historical interest which no longer required classification. A parallel effort was made to improve the security of those government papers requiring continued classification. With the publication of the Pentagon Papers in June 1971, these activities gained added significance and urgency. While the Administration was concerned over the breach of security caused by the leak of the Pentagon Papers, it was also concerned over what it considered to be an unfairly selective disclosure of embarrassing historical data'. finally President By declassifying additional sensitive files relating to prior events mainly the Bay of Pigs, the Cuban missile crisis, and the fall of the Diem Government in South Vietnam it sought to obtain material helpful in neutralizing critics of the Administration's policies and particularly Senator Edward Kennedy, who in 1971 was regarded as Nixon's principal challenger. Beginning in June 1971, Colson and Young urged on Haldeman and Ehrlichman a campaign in which disclosures embarrassing to past administrations would be used for the political advantage of the Nixon Administration. That program involved the use of the Pentagon Papers as well as the declassification — of other files. ; 191 Colson set Hiiiit to work examining; the Pentagon Papers and other "overtly printed documentation [to determine] the most useful in demonstrating: the collective bad judgment of the Kennedy Admin. . . and/or a number of its high-level appointees." The State Department was directed to turn over various files and cables, including those dealing with the fall of the Diem Government. Hunt and Colson interviewed Lucien Conein, a retired CIA employee formerly stationed in Vietnam, whom the Pentagon Papers identified as active in dealings with Vietnamese officials at the time of the overthrow and death of President Diem. On September 20, 1971, Ehrlichman, Young, and Krogh met to istration review the program of obtaining previously classified on the fall of Diem Government, the Bay The agenda for that meeting the Missile Crisis. CIA materials of Pigs, and the Cuban describes the materials and the "exposure" to be given them through "briefing of selected newsmen," "Senate Foreign Relations Committee inquiry" and "other Congressional investigations." It states, opposite various listed items under each of the three subject heads, that Ehrlichman was to see Helms to obtain materials not previously turned over by CIA. A handwritten notation states that Young was to see Helms to "set up appointment for tomorrow." On September 22, 1971, Ehrlichman met with Helms, advised him that the President wanted to declassify the documents relating to Vietnam, the Bay of Pigs, the Cuban missile crisis and the Lebanon landings, and asked to have the CIA's files on these matters turned over to him. Helms directed an internal review of these papers to make an assessment of the impact of their possible declassification. Meanwhile on September 24, 1971, Colson sent a memorandum to Ehrlichman entitled, "Rekindling the Pentagon Papers Issue". Colson suggested various strategies in Congress to keep the Pentagon Papers issue alive and "each day hopefully creating some minor embarrassment for the Democrats." He also recommended other steps including "program [ming] Lucien Conein to write a letter to Senator Mathias complainmg that he has been muzzled by the CIA. was paid money town and instructed to talk to no one." He concludes by urging that "we should very soon release declassified documents relating to the Lebanon crisis, the Cuban missile crisis and perhaps one or two others. Releasing of declassified documents will keep press to get out of interest alive in the whole issue. We should start doing it soon to avoid the charge of election year politicking." On October 1. 1971, Ehrlichman again met with Helms at the Agency. Helms showed Ehrlichman the files which he proposed to turn over in response to the earlier requests and asked that they be returned as soon as possible. He declined, however, to release the files — 192 The other relating to Vietnam. files were delivered to Ehrlichman that day. October 8, 1971, Helms was called to a meeting at the White House with the President and Ehrlichman, apparently because he had declined to release the Vietnam file. A contemporaneous CIA memo- On Nixon and Ehrlichman assured Helms that the President was interested in helping the CIA and had no intention of releasing CIA papers, but needed to know the specific background of these matters to meet possible press questions and to handle further Soviet negotiations that might touch on agreements reached during the Cuban Missile Crisis. Both Ehrlichman and Helms have testified that Helms was not told of the President's intention to use the information in these files for political purposes. The memorandum states that Helms replied that he worked for only one President at a time and that any papers in this possession were at the President's disposal. He then handed the requested Vietnam file to Nixon who slipped it randum states that into his desk drawer. On November Ehrlichman lunched with William Colby, who had become the CIA's Executive Director-Comptroller, and reaffirmed the President's desire to declassify documents on these subjects. Nothing more came of the program, however, and no action was taken on declassification of these files. So far as is known, none of the information in the documents was disclosed by the White House. 16, 1971, Conclusions The AVhite House demand for sensitive CIA files —cloaked in what appear to be at least in part false representations that they were needed for valid government purposes when, in fact, they were wanted to discredit critics of the administration as thoroughly reprehensible. It represents another serious instance of misuse of the Agency by the White House. < So far as the Agency knew, the demand was for a proper purpose there is no evidence that it had notice of the intentions revealed in later-discovered White House documents. Senior officials of the Agency did, however, consider the surrender of these files to be a highly sensitive matter, giving it great concern. The most sensitive of these files was turned over by the Director only upon direct request from the — President. The Commission recognizes that the Director cannot be expected to disobey a direct request or order from the President without being prepared to resign. The instances in which resignation may be called for cannot be specified in advance judgment. and must be left to the Director's 193 The Commission believes that in the final analysis the proper functioning of the Agency must depend in large part on the judgment, ability and integrity of its Director. The best assurance against misuse of the Agency lies in the appointment to that position of persons of such stature, maturity and integrity that they will be able to resist outside pressure and importuning. The Director should be able not only to manage the Agency, but also to reassure the public that he will do so properly. F. CIA's Relation to Events Preceding the Watergate Break-in program for political espionage in connection with the 1972 Presidential campaign on which Hunt and Liddy begaii to work early that year. That program had The origins of Watergate go back to a which espionage directed against the headquarters of the Democratic National Committee was one. This investigation has disclosed no evidence that the Agency provided support for the espionage program which culminated in the Watergate break-in. A'arious facets of As has been discussed, however, four of the participants in the — Hunt, — Barker and McCord had ties to the Agency. Martinez continued on the CIA payroll as an informer until after his arrest. Hunt had dealings with the Agency in the summer and fall of 1971 in connection with the White House projects previously discussed. And he continued to be employed by Mullen, which had a CIA relationship, and to be associated with Bennett in several break-in JNIartinez, projects with political or espionage overtones. ! ' These and connected circumstances have led to suspicions and allegations of CIA involvement in or prior knowledge of the Watergate break-in. In this section we review the relevant facts in the ligfht of '^te^ these charges. /. Hunt's Contacts with the CIA Hunt's contacts with the Agency in connection with his request for a disguise and related support and with the Ellsberg profile have been discussed above. The Commission has found no evidence to indicate that the that Agency acquired Hunt was engaged in or notice in the course of these contacts planning illegal activities. These contacts ended in November 1971, and thereafter Hunt had what appear to have been only a few sporadic and insignificant contacts with Agency personnel. Hunt called the Agency's External Employment Affairs Branch 194 on a few occasions to ask them to refer him to persons having certain qualifications needed for his projects. At one time Hunt asked to be referred to a firm qualified to locate possible hostile electronic listening devices. On another occasion he asked to be referred to an electronics expert. The Agency man named Thomas Amato, referred a —the enced both in electronics and picking locks experi- not clear whether Hunt had requested the latter capability. In any event, the Agency employee who routinely made the referral was not told by Hunt of his purpose, and he has stated that he did not consider that record is any illegal activity was contemplated. Hunt, at the suggestion of Barker and Martinez, interviewed a Cuban refugee who had been close to Castro, using Martinez' tape recorder. He believes that he may have sent a transcript gratuitously to the Agency, but it has no record of it. Hunt frequently played tennis with a long-time friend who was a CIA officer and may have had other occasional social contacts with CIA employees. There is no record, however, of any communications between him and the Agency disclosing facts which might have indicated that he was planning or pursuing illegal activities. Hunt, of course, had been in contact with ISIartinez in connection with the Fielding break-in and, later, the two Watergate break-ins. As Miami month. Although he had mentioned Hunt in previously discussed, Martinez reported to his case officer in on an average of once a passing on two occasions in 1971, for reasons discussed, Martinez chose not to disclose Hunt's activities. Nonetheless, the case officer's superior, the Miami Chief of Station, had been disturbed when he later learned that the case officer had not promptly reported the reference to Hunt's name, a name that meant nothing to the case officer. The Chief the presence of any former CIA he should be advised of in his territory. His lingering felt that officers and undefined concern over Hunt was evidently in his mind in March 1972, when he met Martinez in connection with another intelligencerequirement. In the course of that conversation, Martinez again mentioned that Hunt had been in and out of Miami on a foreign business deal. Separately, he asked the Chief of Station whether he was certain that he was aware of all CIA activity in the Miami area. These repeated references to Hunt, in whom the station chief from past experience had limited confidence, and Martinez' unusual question Headquarters. He cabled that Martinez had reported that Hunt had been in the Miami area twice recently contacting old friends and although "on the surface Hunt seems to be trying to promote business deals of one sort or led the station chief to contact his superior at CIA another," he had indicated that he was a "White House counsellor "try- ing to create the impression that this could be of importance to his 195 Cuban friends." ment be checked The cable asked that Hunt's White House employ- out. was discussed with the Associate Deputy Director for Plans who stated that he had previously learned from the Deputy Director for Plans that Hunt was a White House consultant supposedly engaged in domestic activities having nothing to do with foreign intelligence and that it was neither necessary nor proper for CIA to check into Hunt's activities since domestic activities were On receipt of this cable it involved. a result of this advice from the Associate Deputy Director, premised not only on concern that the Agency should not become involved As on his estimate of Hunt's erratic judgment, a strongly worded letter was sent to the Miami Chief of Station advising that Hunt "undoubtedly is on domestic White House business, no interest to us, in essence, cool it." Neither the Associate Director nor the parties to these communications apparently knew of the prior support to Hunt or of the EUsberg profile. After receipt of this letter, the station chief, through the case officer, asked Martinez to write up for him in Spanish a summary of his contacts with Hunt. Martinez was disturbed but complied when the case officer told him to write something that he would not be afraid to have shown to him later. The station chief placed it in the file. The summary failed to disclose anything beyond what Martinez had previously reported and gave no hint of any questionable activities. Martinez met his case officer again in May and on June 6, but said nothing further relating to Hunt's activities. The station chief testified that while he had been distressed over the blunt response from Headquarters, and uneasy over Martinez' question respecting his knowledge of CIA activities, he had no reason to suspect Hunt of unlaAvful activities. His basic concern was that he should know what a former Agency employee was doing in his territory. He did not suspect that Martinez, of whom he thought as a boat captain, was engaged in domestic espionage activities. As for the officers in Headquarters, their overriding concern appeared to have been not to become involved in a domestic investigation and, in particular, not to cross paths with the "WHiite House. Although Martinez was the one person in regular contact with the CIA who had knowledge of Hunt's improper activities, the Commission has found no evidence to indicate that he provided the Agency with information about those activities. in domestic political activity but also 2. Bennett's Contacts with Hunt and the CIA During the period preceding Watergate, Hunt continued to be employed by ]Mullen Co. and was in regular contact with Robert Bennett, 196 I its president. Mullen continued to provide cover for CIA officers j abroad and Bennett and Hunt had a few meetings with the case officer respecting these arrangements. Bennett learned of several of Hunt's planned or executed political activities in this period, not including, however, the Fielding or Watergate operations. By June 197:2, Bennett had come to doubt Hunt's reliability and judgment and had determined that Hunt should eventually leave Mullen, but he decided to take no action until after the election. According to Bennett, nothing had come to his attention that he considered sufficiently serious to jusify the risk of White House displeasure should he discharge Hunt. There is no evidence that he learned anything that gave him notice of Hunt's illegal became public knowledge. The following paragraphs summarize Bennett's relevant contacts with Hunt during this period. activities until they At Colson's request. Hunt interviewed Dita Beard, public relations ITT Corp.. in her Denver hospital room in March 1972. A memorandum attributed to Beard had been published indicating that ITT had offered a large contribution to the Republican representative of the 1972 convention were to utilize the Sheraton Hotel facilities in San Diego. Bennett had received a tip from the Hughes organi- Party if zation that the memorandum might be a forgery and passed or Colson. Hunt, using the wig furnished by the CIA interrogated Beard, attempting to establish that the it in to Hunt August, memorandum was a forgery. On his return he gave a statement to Colson. Arrangements were made in the Senate for the release of a statement in a form useful to the media. Beard's lawyer called on Bennett, who himself had had no prior participation in this matter, to assist in its preparation. There is no evidence of any CIA knowledge of or involvement in these events. At one time Hunt approached Bennett with a proposal to obtain the assistance of the Hughes organization for a burglary in Las Vegas to secure purported information about Senator Muskie. Bennett, at' Hunt's request, introduced Hunt to a Hughes organization emi)loyee, but later learned that Hunt's proposal had been rejected. It was apparently in this connection that Hunt had called the Agency's External Employment Affairs Branch for referral of a technician. It was gave Bennett concern with respect to Hunt's judgment; he assumed, however, that Hunt, being attached to also this proposal is first would be ade<|uately supervised and controlled. no evidence that CIA had knowledge of or any part in this the AVhite There which House staff, plan. Bennett was asked by Hughes' attorneys to get a bid for surveillance of Clifford Irving, who was then writing a book During this period j j j ] i j 197 describino; phy. Hunt liis earlier preparation of the fraudulent Hufrhes bioj^ra- "ot an estimate who passed it from James McCord and gave to the attorneys. They rejected it Bennett as too high. There is it to CIA had knowledge or was involved. Bennett, active in Republican politics, participated in the reelection campaign and assisted in the formation of a number of committees to receive contributions. Neither Hunt nor Liddy evidently had any part in this effort Bennett merely delivered Hughes* campaign contribution to Liddy. There is no evidence that the CIA had knowledge of or was involved in this activity. Bennett's nephew, Fletcher, wanted a summer job and he referred him to Hunt. Hunt sought to recruit him to serve as a spy at Muskie no evidence that the ; Headquarters. Fletcher turned him Tom down but referred Hunt to a Gregory, who took the job. Gregory was not related to Bennett but did visit Bennett and Fletcher occasionally and told them generally of his activities. According to Bennett, however, he was not told of any illegal activity until June 14, two days before Watergate, when Gregory told Bennett that Hunt had asked him to bug the office of Frank Mankiewicz in McGovern Headquarters. Gregory declined and went home. This plan evidently was not carried out. There is no evidence that Bennett (or the CIA) learned of the first Watergate break-in which had taken place in May 1972 or of the plans for the second Watergate operation until it became public knowledge. Bennett's contacts with the CIA during the pre-Watergate period apparently were confined to the Mullen Company cover arrangements. There is no evidence that Bennett personally performed services for the CIA or had other operational contacts with the Agency. His communications with the case officer prior to Watergate evidently were limited to matters relating to the cover arrangements. There is no evidence that Bennett discussed Hunt with the case officer prior to the Watergate break-in. In the days immediately following AVatergate, a number of communications passed among Hunt, Liddy, and Bennett. Among other things. Hunt asked Bennett for help in finding him a lawyer. Liddy called Bennett to locate Hunt and pass messages to him. Nothing has been found in these communications suggesting Bennett's involvement in the Watergate operation. Shortly after Watergate, the office of the United States Attorney questioned Bennett, and the evidence indicates that he resjwnded truthfully to the questions, including disclosing the firm's relationship to the CIA. When he later appeared before the grand jury, he was asked few questions by the prosecutor. Having previously disclosed the facts concerning the CIA relationship, he did not volunteer them either to the gi-and jury or to the FBI w^hen he was later friend, 198 interviewed by These events, which occurred within the three weeks following Watergate, along with other comments and observations by Bennett, were reported by the CIA case officer to his superiors after he met with Bennett on July 10, 1972. A copy of the handwritten reit. port was sent to the Director. At this time, the CIA was gi-avely con- cerned over the impact of the Watergate investigation on the security of the Mullen cover and the information received from Bennett was considered important for that reason. The case officer's report reflects that at the time the Agency was also concerned over the disclosures made by an ex-employee named Philip Agee which threatened the Mullen cover, among other things. This development was treated as highly classified by the Agency and had not been disclosed to Bennett. It was referred to as the "WH flap" for the reason that Agee's being disclosures dealt mostly with the Agency's Western Hemisphere oper- were then being reviewed within the Agency in connection with the question whether the cover arrangements with Mullen should be terminated as no longer secure. This investigation has disclosed no evidence indicating that the Agency, through Bennett, was implicated in the Watergate break-in. ations. All of these matters 3. Miscellaneous Contacts and Relations Various miscellaneous contacts and relationships have been mentioned as giving rise to suspicion of CIA involvement or advance notice of the Watergate break-in. One of these is the fact that James McCord, another retired CIA employee, participated in the break-in. McCord had retired in January 1970 to form his own security firm and had become Director of Security of the Committee to Reelect the President early in 1972. He with the External Employment Affairs Branch for referrals to qualified ex-employees. In April 1972, he began to work with Hunt on plans for the break-in. There is no evidence that the Agency participated in or gained advance knowledge of the Watergate break-in through McCord. also had been in contact and from the Agency immediately after the arrests of the burglars. The Watergate burglars were arrested at 2 :30 A.M. on June 17, 1972. The fii-st contact witli the Agency, according to its records, occurred at 5 P.M. that day when an inquiry about the arrested men was received from a Washington Post reporter. That call was followed by calls from the Secret Service for a check on the aliases and from the FBI advising of the identification of McCord and Hunt, two ex-employees. This news was relayed to the Acting Director of Security who promptly called the Director of Security at 8:45 P.M. The Director returned to the Agency and then Another concerns alleged telephone calls to 199 Helms at 10 P.M. to report that former Agency employees (McCord and Hunt) were involved in the burglary. There is no evidence in the communications by Agency personnel immediately following the break-in to suggest that any Agency emcalled ployee had advance knowledge of the break-in. Conclusions The Commission concludes, on the basis of this investigation, that no evidence either that the CIA was a participant in the planning or execution of the Watergate break-in or that it had advance knowledge of it. there is G. The Agency's Response to the Post- Water gate Investigations Within hours of the arrest of the Watergate burglars on June 17, 1972, it became known that McCord, Martinez and Barker had connections with the Agency. Hunt's connection was disclosed not long afterward. Inasmuch as the burglary had occurred within the District of Columbia, it fell within the jurisdiction of the FBI, and the FBI's attention soon focused on the CIA and its possible involvement in the Watergate operation. The Agency also became an object of White House efforts to inhibit the FBI investigation and to keep the arrested burglars silent. And eventually, the CIA came under the scrutiny of the Senate Select Committee on Presidential Campaign Activities (under Senator Ervin). The manner in which the Agency responded to these investigations, its failure to make timely disclosure of information in its possession, and its destruction of certain tapes, has led to suspicions and allega- Watergate operation or the we examine the relevant events tions concerning its involvement in the subsequent cover-up. In this section, in the light of these charges. 1. CIA Attempts to Limit the Scope of the FBI Investigation From the outset of the post-Watergate investigation, the Director took the position that insmuch as the CIA had not been involved in Watergate, it should not become involved in the investigation. He has he was particularly concerned over disclosing information to FBI field offices because leaks had occurred there immediately after Watergate, and he was concerned over the failure of the FBI to disclose the purposes for which it sought information from CIA. testified that 200 Within the first ten days after the break-in, the Agency nevertheless responded to certain requests from the FBI field office in Alexandria, Virginia. Helms, however, attempted to handle such requests directly with Acting FBI Director, L. Patrick Gray, and confine them as much as possible. In a memorandum dated June 28, 1972, he reported having urged Gray that this should be done because the CIA was not involved in Watergate and requested that the FBI "confine themselves to the personalities already arrested or directly under suspicion and that they desist from expanding well, eventually, this investigation into other areas which may run afoul of our operations." There is no clear explanation why Helms wrote this memorandum. There is no evidence that he in fact made that request to Gray. According to Gray and Helms, Gray had called Helms on June 22, 1972, to inquire about possible CIA involvement in the Watergate operation. Helms simply told him that although the CIA knew the people who had been arrested, it was not involved in the operation. On June 23, 1972, Helms and Lt. General Vernon A. Walters, the Agency's Deputy Director, were called to the White House to meet with Ehrlichman and H. R. Haldeman, the President's Chief of Staff. FBI At this meeting, Haldeman suggested that the CIA ask the on the grounds that it might jeopardize CIA operations. Helms, however, stated that he knew no of CIA operations that might be affected, and that he had so informed Gray on the preceding day. Haldeman, nevertheless, directed Walters to call on Gray with the suggestion that further investigation of activities in Mexico involving moneys found on the Watergate burglars would endanger CIA operations. Walters then saw Gray and, after referring to Helms' call to him of the preceding day, passed on that suggestion. Walters has testified that he considered this to have been a reasonable request, assuming, in the light of his own past experience, that it must have been intended to protect highly sensitive operations presumably known only to the White House. AValters was not asked at the meeting to have the FBI restrict its to limit its investigation the security of investigation in other ways. During the following days, Walters had several meetings with Jolm Dean, Counsel to the President, who, at the direction of Ehrlichman and Haldeman, suggested the possibility that the FBI investigation might expose CIA operations and asked what could be done about it. He also asked whether the CIA could pay the salaries and bail of the Walters firmly rebuffed the suggestions implied in the questions. Helms had a further telephone conversation with Gray in wliich he advised him that the CIA had no interest in the Mexicans the FBI was then investigatintr. On June 28 Helms left on a three week trip out of the country, jailed burglars. 201 leaving the memorandum previously quoted. During his absence, in- formation continued to be transmitted to the FBI through Walters. William E. Colby, then the Executive Director, handled the in-house coordination of the responses to the investigation. During October and November United States Attorney requested information concerning the CIA's connection with various activities of the Watergate defendants in order to prepare for the coming trial. Inquiries on this subject had earlier been made by the FBI. The United States Attorney was particularly concerned that the defendants might claim that they were acting on orders of the CIA. The Agency provided information in response to specific inquiries but sought to restrict it to the Attorney General and the Assistant Attorney General. Eventually, information respecting Hunt's request for support in July and August 1971 and the Agency's response was supplied to the United States Attorney. The Agency, however, volunteered no information and withheld some appearing to have a bearing on these matters. For example, in July 1972 and again in December 1972 and January 1973, the Agency received letters from McCord relating to the attempts to involve the CIA in the defense of the Watergate l)urglars at their forthcoming trial. The letters reflected McCord's efforts to resist proposals that the Watergate burglars should implicate the CIA in order to bolster their defense.- Helms obtained advice from the CIA's General Counsel that he was under no obligation voluntarily to turn the letters over to the FBI (which did not know of them) and on the strength of that advice, retained them in the Agency's files. In July 1972, xerox copies of Hunt's pictures of Fielding's office, as 1972, the Hunt (contained in TSD's Helms and Colby. In spite of well as of the alias identification given "Mr. Edward" file) were turned over to the well publicized fact that the originals of some of these aliasmate- had been found on the arrested Watergate burglars, and in spite of requests from the Assistant Attorney General for information about Agency support to Hunt, the Agency apparently did not deliver these materials to the Department of Justice until January 1973. Other material held by the Agency's management and not disclosed or delix'ered until 1973 included the tape of the Cushm.an-Hunt conversation rials of July 22, 1971. Not only did the Agency continue to hold material relevant to the investigation, but it undertook no comprehensive in-house investigation of its own into its connections with the activities of the were coming to to collect all trial. No relevant made men who May, 1973, information and documents from Agency general effort was until employees. On December 15, 1972. Helms and Colby went to the White House to 202 report to Ehrlichman and ment Dean on the status of the of Justice investigations. Colby's FBI and memorandum Departof the meeting records the CIA's efforts "to respond [to inquiries] at the highest level only". It also reports on the United States Attorney's efforts to learn name of the person Avho authorized Hunt's request for support in July 1971, and states that Colby sought to avoid answering these ques- the was eventually compelled to disclose Ehrlichman's name. Colby and Helms also showed Dean the package of information (possibly containing the xerox copies of the Hunt photos and alias materials) which had been prepared for delivery to the Assistant Attorney General. The memorandum states: "It w^as agreed that these would be held up." It was also agreed that Cushman would be asked to call Ehrlichman to discuss his recollection of who had made the July 1971 phone call to him. In January 1973, this package of information was finally turned over to the Department of Justice. tions but Conclusions While the Agency has a legitimate concern to protect sensitive in- formation against disclosure, its response to the investigation of the Watergate burglary cannot be justified by any requirements for secrecy. The Agency failed to turn over to the Department of Justice information in its possession which it should have known could be relevant to the ongoing investigation and preparation for the first Watergate trial in January 1973. Much of the information requested could have been provided with little, if any, rick to the security of Agency activities. Some of it Avas eventually provided, but only after some delay. The Agency is subject to serious criticism for this conduct. The basis for the Agency's action appears to have been the Director's opinion that since the Agency was not involved in Watergate, it should not become involved in the Watergate investigation. The Commission considers this to be no justification for the Agency's failure to aid an investigation of possible violations of law by employees or ex-em- whom had had recent contacts. The provision of the Agency's charter barring it from exercising "police, subpoena [and] ployees with it law enforcement powers" does not excuse that failure. The Commission has found no evidence, however, that leads it to Agency actively joined in the cover-up conspiracy formed by the White House staff in June 1972. There is no evidence that the Agency sought to block the FBI investigation. General Walters' statement to Gray concerned only the investigation in Mexico, and he has stated that it was based on his belief, supported believe that officers of the 203 by prior experience, that the White House had knowledge of some higlily classified activity in Mexico not known to others. Subsequent cover-up overtures by the White House were firmly rejected by him. Later reluctance of Agency management to disclose the identity of White House personnel and provide materials to the Department of Justice are subject to the criticism previously made. The evidence does not indicate, however, that Agency personnel ever knew of or participated in a plan of the White House staff to abort or impede investigation into possible violations of law by members of that staff. 2. Destruction of Helms' Tapes and Transcripts About January 17, 1978, seven months after the Watergate break-in Director Helms received a letter from Senator Mansfield, dated January 16, 1973, requesting that the Agency retain "any records or documents which have a bearing on the Senate's forthcoming investigation into the Watergate break-in, political sabotage and espionage, and practices of agencies in investigating such activities.'' At the time the letter arrived. Helms and his secretary were in the process of cleaning out his files preparatory to his departure from the Agency. Approximately a week after receipt of this letter. Helms' secretary asked him what should be done about the voluminous tapes and transcripts which were then in storage. The tapes were produced by a recording system instailed in the offices of the Director, the Deputy Director and what was then an adjoining conference room (the French Room). This system had been installed some ten years earlier. It was removed from the Deputy Director's office in February 1972 and from the office of the Director in Januarv and February 1973. The taping system permitted the recording of telephone calls and of room conversations on activation by the occupant of the office. Helms used it occasionally, apparently considering it as an efficient way prepare a memorandum to assist his recollection. Cushman used only rarely and Walters, who followed him, not at all. The tapes were transcribed to it routinely and the transcripts were retained by the respective secretary. Prior to January 1973, tapes were from time to time erased or, if worn out, destroyed. About January 24, 1973. Helms, in response to his secretary's question, told her to destroy his remaining tapes and transcripts and she so instructed the technicians in charge of the system. At that time tliere were approximately tliree file drawers of transcripts covering his years as Director. Both Helms and his seci-etary made a cursory review of them and recalled none to have related to Watergate. They were then destroyed. Along with the tapes and transcripts the logs identifying them were also destroyed. No tapes were erased. 204 Helms has he considered this destruction of wliat he regarded as liis personal notes to be a routine part of vacating his office. He said that he f elf that the Agency had produced whatever Director testified that Watergate-related materials it had and that these tapes and transcripts had nothing to do with anything he considered relevant to Watergate. He also stated that he assumed that anything of permanent value had been transferred from the tapes to the Agency's records, and he felt obligated that records of confidential conversations between him and others should not become part of Agency files. Conclusions must be recalled that in January 1973 the Watergate affair had not yet assumed the dimensions which subsequent revelations gave it. Neither the activities of the Plumbers nor the extent of the White House involvement in the cover-up had come to light. Accordingly, destruction of Helms' personal office records cannot be judged with the benefit of hindsight, derived from subsequent revelations. For the same reasons, however. Helms stated interpretation of what was Watergate-related presumably was narrower than it would have been after all the facts disclosed to the Watergate Grand Jury in April, 1973, and other information had come to light. Hence, no comfort can be derived from Helms' assurances that no Watergaterelated material was destroyed, since what was destroyed had not been It reviewed for relevance in light of the later disclosures. The destruction of the tapes and transcripts, coming immediately after Senator Mansfield's request not to destroy materials bearing on the Watergate investigation, reflected poor judgment. It cannot be on the ground that the Agency produced its Watergaterelated papers from other files; there is no Avay in which it can ever be established whether relevant evidence has been destroyed. When taken together with the Agency's general non-responsiveness to the ongoing investigation, it reflects a serious lack of comprehension of the obligation of any citizen to produce for investigating authorities justified evidence in his possession of possible relevance to criminal conduct. 3. Miscellaneous Matters Concerning the Investigation a. Pennington In the foregoing sections we have discussed the response to the Watergate investigation at the level of the Director's office. A separate failure to respond properly occurred within the Office of Security. In August 1972, the FBI's Alexandria field office, in the course of 205 Watergate investigation, asked for information about one Pennington, said to have been an employee who may have been McCord's supervisor a number of years ago. The inquiry was received by an ofits ficer of the Office of Security who customarily dealt with the FBI. checked and furnished the FBI with information concerning one Cecil B. Pennington, a retired employee of the Office of Security who had had no connection with McCord. The FBI shortly thereafter advised that this was not the person in whom The it officer had an had personnel files interest. Meanwhile, officere in tlie Office of Security knew that one Lee Pennington was a long-time friend of the McCords wlio, shortly after the "Watergate arrests, had helped Mrs. McCord burn some of McCord's papers and effects at his house, probably including McCord's retirement records which showed his past Agency employment. In addition, some members of the Security Research Staff within the Office of Security also knew that Lee Pennington had for years been a secret informer of that staff who was paid $250 per month to supply clippings, legislative developments and other miscellaneous information. "Whether this fact was then known to the Director of Security or his Deputy The undisputed is fact, disputed. however, is that information in the Office of Security on Lee Pennington was treated as "sensitive" and was deliberately withheld from the FBI when the inquiry about Pejinington was received. That information did not come January, 1974, when a proposed response to a Senate inquiry was passed through the Office of Security. That response stated that all information concerning "Watergate had been disclosed. Officers who had handled the to light until prior "Watergate investigation advised the Inspector General's of the Pennington file and the facts office were then disclosed to the Senate Select Committee. Investigation has not disclosed any link between Pennington's burn- ing of McCord's papers and the Agency. So far as can be determined, no one at the Agency either directed this action or knew of it in advance. Pennington was not acting for the Agency or with its knowledge or consent but rather seems to have acted simply to help Mrs. McCord dispose of papers which McCord said he considered to be both personal and a fire hazard. McCord had received several bomb threats and was also concerned about his papers and effects falling into the hands of newspapers. The Conmiission has found no evidence to from these events that the CIA was involved in the destruction of files of McCord having possible relevance to "Watergate. justify inferring 206 b. Payment of Bennett's Attorney's Fees About June 1973, Robert Bennett, President of the Mullen Company, was again called before the grand jury in connection with quesby the recent revelations. Bennett felt that the security problems raised by the Mullen-CIA cover relationship made it neces- tions raised saiy for him to obtain the assistance of counsel. When he received a Agency to pay half of it, and it agreed. The investigation has disclosed no evidence of any motive or purpose by the Agency in this connection to withhold information from the grand jury. Nor does the evidence of this transaction indicate any bill for some $800, he asked the involvement of the CIA or Bennett in Watergate. Conclusions The was failure to provide information about Pennington to the FBI in this case the responsibility of officers at the operational level, apparently acting without direction from above. For the reasons discussed in connection with the preceding sections, their conduct was and subject to criticism. At the same time, however, there is no evidence that this decision was intended to cover-up any possible connection between the CIA and Watergate no evidence of such connection has been found. The Conmiission concludes that there is no evidence indicating that the CIx\ either had advance knowledge of or participated in the breakins into Dr. Fielding's office or the Democratic National Committee at unjustified — the Watergate. The Commission also concludes that in })roviding the disguise and and camera to Hunt, as well as in providing the Ell^berg profile, the Agency acted in excess of its authorized foreign intelligence functions and failed to comply with its own in- alias materials, tape recorder, ternal control procedures. The Agency provided these materials in response to demands from highly-placed members of the AMiite House staff and, except in the case of the Ellsberg profile, without knowledge that they were in- tended for improper purposes. Those demands reflect a pattern of actual and attempted misuse to ^vhich the CIA was subjected by the Nixon administration. Finally, the Commission concludes that the Agency was delinquent when it failed, after public disclosure of the improper White House activities, to undertake a thorough investigation of its own and to 207 respond promptly and fully to the investigations conducted by other departments of the government. Recommendation (26) a. A single and exclusive high-level channel should be estab- White House staff requests to the CIA. This channel should run between an officer of the National Security Council staff designated by the President and the office lished for transmission of all of the Director or his Deputy. Agency and employees should be instructed that any direction or request reaching them directly and outside of b. All officers regularly established channels should be immediately reported to the Director of Central Intelligence. Chapter 15 Domestic Activities of the Directorate of Operations The Directorate of Operations is the CIA component with primary responsibility for the collection of foreign intelligence overseas and for the conduct of other covert operations outside of the United States. In support of these missions, the Directorate engages in a variety of activities within the United States. The major domestic activities of the Directorate, including those which raise questions of compliance with the Agency's legislative authority, are discussed in the following sections. This chapter does not describe all of the Directorate's domestic activities which the Commission has investigated. The national interest in the continued effectiveness of the CIA in the foreign intelligence field requires that a number of those activities be protected from disclosure. Our investigation of these activities has produced no evidence (other than that described in this report) that these activities exceeded the Agency's authority. Very few of these activities continue. To the extent that they do, the Commission is satisfied that they are subject to adequate controls. the Commission report include detailed information on the activities of the CIA's Miami Station which, commencing in the Nor does early 1960's, conducted a broad range of clandestine foreign intelli- gence, counterintelligence and operational activities directed at areas Many such activities were conducted with the United States as a base, but the CIA contends, and the Commission has found no evidence to the contrary, that these activities were not outside tlie United States. American citizens. Since 1966, the scope of the station's activities and the number of its personnel have been gradually reduced and by 1972, except for some collection of foreign intelligence, these activities had been discontinued. Since the Miami operations directed against were the result of a particular series of events not likely to be repeated, and since they have been largely discontinued, the Commission con(208) 209 eluded that its resources were better utilized in investigating and analyzing other activities. A. Overt Collection of Foreign Intelligence within the United States While the importance of clandestine estimated, many collection should not be under- of the pieces of the jigsaw puzzle which is "finished foreign intelligence" can be overtly collected by a w^ell-organized information gathering system. Analysis of intelligence failures during "World War II demonstrated that a significant volume of this information was available from the American public and could have been collected by overt methods within the United States, At that time, however, numerous agencies were engaged in domestic collection of foreign intelligence. Their activities were largely uncoordinated. With the formation of the CIA in 1947, responsibility for the overt collection of foreign intelligence within the Ignited States tralized in the Agency as a service of common was cen- concern to the entire community. This responsibility is presently discharged by a separate division of the Agency. Through officers stationed in various locations throughout the United States, this division collects foreign intelligence information from United States residents, business firms and other organizations willing to assist the Agency. Contacts with potential sources of foreign intelligence information are overt and officers identify themselves by true name as CIA employees. Only in a few instances have officers of the division used alias credentials for personal protection when responding to unsolicited otters of assistance from foreign nationals or other unknown persons. Although its collection activities are openly conducted, this division intelligence attempts to operate discreetly. Each of its facilities is listed in the themselves often do not bear a CIA designation. In addition, the division goes to substantial lengths to protect the fact that an individual or organization is contributing local telephone directory, intelligence to the CIA information which is but the offices and to protect proprietary interests in any provided. Generally, the division's procedure consists of contacting United States residents with whom has an established relationship to seek out available information on specific subjects for which the division has had requests from other components of the Agency. A typical example is the debriefing of an American citizen who has traveled it abroad and who, because of a particular expeitise or itinerary, could have acquired significant foreign intelligence information. 210 Most of the United States residents contacted by this component of the Agency are American citizens. Division regulations prohibit contacts with certain categories of individuals including Fulbright Scholars, past or present Peace Corps (ACTION) members, United Xations employees or contractors or representatives of foreign governments. Although not prohibited from doing so, the division will not approach American ttr foreign students but will interview them if they initiate the contact. The success of the CIA in collecting such information is entirely dependent upon the voluntary cooperation of the American public. The CIA contends, and the Commission has found no evidence to the contrary, that it neither exerts any pressure to elicit cooperation nor promises or grants favors in return for information. Sources of information are not compensated, but on rare occasions the Agency will pay a portion of a proven source's travel expenses to nn area where might his presence The fulfill intelligence requirements. United States requires that the CIA maintain various records with respect to the individuals and organizations that have provided information or are promising sources. In addition to a master index of approximately 150,000 names, division headquarters presently maintains approximately 50,000 active files. Many of these files reflect relationships with prominent Americans who have voluntarily assisted the Agency, including past and present Members of Congress. A substantial sampling of these files indicates collection of intelligence within the that their contents are limited to: (1) copies of correspondence relating to the individual or organizational source's relationship with the by the source; (3) in the case of an organization, a summary of its relationship with the division including any stipulations or limitations imposed by the organization's committing official; and (4) the results of a federal agency name check obtained through the CIA's Office of Security in the event CIA representatives wish to discuss classified matters or con-, division; (2) intelligence reports contributed template a continuing relationship with a contact. If such a name check produces derogatory information, the Agency may terminate the relationship but it takes no further action. However, a copy of the report in such a case is The CIA retained in the individual's contact file. asserts that this division's domestic collection efforts are devoted entirely to the collection of foreign economic, political, military and operational information, directly related to the United States foreign intelligence effort. In general, this appears to be true. However, this investigation has disclosed several instances in the past the division provided other components of the CIA where with information about activities of American citizens within the United States. : 211 1, American Dissidents The first and most significant instance began in March 1969. when the division established a new file or "case'' entitled "Activities of United States Black Militants." Field offices were instructed to forward to memorandum, information which came headquarters, by to their at- tention "concerning the activities of United States Black Militants United States or abroad." A contemporaneous CIA memorandum indicates that this case was opened to establish a formal procedure for processing and transmitting to the FBI the increasing volume of unsolicited information received by the field offices with respect to militant activities. In written instructions, the Director of the division informed all field offices that he did not intend that such information be actively collected, "since this is primarily an FBI responsibility." Investigation indicates that field offices did not actively seek such infonnation. The very few reports which were filed contained information received primarily from "call-ins" who found the division's offices in local telephone direceither in the tories. with respect to militant activities had no relationship to Operation CHAOS, which had already been initiated by the Counterintelligence Staff's Special Operations Group. However, the division's reports were disseminated to an Operation CHAOS representative who quickly recognized the division's capacity to provide useful information with respect to a broader range of dissident or militant groups. Accordingly, in December 1969, the Special Operations Group requested that the division broaden its base to include the activities of "radical student and youth groups, radical underground press and draft evasion/deserter support movements and groups." An Operation CHAOS officer briefed division field chiefs, on the Special Operations Group's interest on this information. A memorandum of that meeting explained that Initially, the case CI's interest is primarily to ascertain the details of foreign involvement/snpport/guidance/training/funding or exploitation of tlie above groups or movements, particularly through coverage of the foreign travel, contacts and activities of the Americans involved. Although the emphasis was clearly on information establishing a foreign link with these groups, the division's field officers were also re- quested to report — for background purposes—on the purely domestic groups and their members. The Operation CHAOS representative explained that this purely domestic information was necessary to compile a data base essential to full understanding of possible connections between these groups and hostile elements abroad. Shortly after the briefing, the Director of the division again cauactivities of these : : 212 tioned FBI that collection of this tj^pe of information all field chiefs is an and should be undertaken only "when thesse subduring the course of your other activities." jects are surfaced This admonition was repeated in virtually all of the Director's memoresponsibility . . . with respect to this case. The reports made available for the Commission's examination appear to have been obtained by field officers primarily in the course of fulfilling other intelligence randa to field offices requirements. However, there are some indications to the contrary. During Group and the dividiscuss what one memo- 1970, officers of the Special Operations sion conferred on a number of randum described as occasions to "over-aggressive positive division's personnel in the collection of CHAOS possibility of active collection of stated by a field officer in a To be field, but there is by the information. The information was succinctly dated June 26, 1970 was to a natural tendency be only a passive effort when an interesting re- received to request additional details, then the actions begin. At that are put in the position of investigating or reporting, if you like, the is point, memorandum sure, this ease, as originally conceived, on the part of the port CHAOS actions" we United States citizens in the United States that are inimical to the national security interests of this Country. But that is clearly the function of the Federal Bureau of Investigation, not of CIA. activities of A number of other began to question the propriety of the division's efforts with respect to dissident groups particularly the collection of purely domestic information about United States citizens. These expressions of concern prompted the Director of the division to prepare a memorandum for the field officers in which he described the dilemma this requirement posed and the division's rationalization officers — — for its collection of purely domestic information. randum dated June 6, That draft memo- 1971, reads in part as follows The second type of information concerns the activities of United States radical groups, but does not contain any obvious foreign implications. Such information is considered of primary interest to the FBI under its domestic security charter. However, the division has been directed to collect both types of information,' with the emphasis on that pertaining to foreign involvement. We also accept the second type of information when it is offered, because its essential to our understanding of the entire radical movement (including the involvement of foreign governments). We do not actively solicit this information, however, since active collection against United States citizens acquisition is incompatible with CIA's charter. In addition, information of a purely domestic nature is of secondary interest to our consumers in CI Staff. We recognize that CIA's deliberate acceptance and use of such information (even for background purposes) may seriously be questioned. Several thoughtis [division] officers in the field and in Headquarters have already voiced uneasiness over this aspect of the case. We have concluded, however, that our activity is logically justified in that it provides essential support to the Agency's legitimate mission of overseas counterintelligence. ful . . . : 213 Before the memorandum was distributed, a copy was provided for review by Operation CHAOS personnel who objected to a written discussion of their oral requests for this type of information. Unable to obtain the Special Operations Group's approval of such a memorandum, the division informed all field officers on March 23, 1971, that thereafter collection of information was to be "focused exclusively upon the collection of information suggesting foreign involvement in United States radical "activities" as well as the identification of persons by the Operation CHAOS group for penetration of related dissident groups overseas. Field officers were instructed to refer infomiation or sources with information which is ''''purely domestic in its implications" to the local FBI office and not to forward such who could be enlisted information to The CIA headquarters. division's collection efforts with respect to dissidents ceased for purposes in 1973 and the case was formally closed in xVugust 1974. The Commission was provided access to files which, according to the division, contain all of its reports with respect to dissidents. In all, these files contain approximately 400 reports, copies of which were furnished to the Special Operations Group. Many of the all practical reports merely transmit a newspaper clipping or other publication. 2. Foreign Telephone Call Information The Commission's investigation has disclosed only one other in- stance where the division has collected information on activities of American by the CIA. During 1972 and 1973, the division obtained and transmitted to other components of the Agency certain information about telephone calls between the Western Hemisphere (including the United States) and two other foreign countries. Some of the calls involved American citizens within the United States. The information obtained by the division was limited to the names, telephone numbers and locations of the caller and the recipient. The contents of the calls were not indicated. Shortly after the program commenced, the Office of the General Counsel issued a brief memorandum stating that receipt of this information did not appear to viocitizens for use late applicable statutory provisions. The Commission could not determine any initiation or continuance of the tends that no use was ever randum made specific purpose for the program. Although the Agency conof the data, a March 25, 1972, memo- names of the Americans participating in such calls were at least checked against other CIA records to determine if they were of "possible operational interest." The memorandum indicates that the states A review of the parties in the United States involved in these calls discloses that those of possible operational interest are primarily in the CHAOS field, 577-475 O - 75 - 15 11 214 persons connected with sucti groups as Black Panthers, Revolutionary Union, Committee for Concerned Asian Scholars, Committee for a New China i.e., Policy, etc. was terminated in May information obtained by the Agency Collection of this material by the division 1973, and the CIA claims that all has been destroyed. The Commission has discovered no other evidence that the division attempts to collect intelligence information with respect to United States citizens or their activities, through surveillance or otherwise. However, such information is occasionally reported to field officers in the course of normal collection activities. For example, established sources or one of numerous "call-ins" periodically report the identities of United States citizens allegedly involved in espionage, drug trafficking or other criminal activity. Written regulations require that the source or a report of the information be promptly referred to the FBI, or other appropriate law enforcement agency. No further action is taken by the division or other components of CIA. Nor is a copy of the information retained in Agency files unless directly related to the function of the Office of Security, in which case it is transmitted to that Office. Conclusions The CIA's the United States willing to assist ment of from residents of are a valid and necessary ele- efforts to collect foreign intelligence CIA Not only do these persons provide a large reservoir of foreign intelligence; they are by far the most accessible its responsibility. source of such information. The on American citizens and firms representing actual or potential sources of information constitute a necessary part of its legitimate intelligence activities. They do not appear to be vehicles for the collection or communication of derogatory, embarrassing or sensitive information about American citizens. The division's efforts, with few exceptions, have been confined to legitimate topics. The collection of inf onnation with respect to American dissident groups exceeded legitimate foreign intelligence collec-j tion and was beyond the proper scope of CIA activity. This improdivision's files I priety was recognized in some of the division's own internal memo- randa. The Commission was unable to . discover any specific purpose for the; collection of telephone toll call information, or tion is any use of that inf orma- by the Agency. In the absence of a valid purpose, such improper. collectionj 215 B. Provision and Control of Cover for Many CIA ice — — every foreign intelligence servare clandestine in nature. Involved CIA personnel cannot travel, activities like those of live, or perform their duties openly as tries where the services. their CIA Personnel CIA employees. Even in coun- CIA works closely with cooperative foreign intelligence Agency personnel are often required by their hosts to conceal CIA status. Accordingly, virtually all CIA personnel serving abroad and many of the Agency's professional personnel in the United States assume a employment by the CIA is disguised and, to persons other than their families and coworkers, they are held out as employees of another government agency or of a commercial enterprise. "cover." Their Cover arrangements frequently have substantial domestic aspects. These include the participation of other United States government agencies, business firms, and private citizens and creation and management of a variety of domestic commercial entities. Most CIA employees in need of cover are assigned "official cover" with another component of the federal government pursuant to formal agreements between the CIA and the "covering" departments or agencies. Where official cover is unavailable or otherwise inappropriate, CIA officers or contract employees are assigned "nonofficial" cover, which usually an ostensible •position with CIA-created and controlled business entities known as "proprietary companies" or "devised facilities." On occasion, nonofficial cover is provided for a CIA officer by a bona fide privately owned American business firm. So-called "proprietary companies" and "devised facilities" are legalconsists of ly constituted corporations, partnerships, or sole proprietorships, owned by the Agency and operated by CIA personnel or contract employees. Proprietary companies generally are commercial entities with actual assets. These not only provide cover for employees but also for activities or operations required to be performed by the Agency. Devised facilities are created for cover purposes only, involve no investment of operating funds, and engage in no substantial economic activity. A ( • Agency is charged with responsibility for ensuring that proprietaries and devised facilities comply in all respects with the laws of the state, county, or other jurisdiction under which separate office of the they are organized. The CIA United States citizens with security clearances who are willing to assist with the necessary paperwork and serve as officers and director of proprietaries and devised facilities. utilizes the services of Citizens rendering professional services are paid their ordinary 216 cooperating citizens are fully aware that their assistance is being rendered to the CIA. Other than administrative activities necessary to maintain cover and the activities of the operating proprietaries discussed below, United States commercial entities formed by the Agency engage in fees, and all no significant domestic activities. They do not engage in any meaningful economic activity in competition with privately-owned United States firms. Most CIA officers under nonofficial cover are stationed abroad. Another aspect of the Agency's cover activities involves arrangements by which activities of the Agency are attributed to some commercial entity wholly unrelated to the Agency. Activities of this kind are fmided and carried out in the same mamier as many other Agency activities, and a high degree of security is maintained. The Commission's investigation in this area has disclosed no improper activities by the Agency.^ The functions of the office responsible for all CIA cover arrange- ments were substantially enlarged in 197-3, in order to provide effective centralized control and supervision. That office operates pursuant to written regulations which restrict the use of certain agencies, departments or other organizations for operational purposes; these restrictions are applied also to the use of those organizations for "cover" purposes. Among other restrictions are prohibitions on "cover" arrangements with the FBI, Secret Sei-vice, Drug Enforcement Administration (DEA), state and local police and other law enforcement bodies. The Agency also is bound by restrictions on the operational use of members of ACTION, Fulbright Scholars and employees of certain foundations and of private detective agencies. The Agency interprets these as generally prohibiting the use of foundations and charitable and student organizations. In addition, approval of the Deputy Director for Operations of individuals One deemed is required for the use of certain other categories' sensitive. salutary effect of the recent enlargement of responsibilities has been the centralization and tightening of control over the issuance and use of alias documentation of the type provided by the Agency to ^ AmoiiK tho suspected cover operations investifratert by the Commission was the alleged operation by the Agency of the vessel, Glomar Explorer. A number of allegations have been published concerning this matter, including allegations of possible violations of Federal securities and tax laws. Since these matters are currently under investigation by appropriate regulatory bodies, the Commission has not investigated them. 217 Howard Hunt. Use of U.S. alias documentation, such as driver's licenses and credit cards, has been severely limited and requires approval of senior officers under the overall control of the Agency. E. may be issued to other agencies only with approval of the Deputy Director of Operations. All such documentation must be accounted for every six months. In 1969 the statement of functions of the office responsible for cover Alias documentation arrangements was revised to eliminate the authority, formerly held, to use charitable organizations and individuals for inserting funds into organizations and programs supported by the Agency. Finally, the occasional provision of cover to other agencies has been terminated. Growing public familiarity with the Agency's use of cover has led to a tendency to identify many government and some private activities — with the CIA frequently without justification. This has had an unfortunate tendency to impair the usefulness of some non-Agency related government activities. In addition, it has progressively tended to narrow available cover arrangements for the Agency. Conclusions CIA's performance of its foreign intelligence mission. The investigation has disclosed no instances in which domestic aspects of the CIA's cover arrangements involved any violations of law. CIA's cover arrangements are By essential to the however, cover necessitates an element of deception which must be practiced within the United States as well as within foreign countries. This creates a risk of conflict Avith various regulatory statutes and other legal requirements. The iVgency recognizes this risk. It has installed controls under wliich cover arrangements are closely supervised to attempt to ensure compliance with applicable definition, laws. C. Operating Proprietary Companies In addition to the proprietary companies created solely to provide cover for individual CIA officers, CIA has used proprietary companies for a variety of operational purposes. These include "cover" and support for covert operations and the performance of administrative tasks without attribution to the Agency. It has been charged that certain of these Agency-owned business entities have used government funds to engage in large-scale com- 218 : mercial operations, often in competition with American private enterprise. There was a limited factual basis for these allegations in the past, but the invest igat ion has disclosed that the Agency has liquidated or sold most of its large operating proprietaries. The remainder en- gage in activities of limited economic significance, providing little if any competition to private enterprise. By far the largest part of the Agency's proprietary activity consisted of a complex of aviation companies, including Air America, Southern Air Transport, and Intermountain Aviation, Inc. These companies, which at one time owned assets in excess of $50 million, provided operational and logistic support as well as "cover" for the Agency's foreign covert operations, primarily in Southeast Asia. The investigation has disclosed that some of the services provided were competitive with services of privately owned firms, both at home and abroad. However, most of the aviation companies have been liquidated or sold and the rest are expected to be disposed of shortly. This will end the Agency's commercial involvement in the aviation field. Proceeds of these liquidations and sales are not used by the Agency they are returned to the United States Treasury as miscellaneous receipts. Another major proprietary activity consisted of the operation of Radio Free Europe and Radio Liberty, which beamed broadcasts to Eastern Europe. These stations, originally owned and operated by the CIA, provided both facilities and "cover" for the CIA's educational and cultural activities. Although these stations were funded by the CIA, they appealed for contributions to the public without disclosing their CIA connection. However, ownership and control of these stations was turned over to the State Department, Avhich operates them today without concealing the government connection. The major remaining proprietary activity of the Agency involves a complex of financial companies. These companies enable the Agency by the air proprietaries ; to administer certain sensitive trusts, annuities, escrows, insurance arrangements, and other benefits and payments provided to officers or contract employees without attribution to the CIA. Their assets presently total approximately $20 million, but the financial holdings of the companies are being reduced. Most of these funds are invested abroad in time deposits and other interest-bearing securities. Less than 5 percent of these funds are invested in securities publicly traded in the United States, but these ' investments are being liquidated and the proceeds returned to the Treasury. At no time has one or any combination of these companies owned a controlling interest in any firm with publicly traded securi- 219 ties. The investioation has disclosed no evidence of any violations of law by the CIA in connection with the makino- or inana<^ement of these investments. maintain a limited number of small proas well. Their purpose is primarily to provide cover for The Agency continues j)rietaries to and contractors and to make nonattributable purchases of equipment and services. These companies are distinct from the so-called devised facilities in that they are engaged in actual commercial or professional activities, although of modest proportions. Generally, they have fewer than 10 employees. The Agency also provides small amounts of subsidies and operational investments to firms engaged in activities abroad useful to its the activities of certain officei'S, agents, missions. With few exceptions, the CIA's operating proprietaries have been unprofitable and have required continuing budgetary support. Reve- nues derived from operations have been offset against operating- Only two proprietaries are reported to have generated significant profits Air America in the performance of United States government contracts in Southeast Asia, and several of the financial costs. : companies in return on investment. In both cases, profits were, in the past, retained for use by the proprietary companies pursuant to the General Counsel's opinion that these funds need not be returned to the Treasury. The is , and liquidation of operating proprietaries controlled by high Agency officials. All such projects must creation, operation closely have the approval of the Deputy Director of Operations or his assistant. Sensitive or substantial cases must be approved by the Director of Central Intelligence. Each requires an administrative plan which must have the concurrence of the Deputy Director of Operati9ns, the Office of General Counsel, the Office of Finance and certain other senior officers. Expenditures or reimbursements must be approved by responsible senior operating and finance officers. All projects are subject to annual review as a part of the budget process and regular audits are made. A related activity of the Agency has been to support foundations, principally the Asia Foundation, which also served as both a vehicle and cover for educational and cultural activities abroad. The Agency's connection with that foundation has been terminated. The Agency in the past has also provided a lesser measure of support to other foundations and associations thought to be helpful to its mission. A prime example was the National Student Association, which sponsored American students wdio participated in international meetings and activities. Until 1967, when Ramparts magazine revealed the fact, CIA offered some support to that activity. A resulting . 220 report by a committer under then Deputy Attorney General Nicholas DeB. Katzenbach led to directions to CIA to terminate support of American foundations and vokmtary associations. So far as the Commission has been able to determine, the Agency has complied. Conclusions Except as discussed in connection with the Office of Security (see Chapters 12 and 13), the Commission has found no evidence that any proprietaries have been used for operations against American citizens or investigation of their activities. All of them appear to be subject to close supervision and multiple financial controls within the Agency. D. Development of Contacts With Foreign Nationals Another significant domestic activity of the to develop contacts with foreign nationals the United States. This activity who CIA consists of efforts are temporarily within within the United States, and its primary purpose is to develop sources of information. As far as the Commission can determine, coercive methods, such as blackmail or compromise, have not been used. The CIA enlists the voluntary assistance of American citizens in its efforts to meet and develop contacts with foreign nationals. These citizens are not compensated for tlieir services, but may be reimbursed for any expenses they incur. They are fully aware that they are assisting or contributing information to the CIA. At all times, they are free is ! < ; '. to refuse or terminate their cooperation. Prior to requesting the aid of an American citizen in this manner, the Agency occasionally obtains a name check through its Office of Security, but does not otherwise investigate such persons. In most cases it will maintain a file on such an individual containing biographical information and a brief history of the person's cooperation with the division. persons who No ' ' ', ' records are kept by this division with respect to • decline to assist the Agency. ; Under a written agreement with the FBI, any information of an internal security or counterintelligence nature which comes division's attention in the course of these activities is to the immediately re- ferred to the Bureau. The Commission's '< J investigation has disclosed no evidence that the division in question has been used to collect information about ican citizens or their activities at home or abroad. Amer- I 221 Until recently, the Agency component with responsibility for developing contacts with foreign nationals was known as the Domestic Operations Division. The Commission has made an investigation of recent press allegations that, during the late IQGO's, the New York office of the Domestic Operations Division conducted covert emigre and dissident groups, including wiretapping, break-ins, surveillance, infiltration and preparation of psychological profiles. The investigation has disclosed no evidence to support these allegations nor any evidence that the division engaged in such activiactivities against ties elsewhere. Conclusions appear to be directed entirely to the production of foreign intelligence and to be within the authority of the CIA. We found no evidence that any of these activities have been directed These activities against American citizens. E. Assistance in Narcotics Control Through the Directorate CIA provides foreign intelligence support to the government's effort to control the flow of narcotics and other dangerous drugs into this country. Inasmuch as arrest and prosecution of traffickers, including American citizens, is a necessary element of narcotics control, concern has of Operations, been expressed that CIA's participation in the control effort involves the Agency in domestic enforcement activities expressly excluded ii'om the CIA's authority. The Commission's investigation has disclosed that the CIA has' at- tempted to insure that it does not thus become involved in the exercise of police or law enforcement powers or in other activities directed against American citizens, either within the United States or overseas. CIA's involvement in the narcotics field began in October 1969 with President Nixon's formation of the White House Task Force on Narcotics Control. The Task Force was given the mission of formulating and implementing a program to stem the increasing flow of heroin and opium into the United States. The Director of Central Intelligence was appointed to the Task Force and CIA was requested to use its existing intelligence gathering apparatus to the maximum extent possible to provide narcotics-related intelligence to other agencies who in turn were involved in diplomatic, enforcement and treatment initiatives coordinated by the Task Force. In September 1971, President Nixon elevated narcotics control to a — — : 222 j higher priority, establishing the Cabinet Committee on International Narcotics Control (CCINC) to succeed the Task Force. The CCINC was charged with responsibility for properly coordinating all United States diplomatic, intelligence and enforcement activities aimed at curtailing the flow of illegal narcotics and dangerous drugs into the country. The Director of Central Intelligence was appointed as a mem- j j ' ' and the Agency was promptly delegated responsibility for coordinating all United States clandestine foreign intelligence gathering ber, with respect to narcotics. In addition to coordinating clandestine collection, the CIA provided the other components of the CCINC with a wide range of foreign intelligence information directed at two basic objectives To convince To provide identities To foreign nations to curtail production and trafficlsing and foreign and domestic law enforcement agencies with ; and methods of operation this end, the CIA of the major foreign drug cooperated with the the traffickers. Drug Enforcement Ad- ministration in the establishment of the Major International Narcotics Traffickers (ISIINT) Register, a list of major foreign traffickers, and a related system for collating intelligence information about them. The Commission's investigation disclosed that, from the outset of the Agency's involvement in the narcotics control program, the Director and other CIA officials instructed involved personnel to collect — only foreign intelligence and to make no attempt either within the United States or abroad to gather information on American citizens — allegedly trafficking in narcotics. These instructions appear to have been respected. Indeed, at CIA insistence, the names of American citizens are excluded from the MINT Register. However, the identities of Americans allegedly trafficking in narcotics or information with domestic law enforcement implications is unavoidably obtained by CIA in the course of its foreign intelligence activities. The Agency has established written procedures for the prompt dissemination of this information to the appropriate law enforcement agencies at the local level. The information is not retained in CIA files. For a period of approximately six months, commencing in the fall of 1973, the Directorate monitored telephone conversations between the United States and Latin America in an effort to identify foreign drug traffickers. The intercept was undertaken at the request of the National Security Agency and was not conducted by the CIA component with responsibility for narcotics intelligence collection. A CIA calls to intercept crew stationed at an East Coast site monitored and from cei-tain Latin American telephone numbers con- , 223 tained on a "watch-list" provided by cotics-related conversations were then NSA. Magnetic tapes of narfurnished to NSA. Wliile the was focused on foreign nationals, it is clear that American citizens were parties to many of the monitored calls. The General Counsel of CIA was not consulted until approximately three months after the program was commenced. He promptly issued an opinion that CIxVs conducting the monitoring program was illegal, and the program was immediately terminated. All of the CIA's clandestine collection with respect to narcotics is intercept conducted overseas. A limited amount of overt collection of this information is conducted within the United States, focusing primarily on economic, agricultural and scientific information, most of which is obtained from legal drug manufacturers. In addition to the gathering of foreign intelligence, the CIA has provided a limited amount of technical or other operational assistance to the Drug Enforcement Administration (DEA). On frequent occasions, and in response to requests from this agency, the CIxV has provided various types of electronic and photographic equipment, alias documentation, and loans of "flash money'' for use by enforcement agents to establish bona fides with narcotics dealers. The CIA has also conducted a very limited number of training sessions for federal narcotics agents covering such subjects as the use of intelligence and operational techniques for clandestine collection. The Agency has adopted and apparently adhered on the rendering of technical assistance or issuance of tion to of DEA. Such illicit form CIA alias documenta- materials are issued only for use in investigation narcotics activities overseas, to all to strict controls and DEA is required to con- regulations governing requests for and use of such documentation must be approved by the Deputy Director for Operations and both DEA headquarters anrl the user of the documents must sign receipts. The CIA requires that both equipment and alias documentation be promptly i-eturned. In most cases, DEA requests for assistance have been made and honored overseas where DEA has lacked the necessary facilities and technical expertise. The number of these requests has decreased sharply as has developed its own technical capabilities. items. All requests for alias DEA Conclusions Concerns that the CIA's narcotics-related intelligence activities may involve the Agency in law enforcement or other actions directed against American citizens appear unwarranted. The monitoring of telephone calls, while a source of valuable in- , ! 224 formation for enforcement officials, was a violation of a statute of the United States. The fact that before the operation was halted it was conducted for over three months without the knowledge of the Office of the General Counsel demonstrates the need for improved internal consultation. (See Recommendation 10). I Chapter 16 Domestic Activities of the Directorate of Science and Technology In the past two decades, the CIA has placed increasing emphasis upon gathering foreign intelligence through technical and scientific means. In 1963, Director John McCone sought to coordinate the scientific development of intelligence devices and systems by creating the Science and Technology Directorate within the CIA. ]Most of the scientific and technological endeavors liad been previously undertaken by the Plans (now Operations) Directorate. The Science and Techirologv Dii-ectorate is presently responsible for all of the research and development engaged in by the CIA in all fields satellite of science and technology. Projects range from complex systems to the development of miniature cameras and concealed listening devices. The Directorate also is engaged in developing countermeasures to neutralize new scientific and technological devices developed by for- i eign intelligence services. Private industry provides new much of the research and development on a contractual basis. In addition to engaging in research and development, some branches of the Science and Technology Directorate provide operational support in the field for use of intelligence gathering devices developed by of intelligence gathering devices the Directorate. I Other branches of the Directorate themselves engage in the task of foreign intelligence-gathering abroad, utilizing technical intel! by operations agents. a number of projects of the Science and Technology Directorate which have affected persons living within the United States. ]Most such activities were lawful and proper, although there have ligence gathering devices not developed for use The Commission investigated 1 been scattered improprieties described below. (225) 226 A. The Testing of Scientific and Technological Develop- ments Within the United States Wliile the research and development of teclmical devices is new CIA scientific and naturally undertaken within the United States, the evidence before this Commission shows that with a few exceptions, the actual devices and systems developed have not been used operationally within this country.^ However, the Agency has tested some of its new scientific and technological developments in the United States. One such program included the testing of certain behavior-influencing drugs. Several othei-s involved the testing of equipment for monitoring conversations. In all of the programs described, some tests were directed against unsuspecting subjects, most of 1. whom were U.S. citizens. The Testing of Behavior-Influencing Drugs on Unsuspecting Subjects Within the United States In the CIA began to study the properties of certain behavior-influencing drugs (such as LSD) and how such drugs might 'be put to intelligence use. This interest was prompted by reports that the Soviet Union was experimenting with such drugs and by speculation that tlie confessions introduced during trials in the Soviet Union and other Soviet Bloc countries during the late 1940's might have been elicited by the use of drugs or hypnosis. Great concern over Soviet and North Korean techniques in "brainwashing" continued to be manifested into the early 1950's. The drug program was part of a much larger CIA program to study possible means for controlling human behavior. Other studies late 1940's, the explored the effects of radiation, electric-shock, psychology, psychiatry, sociology and harassment substances. The primary purpose of the drug program was to counter the use of behavior-influencing drugs clandestinely administered by an enemy, although several operational uses outside the United States were also considered. Unfortunately, only limited records of the testing conducted in these drug programs are now available. All the records concerning the program were ordered destroyed in 1973, including a total of 152 separate files. In addition, all persons directly involved in the early phases of the pi'ogi'am were either out of the country and not available for 1 A few audio-surveillance devices developed by the Science and Technology Directorate have been used by the Office of Security in the course of investigations of persons within the United States. In addition, several devices developed by the Agency have been used by other federal agencies in operations conducted Avithin the United States. 227 interview, or were decreased. Nevertheless, the some of the Commission learned details surrounding several tests of LSD conducted on unsuspecting subjects between 1953 and 1963. The and the importance, of testing potential behaviorinfluencing drugs (including LSD) on human subjects was first suggested in 1953. It was also suggested at that time that Agency trainees might 'be utilized as test subjects. Any such testing was to be carefully supervised and conducted only in the presence of a qualipossibility, fied physician. Following laboratory testing of LSD and other potential behaviorinfluencing substances, a few tests were run on voluntary participants. Commencing in 1955, under an informal arrangement with the Federal Bureau of Drug Abuse Control, tests were begun on unsuspecting subjects in normal social situations. Testing was originally conducted on the "West Coast. In 1961, a similar testing program was initiated on the East Coast. In 1963, the Agency's Inspector General learned of this program and questioned the propriety of testing on unsuspecting subjects. The Inspector General reported that in a number of instances, test subjects became ill for hours or days following the application of a drug. There was one reported incident of hosi^italization, the details of which could not be learned by the Commission because of the destruction of the records and the unavailability of witnesses. The Commission did learn, however, that on one occasion during the early phases of this program (in 1953), LSD was administered to an employee of the Department of the Army without his knowledge while he was attending a meeting with CIA personnel working on the drug project. 1 Prior to receiving the LSD, the subject had participated in discussions where the testing of such substances on unsuspecting subjects was agreed to in principle. However, this individual was not made aware that he 1 ( had been given He CIA LSD until about 20 minutes after it had been and was sent New administered. developed serious side York with a he jumped from, escort for psychiatric treatment. Several days later, a tenth floor window effects of his to room and died as a result.^ The General Counsel ruled that the death resulted from "circum- stances arising out of an experiment undertaken in the course of his official duties for the United States Government," thus ensuring his Reprimands were issued two CIA employees respon- survivors of receiving certain death benefits. by the Director of Central Intelligence to sible for the incident. - There are indications In the few remaining Agency records that this individual had a history of emotional instability. may have 228 As a result of the Inspector General's study of this drug program in on human subjects. All further testing of potentially dangerous substances on unsuspecting subjects was prohibited. Between 1963 and 1967, some testing of drugs continued, but only on voluntary subjects, primarily inmate volunteers at various correctional institutions. In 1967, all projects involving behavior-influencing drugs were terminated. It is presently the policy at CIA not to test any substance on unsuspecting persons. Current practice in all experimentation is to adhere strictly to Department of Health, Education and Welfare guidelines concerning the use of human subjects, and all current CIA contracts carry language to that effect. 1963, the 2. Agency devised new criteria for testing substances The Testing of Communications Intercept Systems Within the United States an important aspect of modern intelligence collection. Several new systems developed by the Agency for use overseas have been tested in the United States. In the process of this testing, private communications, presumably between United States citizens, have sometimes been overheard. In many cases conversations were overheard but not recorded. In other cases, conversations were recorded for evaluation purposes but the recordings were kept only until the testing was concluded, at which time they were destroyed. No evidence was found that any such tests were ever directed against persons for the purpose of learning the content of any communication. In most instances, the speakers were never identified. Nor was any evidence found that the Agency disseminated or ever attempted to exploit the contents of any intercepted or recorded conversations. Monitoring of foreign conversations is Other Testing Within the United States Various branches of the Science and Technology Directorate are'** involved in the testing of other new devices and procedures such as chemical warfare detection equipment, new means of measuring physiological responses in humans and photographic interpretation systems. 3, Conclusions It was clearly illegal to test potentially dangerous drugs on unsus- pecting ITnited States citizens. \ should Tlie testing of equipment for- monitoring conversations not be directed against unsus])ecting persons in the United States, Most of the testing undertaken by the Agency could easily have 229 been performed using only Agency personnel and with their full knowledge. Recommendation (27) In accordance with its present guidelines, the CIA should not again engage in the testing of drugs on unsuspecting persons. Recommendation (28) Testing of equipment for monitoring conservations should not involve unsuspecting persons living within the United States. B. Other Selected Activities of the Science and Technology Directorate 1, The Manufacture and Use of Documents The Agency maintains a capability for producing and providing to agents and operatives a wide range of "alias" credentials. Most such documents purport to be of foreign origin. Some, however, are docuits ments ordinarily issued by other branches of the U.S. government or by private United States businesses and organizations. Among the United States "alias" documents furnished from time to time to Agency personnel and operatives are Social Security cards, bank cards, professional cards, club cards, alumni association cards and library cards. The Agency has recently stopped producing alias driver's licenses, credit cards and birth certificates, unless needed in a particularly sensitive operation and approved in advance by the Deputy Director of Operations. While the Agency does not produce false United States passports, it has in the past altered a few by the addition of entries to evidence travel which had not actually occurred. The purpose of alias documents is to facilitate cover during CIA operations. These documents are not "backstopped," i.e., manufactured with the consent and knowledge of the company or organization whose card is being manufactured. They are useful only as flash identification. Only the Social Security Administration has been told that the Agency is manufacturing its cards. The Commission found no evidence that any Agency employee has ever used false documentation of this kind to his personal advantage. Conclusions Alias credentials are necessary to facilitate i overseas, but the strictest controls CIA covert operations and accountability must be main- 230 tained over the use of such documents; recent guidelines established by the Deputy Director for Operations appear adequate to prevent abuse in the future. 2. Overhead Photography of the United States In 1966, the Special Assistant to the President for Science and Technology commenced a formal study on the use of aerial intelligence photography for civilian purposes. This study was commenced with the approval of the Director of Central Intelligence and in cooperation with the Departments of Agriculture, Commerce, Interior, the Agency for International Development and the National Aeronautics and Space Administration. In 1967 the study resulted in the establishment of a steering committee in the office of the President's Science Adviser, with membership from the United States Geological survey, the Department of Commerce, the Department of Agriculture, the National Aeronautics and Space Administi-ation and other interested civilian agencies. This committee was designed to act as an interface, by which the intelligence community could assure the public that it was not involved in selecting or determining the end use of its aerial photographs of domestic areas. The Director of Central Intelligence agreed to provide photography to civilian agencies pursuant to the steering committee's request, pro- vided there would be no interference with intelligence needs nor any significant cost increase.^ The photographs of the United States actually turned over to were taken primarily for military mapping purposes. Since that time, aerial photography systems have been used for such diverse civilian projects as mapping, assessing natural disasters such as hurricane and tornado damage and the Santa Barbai-a, California, oil spill, conducting route surveys for the Alaska pipeline, conducting national forest inventories, determining the extent of snow cover in the Sierras to facilitate the forecast of runoff and detecting crop blight in the Plains States. Limited equipment testing and performance evaluation is also conducted, using photograplis taken of civilian agencies ar-eas w^ithin the ITnited States. of the President's Science Adviser was abolished, and the special steering connnittee controlling the civilian use of aerial photography ceased to exist. Eiforts are underway to establish a new connnittee to undertake this activity.* In the meantime, the Direc- In 1973, the Office tor of Central Intelligence has entered into agreements with several ^ of the operational aerial photography no longer responsible for the operational aspects of those systems. The President has recently announced his intention to reestablish the Office of the While the Agency engineered and developed most systems, ' it is President's Science Adviser. I 231 federal agencies, including the Environmental Protection Agency, which peraiits them access to classified overhead photography. Conclusions The Commission can find no impropriety in permitting civilian use of aerial photography systems.'^ single aerial The economy of operating a photography program dictates the use of these photo- graphs for appropriate civilian purposes. Recommendation A (29) agency committee should be reestablished to oversee the civilian uses of aerial intelligence photography in order to avoid any concerns over the improper domestic use of a CIAcivilian developed system. is arguable that at least one present use of aerial photography is law enforcement nature and outside the scope of proper CIA activity. This use involves photography with infrared sensors to detect areas of high concentrations of industrial pollutants in the air and in various bodies of water. Data obtained from this activity could conceivably be used as the basis for a criminal action brought under environmental legislation. The Commission believes, however, that the legislators, when they prohibited the CIA from engaging in law enforcement activities in their 1947 enactment of the National Security Act, could not have contemplated the systems presently in use. It should be noted that the CIA did turn down a request from the Alcohol and Tobacco Tax Unit of the Treasury Department to help locate moonshine stills in the North Carolina mountains using infrared photography, on the ground that such activity was law enforcement in nature. ^ It in Chapter 17 CIA Relationships with Other Federal, State and Local Agencies Because of its practice of occasionally lending assistance to various and local law enforcement agencies, questions have been raised as to whether the CIA has engao;ed in internal security functions or exercised police or law enforcement powers contrary to the federal, state restrictions of the National Security Act. Like other arms of the o^overnment, the CIA frequently has occasion either to give assistance to or receive assistance and local agencies. For example, in gathering foreign from othei- federal, state Agency might gain access to information concerning international drug traffic which would be of interest to the Druo- Enforcement Administration. Or it might receive information of interest to the FBI and the local police intelligence, the concerning the security of govei-nment installations. CIA operations touch the interests of many other agencies as well. This Chapter will explore some of the relationships between the CIA and —in other agencies over the years whether the CIA has exceeded its order to determine authority in connection with those relationships. A. Relationships With Other Federal Agencies 1. Federal Bureau of Investigation Many counterintelligence operations undertaken by the FBI also have positive foreign intelligence ramifications. Likewise, legitimate douiestic CIA activities occasionally cross the path of ongoing FBI investigations. Consequently, regular daily liaison has customarily been maintained between the CIA and the FBI to coordinate the activities of these two federal agencies. CIA furnishes to the FBI much routine information obtained by the CIA in the course of its legitimate foreign As a part of such liaison, the (232) 233 intelligence gathering activities. Included is information concerning suspected criminal activities within the United States and information relevant to the country's internal security. Likewise, the FBI furnishes CIA relating to foreign intelligence matters. From the CIA and the FBI have cooperated in joint operations information to the time to time, touching on both agencies' areas of interest. The relationship between the CIA and the FBI over the years has not been uniformly satisfactory. At the policy-making level, it has ranged from workable, at its best, to almost nonexistent at its worst. In February 1970, following a seemingly insignificant incident in Denver, all formal liaison between the two agencies was completely severed by the FBI. Formal liaison at the policy level was not restored until November 1972 ^though a working relationship at lower levels was always maintained. The Commission is informed that the relationship between the CIA and the FBI has improved considerably in the last few years. Nevertheless, the relationship needs to be clarified and outlined in detail in order to ensure that the needs of national security are met without creating conflicts or gaps of jurisdiction. A better exchange of ideas and more effort by each agency to undei"stand the problems facing the other are essential if the responsibilities of both agencies are to be met. — Recommendation (30) The Director of Central Intelligence and the Director of the FBI should prepare and submit for approval by the National Security Council a detailed agreement setting forth the jurisdiction of each agency and providing for effective liaison with respect to all matters of mutual concern. This agreement should be consistent with the provisions of law and with other applicable recommendations of this Report. 2. Narcotics Law Enforcement Agencies on at least one domestic operation as a cooperative effort with the Bureau of Narcotics and Dangerous Drugs (BNDD) (now the Drug Enforcement Administration). The operation was an attempt to help BNDD prevent corruption within its ranks by developing sources of information The CIA, through a field office in Virginia, carried within the Bureau. asked The operation began in late 1970 when the Director of the Director of Central Intelligence for assistance in building a "counterintelligence" capacity within BNDD. The request was apparently BNDD supported by Attorney General Mitehell. stated that it was vitally concerned that some of its employees might have been corrupted by drug traffickers. According to BNDD 234 charge of the Agency's field office involved, BNDD reported that it did not have the "know-how" to set up a covert operation or to establish a counterintelligence unit. It therefore turned to the CIA officer in CIA for assistance. The CIA recruited officers for BNDD through a proprietary corporation. The CIA officer in charge performed the contact and interview work. He screened applicants by telling them that a corporate the client engaged in the field work and met the of law enforcement wanted people to as research consultants. If the applicants were interested physical requirements for age and size, they were then subjected to further screening. If they passed the security checks and evaluations and were still interested, then the recruits were introduced to the Chief of the Office of Inspections of BNDD. They then learned, for the first time, what job was to be offered to them. If the applicant was acceptable to BNDD, the CIA provided a short course in clandestine trade crafts and the employee was turned over to BNDD. The CIA relinquished all control over and contact with the employee once he entered upon his duties with BNDD. The CIA recruited a total of 19 agents for in the period between December 1970 and July 1973, when Director Colby terminated the CIA's participation. In addition to recruiting an internal security unit for BNDD, the CIA also assigned two of its agents, working under cover of a commercial corporation, to operate for between January 1972 and the termination of the project in July 1973. They were directed by and were not under the operational control of the CIA. The CIA did, however, provide for the salary and administrative requirements of the agents, for which the CIA was reimbursed by BNDD. These activities violated the 1947 Act which prohibits the CIA's participation in law enforcement activities. The Commission therefore concludes that Director Colby was correct in his written directive terminating the project. The Director and the Inspector General'! should be alert to prevent involvement of the Agency in similar enterprises in the future. BNDD BNDD BNDD The Department of State For over 20 years, the CIA conducted a training school police and security officers. The school, operated within 3. for foreign the United States imder cover of a private commercial corporation, trained for- eign police in highly specialized areas of law enforcement. The CIA school offered training in fingerprinting, security, criminal investiga- methods and patrol operations, among others. The Agency training operation began in 1952 with courses taught in the United States for foreign security personnel. The school was tion, instruction — 235 not very extensive in nature and operated out of a farmhouse in Virginia. In addition, in 1960 the State Department, operating in cooperation with the CIA, opened a school in the Panama Canal Zone for Latin iVmerican police officers. The CIA supplied the faculty while the other costs of the school were borne by the State Department and the Agency for International Development's Office of Public Safety. The school concentrated on teaching security methods and modern techniques of crime solving. In 1963, the State Department closed its Canal Zone police training school, and the activities carried on there were transferred to the United States. A commercial contractual arrangement for the training service was established with a domestic private corporation which was a CIA front. The relationship between the CIA and the private corporation was unknown to the Administrator of the AID, although knew was shut down the person in charge of the Office of Public Safety apparently he was dealing with a CIA proprietary. The school and the cover corporation disbanded in 1973. In addition to operating the foreign police school, the CIA provided the faculty for special courses on countermeasures against terrorists also in cooperation with the AID Office of Public Safety. During the 20-year period of its operation of the police training school and par- ticipation in the special courses, the CIA graduated a total of about 5,000 foreign student police officers. The CIA proprietary corporation was also a licensed firearms and police equipment dealer. The records of the corporation show that its gross sales of police equipment to foreign police officers and police de- partments varied from between a low of about $6,000 in one year to a high of $48,000 in another year. Most of the sales, according to the CIA officer in charge of the program, were to the students enrolled in the course who purchased police equipment upon completing their training. The Commission has concluded that providing educational programs for foreign police was not improper under the Agency's statute. Al- though the schools were conducted within the United States through a CIA proprietary, they had no other significant domestic impact. Engaging in the firearms business was a questionable activity for a government intelligence agency. It should not be repeated. 4. Funding Requests from Other Federal Agencies On CIA was requested to fund a project having no intelligence relationship, apparently because its inclusion in the CIA's secret budget provided an opportunity to hide the at least one occasion, the expenditures. ' 236 In the spring of 1970, the White House CIA was requested by members of the funds for payment of stationery and postage for replies to persons who wrote President Nixon after he initiated the invasion of Cambodia. Although CIA officials at first expressed reluctance to use CIA funds for this purpose, the Agency eventually forwarded two checks totaling $33,655.68 to the White House to reimburse its costs. Because of the unique CIA budgetary scheme, no one other than the CIA's internal Audit Staff ever reviewed this miusual expenditure. This use of CIA funds for a purpose unrelated to intelligence is improper. Steps should be taken to ensure against repetition of this staff to contribute incident. B. State and Liocal Police The primary point of contact between the law enforcement agencies is, and CIA historically and local has been, through the and state Personnel security matters, such as the arrest of Agency employees for criminal offenses, the involvement of employees in automobile accidents, and police assistance requested by employees Office of Security. problems as burglaries of their belongings, provide the most frequent reasons for CIA dealings with police to resolve such personal agencies. The Agency's have been with police departments in the Washington, D.C., metropolitan area particularly with the Washington Metropolitan Police Department, because of the wide range of CIA activities carried on in Washington and the Fairfax County, Virginia, Police Department, because of the physical presence of CIA Headquarters within that county. Liaison with other surrounding suburban police departments has been maintained to a lesser extent. Morever, CIA historically has maintained limited contacts with a large number of state and local police departments throughout the country, some on an ad hoc basis and others on a continuing basis. In addition to its ordinary liaison activities, the CIA has on occasion provided other assistance to state and local law enforcement agencies. It has also received significant assistance from such agencies. The closest contacts — — following are examples. 1. Assistance Given to State and Local Police Since 1966, the Office of Security has conducted or arranged for a number of briefings, demonstrations, seminars and training courses for representatives of various police departments throughout the United These sessions were generally conducted at facilities operated by the Agency in the Washington, D.C., area. Most of the States. 237 courses lasted a day or two and covered such subjects as declassifica- tion of materials, foreign weapons, counter-audio measures, explo- and detection techniques, basic theories of intelligence and clandestine collection methodology. However, one course in lockpicking, photography (including covert photography, telephotography and photoanalysis) and positive surveillance (both physical and audio) lasted approximately three weeks. This course was given on at least four separate occasions in 1968 and 1969. Director Hehns supported and approved all of these training programs. All, however, were terminated in 1973 upon the passage of an amendment to the Omnibus Crime Control and Safe Streets Act, which prohibits CIA assistance to the Law Enforcement Assistance Administration and evidences congressional disapproval of direct CIA assistance to state and local police departments in general. Since its inception, the CIA has had a policy against providing assistance in the form of Agency personnel to state and local law enforcement agencies for police-related activities. However, there have been some deviations from that general rule. On at least three occasions between 1969 and 1971,^ the Office of Security provided several men and radio-equipped vehicles to the Washington Metropolitan Police Department to assist the police in monitoring crowds during anti-war demonstrations. Such assistance was rendered at the request of an officer of the police department. In December of 1970, CIA was asked to provide (and did provide) an Arabic interpreter to the Fairfax County Police Department in sive devices connection with a homicide investigation. In addition to interpreting, l I i j ,! I I CIA agreed to assist in the actual investigation by pi-etending to be another police officer in the hope that he might overhear conversations in Arabic carried on by prospective witnesses being confronted by the police. He was provided police identification, including a badge and service revolver, to aid in this investigation. In 1972, the CIA assisted the Washington Metropolitan Police Department on an actual police surveillance. In the course of a surveillance training exercise for Metropolitan Police personnel, a police informer suspected by the Washington police of having engaged in improper actiidties was surveilled without her knowledge. Nine CIA agents and six Agency automobiles were utilized in the operation. The Commission has discovered no other instances where tho CIA has provided manpower to any state or local police departments to assist in operations which were of a law-enforcement nature. The Office of Security has sometimes loaned electronics gear and other equipment (including photographic and riot control equipment) this officer * The 1969 Presidential Inauguration, the anti-war moratorium demonstrations in November 1969, and the 1971 May Day Demonstrations. ) 238 departments for training or for use in police operations. In addition, the CIA has, on at least one occasion, assisted local police in installing an electronic listeaiing device for use in an actual police operation. Once in the late 1960's, small quantities of explosives were given to the Fairfax County Police Department for use in training dogs to to police locate explosives. Other miscellaneous assistance rendered by the CIA to state and local law enforcement agencies includes providing police with technical advice, alias documentation, laboratory assistance, and access to certain CIA facilities for highly sensitive police operations. Further details appear in Appendix VII. 2. Assistance Received from State and Local Police The CIA from receives a great deal of routine assistance state and law enforcement agencies, primarily from police departments in the Washington metropolitan area. Examples of such assistance include name checks to determine whether CIA applicants for employment have criminal records, checks to determine the registered owners of vehicles with known license tags, forwarding information concerning planned activities or demonstrations directed against CIA facilities, and providing police protection for CIA facilities located within local a local police department's jurisdiction. type of assistance for many The CIA has years. It is generally the that state and local police give to all received this same assistance government agencies. Because of the extraordinary security precautions exercised by the CIA, it has also made arrangements with state and local police, in all areas of the country where it maintains facilities, to be notified of the arrest of any CIA employee. The CIA uses this information only for preventing breaches of security there is no evidence suggesting that CIA has ever attempted to intervene in a police investigation concerning one of its own employees. Only one instance has been discovered where local police actively participated in a CIA operation. In 1971, three police officers from the Fairfax City Police Department accompanied Office of Security personnel while they surreptitiously entered a business establishment in Fairfax, at night, without a warrant, to photograph some papers. ( This investigation is among those discussed in Chapter 13. The CIA has sometimes received permission from local police au; thorities to use their facilities or personnel in activities not related to For example, between 1951 and 1955, the CIA received some assistance in the form of manpower from a number of state police departments. Since the CIA was rapidly expanding at that time, and since it was therefore unable to conduct all of the necessary security background investigations of prospective CIA personnel, actual CIA operations. — — 239 the police from several states agre«d to conduct these investigations for the x\gency. The state police forces of Colorado, Connecticut, Florida, Indiana, Iowa, Kentucky, Michigan, Minnesota, Missouri, Ohio and Washington conducted approximately 341 investigations during this period. In 1969, arrangements were made with the Washington Metropolitan Police Department to allow the CIA to conduct certain training exercises using police facilities and personnel. These exercises involved the contrived "arrest" of CIA trainees by a Washington police officer and the lengthy interrogation of those trainees at Washington Police Headquarters by Office of Security personnel. The object of the training was to determine whether CIA trainees, scheduled for covert assignments overseas, would "break" when placed under such pressures and to give them experiences similar to those which they might be expected to encounter on their assignments. Approximately four such training exercises each involving four or five trainees were conducted through 1974. On at least one occasion several yeare ago, a similar training exercise was conducted in cooj^eration with the Fairfax County Police Department. The CIA has occasionally obtained badges and otlier identification from local police for the purpose of maintaining cover during CIA operations. Such "cover" has been obtained from police departments in Washington, D.C., Fairfax County (Virginia), and New York City, among others. The evidence before this Commission has shown that the CIA's use of "police cover" has been extremely limited, and Ave have found no evidence of abuse. (For more detail, see Appendix — — — VII.) Except for the one occasion when some local police assisted the CIA in an unauthorized entry, the assistance received by the CIA from state and local law enforcement authorities was proper. The use of police identification as a means of providing cover, while not strictly speaking a violation of the Agency's statutory authority as long as no police function is performed, is a practice subject to misunderstanding and should be avoided. 3. Gifts For and Gratuities Given several years, it to Local Police Officials has been the practice of the Office of Security to offer gratuities to police officials sistance to the who have been of particular as- CIA. Gratuities have ranged from candy, liquor and twenty-five dollar gift certificates at Christmas, to providing free transportation for vacationing police officials at costs up to eight hun- dred dollars. In 1971 the Office of Security made a gift to the police department of Lewes, Delaware, of some radios, flashlights, mace, ammunition and other items in recognition of police assistance to Director Helms, ;! 240 a summer resident of Lewes, whose life was believed to be in danger at j the time. In addition, the Office has on several occasions given retirement gifts to local police officials who have been particularly helpful to the Agency. On I ' several occasions, police officials have been fiown i to a CIA training facility in southern Virginia for an all expenses paid weekend of relaxation and entertainment. Most of the gifts and gratuities given to local police officials by the Office of Security were paid for out of a confidential fund made able to the Director of Security for his own ! , i avail- miscellaneous use. Ex- penditures from this fund did not require the approval of any higher authority. \ The primary purpose of such "courtesies" to officials of state and j departments was to recognize the cooperation which those officials or their departments had given the CIA. There is no evidence that any gratuities given to local police officials and paid for out of CIA funds were conditioned upon the recipient's providing the Office of Security with any particular assistance. local police Conclusions In general, the coordination and cooperation between state and local.j law enforcement agencies and the CIA (primarily the Office of Security) has been excellent. Both the Agency and local police officials have given assistance to each other in a spirit of cooperation based; upon a desire to facilitate their respective legitimate aims and goals. Most of the assistance rendered to state and local law enforcement' agencies by the CIA has been no more than an effort to share with law enforcement authorities the benefits of new methods, techniques and equipment developed or used by the Agency. In compliance with the spirit of a recent act of Congress, the CIA, in 1973, terminated all but routine assistance to state and local law^ enforcement agencies. In view of these recent statutory changes, assistance is now being provided to state and local agencies by the FBI. There is no impropriety in the CIA's furnishing information concerning and developments to the FBI. On a few occasions, the Agency has allowed new techniques' employees to become' involved in actual police investigations. In spite of these lapses, however, the Agency has generally been careful to avoid operations which might be considered police or law enforcement activities. The assistance received by the CIA from state and local law en forcement authorities did not involve the Agency in any improprieties. However, any practice of giving gratuities to cooperative police officials should be terminated. its , ( Chapter 18 Indices and Files on American Citizens The collection of information about people is a major function of the CIA. Biographical information is collected not only in response but also to accumulate background of likely relevance to be drawn on when needed. The collection of this informa- to specific requirements and the inclusion of information about persons who may be American citizens is largely tion is incidental to the CIA's normal activities, incidental to collecting information about people generally. For these reasons, biographical information is stored by a number of components throughout the Agency. The nature of the indices and files varies with the missions and capabilities of those maintaining them. The Operations Directorate maintains a and certain biographical and subject files central index of names with the •intelligence collection activities of its various divisions and staffs. In addition, separate project and case files are maintained by these divisions and staffs. The other major source ' in connection of biographical files is in the Administra- where files are maintained by the Office of Security and by other administrative branches such as the personnel and medi- tion Directorate, cal offices. Biographical maintained in the Intelligence Direc|torate, but few, if any, names of Americans are believed to be in them. Finally, miscellaneous files on Americans may be found in the offices of the General Counsel and the Legislative Counsel and in other offices which handle dealings with Americans. The following sections describe the types of files maintained by the I CIA which are most likely to contain information on American ; files also are !' I citizens. (241) ! ' 242 A. Indices and Files of the Operations Directorate Biographical files are generated by the Directorate of Operations as a result of the indexing of names of persons appearing in docu- ments and communications received by the Directorate. Generally, those documents and communications relate to persons who are of intelligence or counterintelligence interest to the Agency, either because of their actual or possible association with foreign intelligence activities, or The names because they are actual or potential sources or operatives. of United States citizens have been indexed along with on these criteria. The fact that such names are included does not appear to reflect an effort to conduct surveillance or other investigations of Americans; rather it appeare to be the normal result of the Agency's foreign intelligence activities. Names from Operation CHAOS files have not been included in the the names of others, based central index. The files first i step in the process of keeping the biographical index and involves the indexing of incoming documents. j The Operations Directorate maintains a central index and file of documents received, most of which are in the normal course routed through the central index and file. Certain sensitive documents, however, may not be indexed centrally. Each document received is reviewed and names of intelligence interest are entered into the biographical : . ! index. | indexing a name have changed over the years. In the early years of the Agency, virtually every name in a document was indexed. Eventually the Agency accumulated some 15 million biographical references in its index. Since the early 1960's, however, the criteria have limited indexing to persons of counterintelligence interest (i.e. those suspected of working on behalf of a hostile intelligence service) and pereons of interest as actual or potential sources of information or assistance. The criteria for The number of ; \ ; ; references has since that time been progressively re- duced to its present level of about 7,500,000 names (including an in-l| determinate number of duplicates). Of these, an estimated 115.000 names are of persons who are either known or believed to be United ij States citizens. The fact that a name has been entered into the index does not mean on that person. Files are opened only at the direction of a division or staff and only when it appears that the person will be of continuing intelligence interest. In that case, a so-called personality (or 201) file is opened; i.e., a manila folder is prepared to hold relevant documents accumulating on that person. that a file exists 243 some 750,000 personality that 57,000 files are of American and an additional 15,000 are of persons who may be Ameri- The Operations Directorate has a files. Of these, the Agency estimates citizens total of can citizens. review has been made to determine how many of these files contain what might be regarded as derogatory information. However, an analysis by the Agency of a group of files opened on American citizens in 1974, as reported to the Commission's staff, showed that No file-by-file were opened on persons who were sources of information or assistance to the Agency, nineteen percent related to Americans of possible use to the Agency, and eleven percent related to Americans who were of foreign counterintelligence interest. Until 1974, the indexing process made no distinction between United States citizens and others. At that time, regulations were issued restricting the indexing of United States citizens to those involved in seventy percent of these files "foreign activity detrimental to the national security interests of the United States" such as "espionage, counterintelligence, sabotage, subversion, covert propaganda, psychological or unconventional warfare or paramilitary operations," "terrorist activity and narcotics trafficking," participation in the "illegal apparatus of foreign communist parties," or "other international clandestine activity." a The indexing is done by clerks who determine whether to index name on the basis of directions contained in the document, supplied by either its originator or its recipient. These persons are expected to comply with the indexing criteria. In the past, a major source of index references to United States citizens was FBI reports. Whenever an FBI field office felt a report on an individual might be of counterintelligence interest, a copy was routinely furnished the Agency. Many of the names appearing in these raw reports were indexed with relatively little attempt to determine , . I [' CIA. Thus a large number of generally unevaluated index references to Americans were placed in the system. their potential relevance to the FBI |. reports are no longer indexed without a prior determination by an appropriate division or staft' that indexing criteria are in fact met. In addition, efforts are being made to work out a procedure under which only reports meeting specified criteria will be sent by the FBI to the CIA. Xames ' I from of Americans are also contained in the communications traf- CIA which passes through the indexing process. The information developed by the Commission indicates that in large part these references are to Americans who are actual or potential sources of information or assistance to the Agency. Of course, names of Americans might turn up in other documents as fie ovei-seas stations to Headquarters well. Frequently, the citizenship of a person is not known or disclosed 244 in the document, so that it is impossible to determine whether the name indexed is that of an American. An index reference on a person contains a limited amount of biographical data along with references to the filed documents from which it was derived. It may also contain a very brief summary of some of these documents. Four years ago, the entire index was computerized, and today the information contained in it is accessible by computer. Access is restricted, however, to those officers in the Operations Directorate who are specially authorized for that purpose. Many of the Agency's files on Americans were opened because a security cleaiance was required or because the person was involved directly or indirectly in some Agency operation. For example, it is estimated that there are more than ten thousand files on American employees or contractors involved in the Agency's airline operations, which are now being phased out. The Agency believes that many more of these files on Americans aie of persons who have had some tangential relationships with the Agency or whose utilization may at one time have been considered by the Operations Directorate but never became a fact. Most of the files on Americans appear to be inactive. In 1974, only some 250 of these files were on loan to one or another of the divisions or stall's of the Directorate which hold files of active intelligence interest. Under present regulations, no file may be opened on an American without the written approval of one of the three top ranking officers of a division or staff. In addition, each division and staff is required to make a monthly report to the Deputy Director of Operations on all files opened on Americans. All of the exist hig files on Americans are now undergoing review by the divisions and staff responsible for the particular file. Material which does not meet current criteria is placed in sealed envelopes Avith the announced intention that the envelopes are to be destroyed at the end of the current investigations. The Directorate also maintains certain specialized indices and files which may contain the names of persons who happen to be American citizens. It has in its index references to documents of the CIA's predecessor agencies. It also has separate files on persons suspected of affiliation with Soviet and other foreign intelligence services, persons engaged in certain kinds of international travel, and persons who by citizen reason of particular affiliations may be potential foreign intelligence sources. Finally, other components of the Directorate maintain American citizens working with those components. files on 245 B. Indices and Files of the Administration Directorate The Administration Directorate maintains biograj^hical files on a large number of U.S. citizens and foreigners living within the United States who have knowingly with the Agency. The vast majority of these entered into some type of relationship concern employees, former employees and applicants for employment. Records on these persons must necessarily be maintained, as in any other government agency or private files business. In addition, because of the special nature of its activities, the CIA maintains contact Avith (and therefore records concerning) many other persons and business firms throughout the country who provide the Agency with needed assistance. Due under which the Agency operates, nnist also be maintained on all j^ereons to the security restrictions a wide variety of security files working with or for the Agency who may come into contact with classified information. Some of these persons are aware of the Agency's interest in them; others are not. All files relating to security matters are compiled and maintained by the Office of Security the others are ; maintained elsewhere within the Administration Directorate. The following is a description of the types and kinds of files maintained by the Administration Directorate on persons living within the United States: ! /. Indices and Files Outside the Office of Security Administration Directorate files on CIA employees, former em- employment include applicant records (many of which contain considerable biographical data in the form ployees and applicants for of voluntary personal history statements) ; pei-sonnel files such as records of job assignments, performance assessments, insurance rec- commendations and retirement records; financial files such as payroll and travel records training files medical files and other mis- ords, ; cellaneous These ; ; files. files are generally maintained in the office primarily responsi- ble for the function involved. In addition, master folders containing pertinent papers from all of the other offices needed to manage each employee properly are maintained by the particular component to which each employee is assigned. In addition to its relationship with its own employees, the CIA maintains relationships with numerous other individuals who render assistance to the Agency. These include agents, informers, consultants, and persons temporarily assigned to duty with the Agencj^ from other government agencies. , 246 The Agency also maintains relationships with businesses and other governmental and educational institutions (and their representatives) who have contracts or other dealings with the Agency. Files and indices documenting these relationships are maintained by various components of the Administration Directorate for accounting and record-keeping purposes. 2. Indices and Files of the Office of Security maintained primarily to record actions taken by the Office in granting or denying security clearances to those persons whose relationship with the Agency gives them access to classified information. The files of the Office of Security are organized on the basis of "subjects." All individuals, organizations, businesses and projects are deemed "subjects" if security files exist on them. The bulk of the files maintained by the Office of Security consist of approximately 900,000 security files, each relating to the security investigation of a specific "subject" of interest to the Agency.^ About Office of Security files are one-third of these files are retired. About 90 percent of the ; I security j files zens. relate to individuals, a majority of The remaining 10 percent whom are United States citi- relate to impersonal "subjects" such ' and projects. Security files are maintained on applicants for employment, Agency employees, former Agency employees, independent contractors doing business with the Agency, persons supplying the Agency with positive intelligence information, consultants, non-Agency employees who work on Agency premises, and other individuals and business entities whose relationship with the Agency gives them access to classified as business firms, organizations information. Among the persons on whom such files -are j ' i t { established numerous past and present Senators, Congressmen, judges and; other prominent public officials. For example, the Agency presently are | on 75 sitting Members of Congress. | A few security files are maintained on persons unaware that they have any relationship to the Agency. For example, the employees o^ an independent contractor doing business with the Agency may know; that they are working on a secret govei'nment contract (and, in fact, that they have been investigated for a security clearance) but not that they are of interest to the CIA. Records of security clearances on those! employees woidd nonetheless be maintained by the Office of Security.] Likewise, clearance information may be maintained by the Office of' Security on persons whom the Agency is thinking of contacting, ori foreign nationals of potential operational use, even if the Agency sub-j maintains security files , i | , ^ A few security files are "multiple subject" files, containing information on two or more subjects in a single file folder. It was estimated by a responsible Agency oflScial that less^ than five percent of all security file folders are "multiple subject" security files. I 247 seqiiently decides not to contact the individual, or contacts him and he refuses to assist the Agency. Security files officers Avithin are established upon the request of any of numerous the Office of Security. new As a practical matter, 95 percent and are undertaken at the request of the Clearance Division of the Office of Security, which ensures that a security clearance is approved before access is granted to classified Agency information. No centralized control exists for screenof all requests to establish files are routine ing non-routine requests to determine their propriety. A security file is most frequently created on an individual when, for becomes desirable to give that individual Agency material. Security files on individuals ordi- any of a variety of reasons, access to classified it narily contain the following types of materials: (1) requests that an investigation be conducted; (2) biographical data on the subject, ranging from a few lines on one page to lengthy personal history out by certain applicants for employment; (3) authorizations for the release of high school and college transcripts and statements filled copies of those transcripts; (4) investigative coverage and reports of those investigations; (5) appraisal summaries reflecting the rationale documentation of the final action taken by the Office of Security concerning any given investigation; (7) secrecy agreements and notices of termination of such agreements; (8-) documentation of subsequent actions such as the granting or refusing of special clearances, approvals for assignment overseas, notations that polygraph or other special interviews were performed, notices of transfers and changes in cover assignments; memoranda concerning security violations, and notices of termination of affiliation with the Agency; and (9) miscellaneous documents which might bear on the question whether the individual should have a security clearance. The reasons for creating security files on "impersonal" subjects such as business firms and organizations differ widely. Most of these files are created at a time when the CIA first contemplates developing with the business entity or organization a relationship which might for granting or refusing to grant a security clearance give it access to classified or sensitive information. ; (6) The files contain such items as (1) security surveys of a business's premises if it is contemplated that classified activities will be carried on there, or (2) lists of persons from a business or organization assisting the Agency Avho are cleared to receive classified information or have access to CIA installations. Some security files have been compiled on organizations and dividuals thought to pose a threat to Agency personnel, in- installations For example, during the peak of the racial and antiwar disturbances in Washington between 1965 and 1972, security files or operations. 248 were accumulated on many dissident groups and their leaders. Other "impersonal" files were maintained on communist publications and suspected communist front organizations. A relatively small Office specific number of "impersonal" security files deal with of Security projects. These projects range from a project to provide security during the construction of CIA Head- quarters at Langley, Virginia, to investigations conducted of Agency employees or operatives thought to have been security risks. Security files of this type include descriptions of the project or investigation involved, assignments to the field, information collected during the course of the project or investigation, and (some times) the end result of the project or investigation. The security files maintained by the Office of Security serve a variety of purposes. In order to protect classified information, the Agency must maintain a substantial body of knowledge about persons who might be assigned to sensitive positions. The files are also used for periodic reviews of persons who occupy sensitive positions or hold special clearances. Reports of investigations are occasionally furnished to other government agencies with a legitimate need for the information contained therein. All pertinent subjects and references identified in security files have ' been card indexed. Approximately 900,000 of these indices are "subject" indices referencing the subject of n particular security folder bearing the name of the individual, business, organization or group on which the An file is i maintained. additional 950,000 indices are "reference" indices recording names which appear in documents stored in one of the folders inj dexed to a subject. An index reference is created when note-worthy information concerning the referenced individual is developed in connection with another case, or when it is learned that the referenced individual is connected with some company, organization or project which is of interest to the Agency. Over the years, there have been changing criteria concerning the type of information which is placed in security files and indices. At one time, files were established simply to hold a collection of reference index cards when the total on a given individual had reached a cer-^ tain numberIn about 1972, efforts were begun to purge the reference index and "impersonal" files of information which was of no current value.,] Many security files of dubious value or propriety were destroyed. These purging efforts have been suspended pending completion of :> ; . I ] t| J [ ; the investigations by this Commission and the Congress. — 249 The head of the division within the Office of Security responsible for maintaining all security files recently prepared a list of those ma- which should properly be retained in active security files. All materials to be filed are now reviewed by a senior clerk for propriety. As of March, 197-1, the head of that division has, for the first time, been given the authority to challenge any input into the index system of the Office of Security if he deems the material to be improper. The criteria for indexing names have also been drastically restricted. Security files on employees and others are very tightly held within the Agency. Only a few Office of Security personnel have access to these files, and then only on a need-to-know basis. No employee— not terials even the Director of Central Intelligence or the Director of Security is ever permitted access co his own security file. This precaution is taken to protect confidential sources of information, who are assured at the time they are interviewed about a prospective employee that Avhatever they say will never be divulged to the subject of the investigation. Agency officials evidence a very high level of commitment to honoring those assurances. Even more tightly held are the records of polygraph examinations While polygraph examinations are a routine part of every security investigation conducted by the Office of Security, the reports are separately and securely mainof employees and prospective employees. tained because of their potential for embarrassment. Other relatively voluminous Office of Security files which contain biographical data on American citizens include records of individuals holding special and compartmentalized access approvals to various jCIA material, records of persons holding building badges and other credentials issued under Agency cognizance to employees and other individuals, and visitor records on approximately 500,000 persons Avho ihave visited 1 ' Agencv installations. . . Miscellaneous of individuals with . maintained by the files known Office of Security include lists or suspected foreign intelligence connec- with the handling of defectors (some of whom may now be U.S. citizens), lists of individuals from whom crank calls have been received by the Agency, and lists of persons previously charged with security violations. The Office of Security formerly maintained extensive computer lists of approximately 300,000 persons who had been arrested for offenses related to homosexuality, but these lists were destroyed in 1973. tions, files associated No was made by the Commission or its staff to personally reall of the thousands of security files and indices maintained on ('nited States citizens; spot checking was undertaken, however, on a effort view andom basis. 250 C. Office of Legislative Counsel The use in Office of Legislative Counsel maintains congressional files for its legislative liaison duties. These files are reestablished at the beginning of each new session of Congress files on retired or defeated members are transferred to the CIA record center. After five years, they are selectively purged. Generally, the files contain the following types of documents correspondence between the member and the CIA, excerpts from the Congressional Record dealing with the member, constituent employment or personnel requests forwarded to the Agency by the member, short biographies and political descriptions of the member, and copies of all foreign cables containing the name of the member. ; : Conclusions Although maintenance of most of the indices, files, and records of the Agency has been necessary and proper, the standards applied by the Agency at some points during its history have permitted the accumulation and indexing of materials not needed for legitimate intelligence or security purposes. Included in this category are files related to Operation CHAOS and the many of the activities of the Office of Security concerning dissident groups. Constant vigilance by the Agency is essential to prevent the collection of information on United States citizens which is not needed for proper intelligence activities. The Executive Order recommended by the Commission (Recommendation 2) will ensure purging of nonessential or improper materials from Agency files. Further, the Office of Security should establish (i) centralized responsibility to control the opening of new security files not routine in nature and (ii) specific criteria controlling the nature of materials to be collected. Chapter 19 Allegations Concerning the Assassination of President Kennedy made that the CIA participated in the President John F. Kennedy in Dallas, Texas, on Allegations have been assassination of November 22, 1963. Two have been advanced in that E. Howard Hunt and different theories support of those allegations. One theory is Frank Sturgis, on behalf of the CIA, personally participated in the assassination. The other is that the CIA had connections with Lee Harvey Oswald or Jack Ruby, or both of them, and that those connections somehow led to the assassination. The Commission staff has investigated these allegations. Neither the staff nor the Commission undertook a full review of Warren Commission. Such would have been outside the scope of the Executive Order establishing this Commission, and would have diverted the time of the Commission from its proper function. The investigation was limited to determining whether there was any credible evidence pointing to CIA involvement in the assassination of President Kennedy. the Report of the A. a task The Theory That Hunt and Sturgis Participated in the Assassination The first of the theories involves charges that E. Howard Hunt and Frank Sturgis, both convicted of burglarizing the Democratic National Committee headquarters at the Watergate in 1972, were CIA employees or agents at the time of the assassination of the President in 1963. It is further alleged that they were together in Dallas on the day of the assassination and that shortly after the assassination they were found in a railroad boxcar situated behind the "grassy knoll," an area located to the right front of the Presidential car at the time of the assassination. (251) 252 Under this theory. Hunt and Sturgis were allegedly in Dallas on November 22, 1963, and were taken into custody by the police, but without being booked, photographed or fingerprinted by the police although they were allegedly photographed by press photographers while they were being accompanied to the Dallas County Sheriff's office. It is further contended that the persons shown in these press photographs bear "striking resemblances" to photographs taken of Hunt w^ere mysteriously released — and Sturgis two amateur motion picture films of the assassination (Zapruder and Nix) are alleged to reveal the presin 1972. Portions of ence of several riflemen in the area of the grassy knoll. The Hunt-Sturgis theory on the assumption that at least one of the shots that struck President Kennedy was fired from the area of the grassy knoll, where Hunt and Sturgis were alleged to be present. The direction from which the shots came is claimed to be shown by the backward and leftward movement of President Kennedy's body almost immediately after being struck by that bullet. Taken together, these purported facts are cited as the basis for a possible conclusion also rests CIA personnel participated in the assassination of President; Kennedy, and, at least inferentially, that the CIA itself was involved. that The Commission staff investigated the several elements of this theory to the extent deemed necessary to assess fairly the allegation of CIA participation in the assassination. The findings of that investi-' w ofation follow, i Findings The Allegation that Hunt and Sturgis Were CIA Employees or Agents in 1963 E. Howard Hunt was an employee of the CIA in November 1963.) He had been an employee of the CIA for many years before that, andj 1. he continued to be associated Avith the CIA until his retirement in 197Q. Throughout 1963 he was assigned to duty in Washington, D.C., per- forming work relating to propaganda operations in foreign countries. His duties included travel to several other cities in the United States,! but not to any place in the South or Southwest. He lived with hisi family in the Washington, D.C., metropolitan area throughout thati year, and his children attended school there. Frank Sturgis was not an employee or agent of the CIA either in 1963 or at any other time. He so testified under oath himself, and a> search of CIA records failed to discover any evidence that he had ever been employed by the CIA or had ever served it as an agent, in-1 formant or other operative. Sturgis testified that he had been engaged in various "adventures'' relating to Cuba which he believed to have, been organized and financed by the CIA. He testified that he had given^ : 1 253 information, directly and indirectly, to federal government officials, who, he believed, were acting for the CIA. He further testified, however, that at no time did he engage in any activity having to do with the assassination of President Kennedy, on behalf of the CIA or otherwise. The Allegation That Hunt and Sturgis Were Together 2. Dallas on the Day in of the Assassination Hunt and Sturgis testified under oath to members of the Commission staff. They both denied that they were in Dallas on the day of the assassination. Hunt testified that he was in the Washington, D.C, metropolitan area throughout that day. and his testimony was supported by two of his children ^ and a former domestic employee of the Hunt family. Sturgis testified that he was in Miami, Florida, throughout the day of the assassination, and his testimony was supported by that of his wife and a nephew of his wife. living with the Sturgis family, is now The nephew, who was then a practicing attorney in the Midwest. With all Hunt Hunt and the exception of the domestic employee of the witnesses directly supporting the presence of family, Sturgis Washington. D.C. and Miami, Florida, on the day of the assassination are family members or relatives. Less Aveight can be assigned in testimony of such interested witnesses if there is substantial evidence to the contrary. In the absence of substantial conflicting evi- to the however, the testimony of family members cannot be disregarded. '^dence, Hunt had never met Frank Sturgis before they were introduced by Bernard Barker in Miami in 1972. Sturgis testified to the same effect, except that he did not recall whether the introduction had taken place in late 1971 or early 1972. Sturgis further testified that while he had often heard of "Eduardo," a CIA political officer who had been active in the work of the Cuban Revolutionary Council in Miami prior to the Bay of Pigs operation in April 1961. he had never met him and did not know until 1971 or 1972 that "Eduardo" was E. Howard Hunt. Sturgis had also been active in anti-Castro groups in the ]Miami area before, during and after Hunt's testifies that he assignment on the political aspects of the Bay and early 1961. Other testimony linked Hunt to Sturgis of Pigs project in 1960 at a date earlier than One witness asserted that Sturgis is a pseudonym that his name is Frank Fiorini; and that he took the name Sturgis from a fictional character (Hank Sturgis) in a novel written by Hunt in 1971. ; ^ A son who was nine years old at the time could not recall whether his parents were present or absent that day the fourth (and youngest) Hunt child was not born then. Mrs. Hunt is now deceased. ; 254 name at birth was Frank Angelo Fiorini that his mother's maiden name was Mary Vona that his father's name was Angelo Anthony Fiorini that his parents w^ere divorced when he was a child that his mother subsequently remarried a man named Kalph Sturgis; and that at his mother's urging he legally changed his name in Norfolk, Virginia, sometime in the 1950's, to take the last name of his stepfather. 1949. {Bimini Bun) Sturgis testified . that his ; ; ; ; A search of the relevant court records disclosed that a petition was filed on September 23, 1952, in the Circuit Court of the City of Norfolk (Virginia) pursuant to wdiich a Frank Angelo Fiorino petitioned change his name to Frank Anthony Sturgis. The petition recited that his mother had divorced his father about 15 years previously and had married one Ralph Sturgis, that he had been living with his mother all of his life, that his mother was known as Mary Sturgis, and that his stepfather also desired him to change his name to Sturgis. An order of the Court was entered on September 23, 1952 (the same date as the petition) changing his name to Frank Anthony Sturgis. The order appears in the records of the Circuit Court of the City of Norfolk, Virginia. In the petition and the order relating to the change of name, Fiorini was misspelled as Fiorino. In the light of this documentary evidence, no weight can be given to to the claim that Sturgis took his present a Hunt novel — or that the name from name change was a character in associated in any way with Sturgis' knowing Hunt before 1971 or 1972. The personnel, payroll and travel records of the CIA were checked with respect to E. Howard Hunt. Daily attendance records for the period are no longer available because they are destroyed in the ordinary course of the Agency's records disposal system three years after completion of the audit for each year. What records remain, including annual leave, sick leave, and travel records, disclose that Hunt had no out-of-town travel associated with his employment in the month of November 1963. He used no annual leave and eleven hours of sick leave in the two-week pay period ending November 23, 1963. The exact date or dates on which tlie sick leave was taken could not be some indication, however, that some of these eleven hours of sick leave may have been taken by Hunt on November 22, 1963. He testified that, on the afternoon of that day, he was in the company of his wife and family in the Washington, D.C., area, rather than at his employment duties. That was a Friday, and therefore a working day for employees at the CIA. Hunt could not recall whether he was on duty with the CIA on the morning of that day. Because Sturgis was never an agent or employee of the CIA, the Agency has no personnel, payroll, leave or travel records relating to ascertained. him. There is * 255 In examining the charge that Hunt and Stiirgis were together in Dallas on the day of the assassination, the investigators were handicapped by the fact that the allegation was first made in 1974, more than ten years after the assassination. Evidence which might have been available at an earlier time was no longer available. Contacts with relatives, friends, neighbors or fellow employees (who might have known of the whereabouts of Hunt and Sturgis on that particular day) could not be recalled. Some of these persons are now dead. Finally, records which might have been the source of relevant information no longer exist. determined with certainty where Hunt and Sturgis actually were on the day of the assassination. However, no credible evidence was found which would contradict their testimony that they were It cannot be in 3. Washington, D.C., and Miami, Florida, respectively. The Allegation That Hunt and Sturgis Were Found Near the Scene of the Assassination and Taken to the Dallas County Sheriff's Office This allegation is based upon a purported resemblance between Hunt and Sturgis, on the one hand, and two persons who were briefly taken into custody in Dallas following the assassination. The shooting of President Kennedy occurred at about 12:30 p.m., Dallas time, on November 22, 1963, while the Presidential motorcade was passing Dealey Plaza as it headed generally westward on Elm Street. Witnesses to the shooting gave the police varying accounts of where they thought the shots had come from. On the basis of the sound of the shots, some believed that they had come from the Texas School Book Depository building (TSBD) which was behind and slightly to the right of President Kennedy when he was hit. Others thought the shots had come from other directions. Law enforcement officials understandably conducted a widespread search for evidence relating to the , assassination. Several hours after the shooting, partment checked all officers of the Dallas Police De- railroad freight cars situated on tracks anywhere Dealey Plaza. About six or eight persons, referred to as "derelicts," were found in or near the freight cars. These persons were taken either to the nearby Dallas County Sheriff's office, or to the; Dallas Police Department, for questioning. All were released without any arrest record being made, or any fingerprinting or photographing being done by the authorities. Among the six or eight "derelicts" found in the vicinity of the freight cars were three men who, according to the aiTesting officers, were found in a boxcar about one-half mile south of the scene of the assassination. They were taken to the Sheriff's office by the Dallas in the vicinity of 256 who walked northward alongi: the railroad tracks to a west of the Texas School Book Depository, then north to police officers, point Houston Street and back south to the Sheriff's office. This somewhat circuitous route was actually the most convenient one available, according to the Dallas policemen. As the police and the "derelicts" passed the TSBD building and headed for the Sheriff's office, they were photographed by several press photographers on the scene. Copies of five of the pliotographs showing the "derelicts" were submitted to the Commission's staff as evidence. witness who volunteered his testimony stated on the basis of hearsay that the three "derelicts" in question were found in a box- A car situated to the near northwest of the assassination scene, which would have been to the right front of the Presidential car at the time of the shooting. Between the area in which that boxcar was claimed by this witness to be located and that part of Elm Street where the assassination occurred was a "grassy knoll." It was alleged by other witnesses (who were associated with the first witness and who also volunteered testimony) that a bullet fired from the area of that "grassy knoll" struck President Kennedy in the head. It was also claimed by the same witnesses that one of the three photographed "derelicts" bears a "striking" facial resemblance to E. Howard Hunt and that another of them bears a "striking" facial resemblance to Frank Sturgis. Finally, it was alleged that if those two "derelicts" were, in fact, Hunt and Sturgis, and if the President was in fact struck by a bullet fired from his right front, the CIA would be shown to be implicated in the killing of President Kennedy. The photographs of the "derelicts" in Dallas have been compared with numerous known photographs of Hunt and Sturgis taken both before and after November 22, 1963. Even to non-experts it appeared that there was, at best, only a superficial resemblance between the Dallas "derelicts" and Hunt and Sturgis. The "derelict" allegedly resembling Hunt appeared to be substantially older and smaller than. Hunt. The "derelict" allegedly resembling Sturgis appeared to be thinner than Sturgis and to have facial features and hair markedly different The from those of Sturgis. who testified to the "striking resemblance" between and Hunt and Sturgis were not shown to liave any witnesses the "derelicts" beyond that possessed by the average layman. Their testimony appears to have been based on a comparison of the 196.3 photographs of the "derelicts" with a single 1972 photograph of Sturgis and two 1972 photographs of Hunt. Over fifty photographs taken of Hunt and Sturgis both before and after November 22, 1963, were submitted to the FBI photographic laboratory for a comparison with all known photographs of the "derelicts." (The FBI assembled a complete set of all photographs of qualifications in photo identification 257 the "derelicts" taken by the three photoo:raphers photofjraphecl them.) Lynda 1 known to have The comparison was made by FBI Agent L. Shaneyfelt, a nationally-recognized expert in photo identi- and photo analysis. The report of Agent Shaneyfelt, embodied in a Report of the FBI Laboratory, dated April 21, 1975. and signed by Clarence M. Kelley, fication Director of the FBI, concluded that ''neither E. Howard Hunt nor Frank Sturgis appear as any of the three 'derelicts' arrested in Dallas, Texas, as shown in the photographs submitted." With respect to Hunt, it was found that he had a much younger appearance, a smooth and tightly contoured chin, and a more angular or i^ointed chin, compared with the "derelict" in question. The latter was much older, had a chin with protruding pouches and a more bulbous nose. With respect to Sturgis, even more distinguishing characteristics were observed. Sturgis looked like a Latin, whereas the "derelict" had the general appearance of a Nordic. Sturgis had very black, wavy hair and the "derelict" had light or blond and straighter hair. Sturgis had a rather round face with square chin lines; the "derelict" had an oval face with a more rounded chin. Sturgis and the "derelict" had markedly different ratios between the length of their noses and the height of their foreheads. They also had different ear and — nose contours. Hunt approximately five feet nine inches tall, and Sturgis is approximately five feet eleven inches tall. The FBI laboratory made an on-site study in Dallas, using the cameras with which the photographs of the "derelicts" were originally taken it concluded from the study that the "derelict" allegedly resembling Hunt was about five feet, seven inches tall, and that the "derelict*" allegedly resembling Sturgis was about six feet two inches tall, with a one inch margin for error in each direction. The difference between the height of the two "derelicts" was therefore about seven inches, while the difference between Hunt's height and that of Sturgis is only about two inches. The photographs of the "derelicts" in Dallas have been displayed in various newspapers in the Ignited States, on national television programs, and in the April 28, 1975, issue of Newsweek magazine. But no witnesses have provided testimony that either of the "derelicts" was personally known to be Hunt or Sturgis and no qualified expert was offered to make such an identification. is ; — 4. The Allegation That President Kennedy Was Struck Head by a Bullet Fired in the From His Right Front The witnesses who presented evidence they believed sufficient to implicate the CIA in the assassination of President Kennedy j^laced 258 much stress upon the movements of the President's body associated with the head wound that killed the President. Particular attention was called to the Zapruder film, and especially Frame 312 and the succeeding frames of that film. It was urged that the movements of the President's head and body immediately following the head wound evidenced in Frame 313 established that the President was struck — from the right front of the Presidential car the direction of the grassy knoll and the freight car in Avhich "Hunt" and "Sturgis" were allegedly found. By Frame 312 of the Zapruder film, President Kennedy had already been Avounded by a bullet which had struck him in the region of his neck. His body is shown to be facing generally toward the front of the Presidential car. He is leaning toward the left. His head is turned somewhat toward the left front, and it is facing downward toward the floor in the rear portion of the car. His chin appears to be close by a bullet fired to his chest. At Frame 313 of the Zapruder film, the President has been struck by the bullet that killed him, and his head has moved forward noticeably. At Frame 314 (which is about 1/18 of a second later) his head is already moving backward. Succeeding frames of the film show a rapid backward movement of the President's head and upper body, and at the same time his head and body are shown to be turning toward his left. Still later frames show the President's body collapsing onto the back seat of the car. The evidence presented to the Warren Commission revealed that the speed of the Zapruder motion picture camera Avas 18.3 frames per second. If the film is projected at that speed, the forAvard Frame 313 is not other hand, such forward movement is of the President's head from perceived. On the upon careful measurement of It is movement Frame 312 still to readily eAddent projections of the relevant frames. very short, both in distance and duration. The backAvard move- ment and the turning of the President's head toAvard the left are rapid, pronounced and readily apparent during a running of the film at either normal or sIoav speed. It Avas claimed that the movement of the President's head and body backAvard and to the left is consistent only Avith a shot having come from the right front of the Presidential car that is, from the direc- — tion of the grassy knoll. Medical and ballistics experts AA-ere consulted. Also considered Avere (1) the autopsy report on the body of President Kennedy, and (2) the report of a panel of medical experts avIio, in February 1968, at the request of Attorney General Eamsey Clark, reviewed the autopsy report and the autopsy photographs, x-ray films, motion picture : 259 films of the assassination, the clothing worn by President Kennedy and other relevant materials. The autopsy repoit of James J. Humes, M.D., J. Thornton Boswell, M.D., and Pierre A. Finck, M.D., described the President's head Avounds as follows: Tli-e tal fatal wound entered protuberance. A the skull above and to the right of the external occipi- portion of tlie projectile traversed the cranial cavity in a posterior-anterior direction (see lateral skull roentgenograms) depositing minute particles along its path. A portion of the projectile made its exit through the it portions of tlie cerebrum, skull and combined with the force of the missile pro- parietal bone on the right carrying with scalp. The two wounds of the skull duced t^xtensive fragmentation of the skull, laceration of the superior sagittal and of the riglit cerebral hemisphere. sinus, In February 1968, a panel of physicians met in Washington. D.C., at the request of Attorney General Ramsey Clark, to examine the autopsy report, the autopsy photographs and x-rays, the Zapruder, Nix and Muchmore motion picture films of the assassination, and various other evidence pertaining to the death of President Kennedy. Each of the four physicians constituting the panel had been nominated by a prominent person who was not in the employment of the federal government. They were: William H. Carnes, M.D.. Professor of Pathology, University of Utah, Salt Lake City, Utah INIember of Medical Examiner's Commission, State of Utah. Nominated by Dr. J. E. Wallace Sterling, President of Stanford ITniversity. Russel S. Fisher. M.D., Professor of Forensic Pathology, University of Maryland and Chief iSIedical Examiner of the State of Maryland, Baltimore. Maryland. Nominated by Dr. Oscar B. Hunter, Jr., President of the College of American Pathologists. Russel H. Morgan, ]M.D.. Professor of Radiology, School of Medicine, and Professor of Radiological Science, School of Hygiene and Public Health. The Johns Hopkins University, Baltimore, Maryland. Nominated by Dr. Lincoln Gordon, President of The Johns Hopkins University. ; ; Alan R. Moritz, M.D.. Professor of Pathology, Case Western Reserve University, Cleveland. Ohio; and former Professor of Forensic Medicine, Harvard ITniversity. Nominated by Dr. John A. Hannah, President of Michigan State ITniversity. After reviewing the autopsy photographs, and making their findings concerning them, the Panel said in its report These findings indicate that the back of the head was struck by a single bullet traveling at high velocity, the major portion of wliich passed through the right cerebral hemisphere, and which produced an explosive type of fragmentation of the skull and laceration of the scalp. The appearance of the entrance wound : : 260 in the scalp is consistent with its having been produced by a bullet similar to CE that of Exhibit 399.' After a review of the autopsy x-rays, the Panel's report states The foregoing observations indicate that the decedent's head was struck from behind by a single projectile. It entered the occipital region 25 mm. to the right of the midline and 100 mm. above the external occipital protuberance. The projectile fragmented on entering the skull, one major section leaving a trail of fine metallic debris as it passed forward and laterally to explosively fracture the right frontal and parietal bones as it emerged from the head. The Panel discussed its findings as follows The decedent was wounded by two bullets both of which entered his body from behind. One back of the decedent's head well above the external ocBased upon the observation that he was leaning forward bullet struck the cipital protuberance. with his head turned obliquely to the left when this bullet struck, the photographs and x-rays indicate that it came from a site above and slightly to his right. The absence of metallic fragments in the left cerebral hemisphere or below the on the right side together with the absence of any holes in the skull to the left of the midline or in its base and the absence of any penetrating injury of the left hemisphere eliminate with reasonable certainty the possibility of a projectile having passed through the head in any direction other than from back to front as described in preceding sections of this report. level of the frontal fosse Certain other evidence relating to the source of the bullets that struck President a. The b. No Kennedy was noted. This included the following: found in the Presidential car which were large enough to bear ballistics marks were determined by the FBI to have been fired by the Oswald rifle found on the sixth floor of the Texas School Book Depository building, and not from any other weapon. CE 399 was also fired from that rifle. damage bullet fragments physical evidence, such as a rifle, shell casings, bullets, or was ever found which would support a theory that one or more shots were fired from a direction other than from behind and above the President. c. Most eyewitnesses testified that three shots were fired. Three to the Presidential car, were found near the window at tlie southeast corner of the sixth floor of the Texas School Book Depository building, and all of them were determined by the FBI to have been fired by the Oswald rifle to the exclusion of any other weapon. That window was also the one in which a man firing a rifle was seen by witnesses who testified before the Warren Commission. The shell casings ' CE 399 was Warren Commission Exhibit 399, a nearly wliole bullet found in Parkland Memorial Hospital in Dallas on the day of the assassination. It was established by ballistics experts as havinp been fired by the rifle found on the sixth floor of the TSBD building and found by the Warren Commission to have belonged to Lee Harvey Oswald. The Warren Commission determined that bullet passed through President Kennedy's neck and then struck Governor Connally, who was sitting directly in front of President Kennedy, and who was taken to Parkland Hospital. 261 was found on the sixth floor of the TSBD building within an hour after the assassination. d. No witness at the scene was found who saw any other assassin, or who saw anyone firing, or disposing of a weapon in any other location, or who heard the bolt of a rifle being operated at any other location. Three TSBD employees testified before the Warren Commission that they had been watching the motorcade from open windows near the southeast corner of the fifth floor of the TSBD building. One of them testified that he heard not only the three shots, but also the sound above him of a rifle bolt in action and the sound of empty shells hitting the floor. All three of them testified that "debris" fell down from above them at the time of the shots, and that they talked to each other at that time about the shots having come from above them. e. A shot fired from the direct front of the Presidential car can be ruled out. Such a bullet would have had to pass through the windshield of the car unless fired from above the overpass just ahead of the Presidential car. There were no holes in the windshield, and the overpass was guarded by two policemen in the presence of some fifteen railroad employees. None of them saw or heard any shooting take place from the overpass. Nonetheless, a re-examination was made of the question whether the movements of the President's head and body following the fatal shot are consistent with the President being struck from (a) the rear, (b) the right front, or (c) both the rear and the right front. The Zapruder, Nix and Muchmore films, a set of all relevant color slides of the Zapruder film, the autopsy photographs and x-rays, the President's clothing and back brace, the bullet and bullet fragments recovered, and various other materials, were reviewed at the request of the Commission staff by a panel of experts consisting of: Lieutenant Colonel Robert R. McMeekin, MC, USA; Chief, Oswald rifle Division of Aerospace Patholog}', Armed Forces Institute of Pathology, Washington, D.C. Richard Lindenberg, M.D., Director of Neuropathology & Legal Medicine, Department of Mental Health, Stare of Maryland, Baltimore, Maryland. Werner U. Spitz, M.D., Chief Medical Examiner, Wayne County, Detroit, ]\Iichigan. Fred J. Hodges III, ISI.D., Professor of Radiology, The Johns Hopkins School of Medicine, Baltimore, Maryland. 262 Alfred G. Olivier, V.M.D.. Director, Department of Biophysics, Biomedical Laboratories, Edge wood Arsenal, Aberdeen Proving Grounds, ]Maryland.^ The Panel members separately submitted their respective conclusions. They were unanimous in finding that the President was struck by only two bullets, both of which were fired from the rear, and that there is no medical evidence to support a contention that the President was struck by any bullet coming from any other direction. They were also unanimous in finding that the violent backward and leftward motion of the President's upj)er body following the head shot was not caused by the impact of a bullet coming from the front or right front. Hodges reported that such a motion would be caused by a violent straightening and stiffening of the entire body as a result of a seizure-like neuromuscular reaction to major damDrs. Spitz, Lindenberg and age inflicted to nerve centers in the brain. Dr. Olivier reported that experiments which have been conducted at Edgewood Arsenal disclosed that goats shot through the brain evidenced just such a violent neuromuscular reaction. There was a convulsive stiffening and extension of their legs to front and rear, commencing forty milliseconds (1/25 of a second) after the bullet entered the brain. In the past two decades. Dr. Olivier and his associates have conducted extensive tests on the effects of high velocity bullets fired into live animals, using high speed ])hotography to record the results. Dr. Olivier reported that the violent motions of the President's body following the head shot could not possibly have been caused by the impact of the bullet. He attributed the popular misconception on this subject to the dramatic effects employed in television and motion picture productions. The impact of such a bullet, he explained, can cause some immediate movement of the head in the direction of the bullet, but it would not produce any significant movement of the hody. He also explained that a head wound such as that sustained by President Kennedy produces an "explosion'' of tissue at the area where the bullet exits from the head, causing a "jet effect" which almost instantly moves the head back in the direction from which the bullet came. 3 Dt. McMeekln is a forensic pathologist who has done extensive studies In the field of accident reconstruction, utilizing computer-assisted analysis of the reactions of human body components to the application of various forces. Dr. Lindenberg is a prominent authority in the field of neuropathology, i.e., the pathology of the brain and nervous system. Dr. Spitz is a forensic pathologist who has had extensive experience with gunshot wounds and is an editor of a textbook on forensic pathology. Dr. Hodges is a specialist In radiology and surgery associated with the brain and nervous system. In 1973-1974 he served as Tresident American Society of Neuroradiology. Dr. Olivier has conducted numerous experiments study the effects on animals and humans of penetrating wounds from high velocity bullets. Drs. Spitz, Lindenberg and Hodges hold faculty positions in the Medical Schools of Wayne State University, the University of Maryland, and The Johns Hopkins University, of the to respectively. 263 Drs. Olivier and McMeekin, utilizing enlargement of the film and an accurate measuring device, made measurements President's head associated with the head shot. interval between of the movement of the They found that in the Zapruder Frames 312 and 313, the President's head moved forward significantly; at Frame 314 (1/18 of a second later) was already moving backward and it continued to move backward it in the succeeding frames. Dr. Olivier was of the opinion that the start of the backward movement resulted from both a neuromuscular reaction and a "jet effect'' from the explosion at the right front of the head where the bullet exited. Thereafter, the violent backward and leftward movement of the upper body, he believes, was a continuing result of the neuromuscular reaction. Dr. McMeekin's report to the Commission contained no leference to the subject of a "jet ejffect." Dr. Olivier credited Dr. Luis Alvarez with originating studies into the "jet effect'- prcKluced by high velocity bullets fired into the head. Nobel Prize-winning physicist at the Lawrence Berkeley Laboratories, University of California at Berkeley. An article describing his experiments is soon to be published. Dr. John K. Lattimer of New York and Dr. Cyril H. Wecht of Pittsburgh were also interviewed. Each of them has studied in detail the autopsy photographs, x-rays, and other materials, as well as the motion pictures of the assassination, and has published the results of his Dr. Alvarez is a lindings. Lattimer testified that there was no medical evidence to support a theory that the President had been hit by a bullet from any direction other than from the rear and above. The medical evidence showed that the President had not been hit from the front or right front. Had a second and nearly simultaneous bullet from the front or right front hit tlie President's head after Frame 313 of the Zapruder film, it would either have encountered no skull (in which case it would have passed through the brain and exited elsewhere) or it would have struck the skull. In either case, it would have left evidence which would be revealed by the autopsy photographs and x-rays. Dr. Lattimer also testified that he has performed experiments to test both the damage effects of a bullet fii-ed into the rear of the head (in the precise area where the President was hit) and the principle of the "jet effect."' He utilized a Mannlicher-Carcano 6.5 millimeter rifle of the same model as the one found by the Warren Commission to belong to Lee Harvey Oswald, and ammunition from the same maiuifacturer and lot number as that found to have been used by Oswald. The results, he said, confirmed both the head injuries shown in th.e autopsy photogi-aphs and x-rays and the principle of the "jetert'ect." Dr. Lattimer presented to the Commission staff as evidence a Dr. 264 and jiiotion picture film still photographs showing the results of his experiments. Dr. Wecht testified that the available evidence all points to the President being struck only by two bullets coming from his rear, and that no support can be found for theories which postulate gunmen to the front or right front of the Presidential car. Wecht and an associate, an article testimony, Dr. Wecht stated that "if In a 1974 article written by Dr. which was made an exhibit to his any other bullet struck the President's head, whether before, after, or simultaneously with the knoAvn shot, there is no evidence for it in the available autopsy materials." He testified that on the autopsy photographs of the back of the President's head, there was something above the hairline which he could not identify at all, and he thought it was l)0ssible that this was an exit wound. He stated that the other autopsy photographs and the autopsy x-rays provided no support to that possibility, but he thought it was possible that the physicians who performed the autopsy could have missed finding such a wound. Dr. Wecht said that there was some question about the backward and leftwai'd movement of the President's head and upper body after Frame 818, but he also said that a neuromuscular reaction could occur within about one-tenth of a second. The Commission by telephone Dr. E. Forrest Chapman of Michigan, the only other physician who is known to have studied the autopsy photographs and x-rays. Dr. Chapman declared that if there were any assassins firing at the President from the grassy knoll, "they must have been very poor shots because they stafl' also interviewed didn't hit anything.'' No witness who urged the view that the Zapruder and other motion Kennedy was struck by a bullet was shown to possess any professional or picture films jjroved that President from fired his right front other special qualifications on the subject. On the basis of the investigation conducted by its staff, the Com- no evidence to support the claim that President Kennedy was struck by a bullet fired from either the grassy knoll or any othei- position to his front, right front or right side, and that the motions of the President's head and body, following mission believes that there is him in the head, are fully consistent with that having come from a point to his rear, above him and slightly to the shot that struck shot his right. 5. The Allegation That Assassins (Allegedly Including "Hunt" and "Sturgis") Are Revealed by the Zapruder and Nix Films To Be Present in the Area of the Grassy Knoll In further support of his contention that shots were fired at President Kennedy from the grassy knoll and inferentially by "Hunt" — I — 265 and "Stur<>is"' — a witness called attention to certain frames of motion pictnre films taken at the time of the assassination. these frames, including Frames 41H and 454-478 of He asserred that the Zapruder film, reveal the presence of other "assassins'' bearing rifles in the area of the grassy knoll. The Zapruder and Nix films have been carefully re\iewed. Frames alleged to reveal the presence of assassins in the area of the grassy have received particularly close attention, together with those frames immediately preceding them and immediately following them. In addition, the Commission has had the benefit of a study of these films by the photographic laboratory of the FBI. and a report on that knoll study. member's who reviewed the films were of the opinion that the images allegedly representing assassins are far too vague to be identifiable even as human beings. For example. The Commission Zapruder Frames statf and which have tree foliage in the foreground, show combinations of light and shadow along their loweimargins which are varyingly shaped somewhat in the foini of a rain hat or a 41'2. 418, 414, German army helmet of World Wai- II vintage. In Frames 411 and 415, however, the contouis of the shadows are markedly different and bear no resemblance to a human head with or without a rain hat or helmet. Since each frame of the film is only about 1/18 of a second removed in time from its adjacent frame, it was not believed reasonable to postu- head would come into view, and then disappear, directly in front of the Zapiiider camera, in the space of about 14 of a second (the elapsed time between Frames 411 and 415), or that the shape of a head would change so rapidly and markedly. The conclusion was that the alleged assassin's head was merely the momentary image produced by sunlight, shadows, and leaves within or beyond the foliage. The same was true of the "rifle'' allegedly in late that an is Frame Even make out frame required imagination and evidence in in that assassin's 418. to — the i-ough image of a rifle in the adjacent frames, it nowhere in evidence. From the extensive photographic work done in connection with the Warren Commission investigation, the FBI has a substantial library of both its own photographs and copies of the photographs and motion pictures of others taken at the assassination scene. The place wliere Abraham Zapruder Avas standing when he took (He was stand- famous motion picture has been established. ing on a concrete wall elevated approximately four feet, two inches above the gr-ound to his front.) Based upon an analysis of the direction in which the Zapruder camera was facing at Frame 418, the FBI Laboratory was able to identify from othei- photogi-aphs his 2G6 the exact tree FBI shown in that frame. With the aid of reports from the was conchided that: (1) The tree was between 6 feet and 61/^ feet high (2) it was barren of any branches or leaves to a height of about 4 feet to 41^ feet above the ground; (3) its foliage was about 2 feet high and 4 feet wide; (4) the near side of its foliage was about five feet directly in front of Mr. Zapruder's legs; (5) its trunk was only a few inches in diameter; (6) only the top of the tree came within view of the Zapruder camera; (7) it was the only tree in the immediate vicinity; (cS) a human head (even without a helmet) 5 feet in front of Mr. Zapruder woukl have occupied about one-half Laboratory, it ; of the total area of Frame 418 (many times much as as is occupied by the image of the alleged assassin's head) and (9) it is not reasonable to postulate an assassin in or behind that tree. An assassin would be unlikely to hide himself behind the barren trunk of a tree only a few inches in diameter, with only his head and shoulders behind the foliage, and with his whole person almost within arm's length in front of a spectator taking movies of the motorcade. Neither would such an assassin go unseen and undiscovered, able to make his escape over open ground with a rifle in hand, again unseen by anyone among the numerous motorcade police, spectators and Secret ; Service personnel present. A photograph of the tree in question, taken on May 24, 1964 (about six months after the assassination), was made a part of the FBI Laboratory Report. It was marked to show the place where Zapruder was standing as he took his motion picture. The FBI photography laboratory was also able to identify the tree in question on some of the frames of the Nix film, which was also being taken at the time of the assassination. An examination of those frames of the Nix film reveals that there was nobody in or behind that tree. Also made a part of the FBI Laboratory Report was a series of frames frojn the Nix film, with the tree in question, Mr. Zapruder, and the alleged positions of "assassins" sej^arately marked. A similar examination was made by the FBI photography laboratory of othei- frames of the Zapruder and Nix films alleged to reveal assassins in the area of the grassy knoll. Frames 454 through 478 of the Zapruder film were found to reveal no formation "identifiable as a human being or an assassin with a rifle or other weapon." With respect to the Nix film, the FBI reported that "no figure of a human being could be found in the area" of another alleged rifleman, which was determined to be "approximately nineteen feet to the right of where Mr. Zapruder was standing and clearly visible to him." The FBI concluded that the configuration described as a rifleman was actually produced by some "clump type shrubbery'' in the background. On the basis of its staft' investigation, the Commission believes that there is no credible basis in fact for the claim that any of the known clear 267 motion pictures relating to the assassination of President Kennedy reveals the presence of an assassin or assassins in the area of the grassy knoll. B. The Theory That the CIA Had Relationships With Lee Harvey Oswald and Jack Ruby The second theory advanced in support of allegations of ticipation in the assassination of President Kennedy is CIA par- that various between the CIA, Oswald and Ruby. Lee Harvey Oswald was found by the Warren Commission to be the person who assassinated the President. Jack Ruby shot and killed Oswald two days after links existed the President's assassination. There is no credible evidence that either Lee Harvey Oswald or Jack Ruby was ever employed by the CIA or ever acted for the CIA in any capacity whatever, either directly or indirectly. Testimony was offered purporting to show CIA relationships with Oswald and Ruby. It was stated, for example, that E. Howard Hunt, as an employee of the CIA, engaged in political activity with elements of the anti-Castro Cuban community in the United States on behalf of the CIA prior to the Bay of Pigs operation in April 1961. In connection with those duties, it was further alleged that Hunt was instrumental in organizing the Cuban Revolutionary Council and that the Cuban Revolutionary Council had an office in New Orleans. Finally, it was claimed that Lee Harvey Oswald lived in New Orleans from April to September 1963, and that a pamphlet prepared and distributed by Oswald on behalf of the Fair Play for Cuba Committee during that period indicated that the office of the Fair Play for Cuba Committee was situated in a building which was also the address of the New Orleans office of the Cuban Revolutionary Council.* was therefore implied that Hunt could have had contact with Lee Harvey Oswald in New Orleans during the spring or summer of 1963. No evidence was presented that Hunt ever met Oswald, or that he was ever in New Orleans in 1963, or that he had any contact with any New Orleans office of the Cuban Revolutionary Council. Hunt's employment record with the CIA indicated that he had It no duties involving contacts with Cuban exile elements or organizaEach of these statements Is substantially true, but manj- other relevant facts disclosed Warren Commission Report are omitted. It Is not mentioned, for example, that Oswald made up the Fair Play for Cuba Committee pamphlets that the address he stamped on the pamphlets was never an oflSce of that Committee that he fabricated a non-existent New Orleans Chapter of the Committee, a non-existent President of that Committee, and a nonexistent office for it that the building in question was a former office, rather than a current ofBce, of an anti-Castro organization when Oswald made up his pamphlets, and that Oswald < in the ; : ; had tried to infiltrate the anti-Castro organization. 268 United States after the early months of 1961. This was more than two years before Oswald went to New Orleans in April 1963 and more than a year before Oswald returned to the United States from the Soviet Union, where he had lived for tions inside or outside the almost thi'ee years. An example of the testimony relating to an alleged relationship between the CIA and Jack Ruby consisted of a statement that Frank Sturgis was engaged in a series of revolutionary activities among Cuban exiles in the ITnited States in the 1950's and 1960's and that the CIA also sponsored and organized anti-Castro activities among Cuban exiles in the United States in 1959 and the early 1960's. It was further stated that someone once reported to the FBI that Jack Ruby had engaged in supplying arms to persons in Cuba in the early 1950's in association with a former Cuban President, Carlos Prio, and that Frank Sturgis also had connections with Carlos Prio during the 1950's and 1960's. In addition, it was alleged that Frank Sturgis was at one time (before he escaped from Cuba in June 1959) a director of gambling and gaming establishments in Havana for the Castro government, and that in August or September, 1959, Jack Ruby made a trip to Havana at the invitation of a friend who had interests in gambling establishments in Cuba and the ITnited States. Moreover, both Sturgis and Ruby were alleged to have had connections with underground figures who had interests in the United States and Cuba. From this group of allegations, the witness inferred that Sturgis and Ruby could have met and known each other although no actual evidence was presented to show that Ruby or Sturgis ever met each "^ — other. Even if the individual items contained in the foregoing recitations were assumed to be true, it was concluded that the inferences drawn must be considei-ed farfetched speculation insofar as they purport to show a connection between the CIA and either Oswald or Ruby. Even in the absence of denials by living pei-sons that such connections existed, no weight could be assigned to such testimony. Moreover, Sturgis was never an employee or agent of the CIA. A witness, a telephone caller, and a mail correspondent tendered additional information of the same nature. None of it was more than a strained effort to draw inferences of conspiracy from facts which would not fairly support the inferences. A CIA involvement in the assassination was implied by the witness, for example, from the fact that the Mayor of Dallas at that time was a brother of a CIA official who had been involved in the planning of the Bay of Pigs operation • 269 Cuba several years previously, and from the fact that President Kennedy reportedly blamed the CIA for the Bay of Pigs failure. The same witness testified that E. Howard Hunt was Acting Chief ill CIA Mexico City implying that he could have had contact with Oswald when Oswald visited Mexico City in September 1968. Hunt's service in Mexico City, however, was twelve years earlier in 1950 and 1951 and his only other CIA duty in Mexico covered only a few weeks in 1960. At no time was he ever the Chief, or Acting Chief, of a CIA station in Mexico City. Hunt and Sturgis categorically denied that they had ever met or know^n Oswald or Ruby. They further denied that they ever had any connection whatever with either Oswald or Ruby. of a station in — in 1963, — Conclusions Numerous made that the CIA participated President John F. Kennedy. The Commission allegations have been in the assassination of staff investigated these allegations. gation, the O the basis of the staff's investi- Commission concluded there was no credible evidence of any CIA involvement. 577-475 On - 75 - 18 : Appendix : I Executive Order ESTABLISHING A COMMISSION ON CIA ACTIVITIES WITHIN THE UNITED STATES The Central Intelligence Agency as created by the National Security Act of 1947 fulfills intelligence functions vital to the security of our nation, and many of its activities must necessarily be carried out in secrecy. Such activities are nevertheless subject to statutory limitations. I have determined that in order to ensure scrupulous compliance with these statutory limitations, while fully recognizing the statutory missions of the Agency, it is advisable to establish a Commission on CIA Activities Within the United States. NOW, THEREFORE, by virtue of the authority vested in me by the Constitution and statutes of the United States, and as President of the United States, I hereby order as follows Section 1. Estahllshment of the Caimnwsioii. There is hereby established a Commission on CIA Activities Within the United States (hereinafter referred to as the ''Commission''), to be composed of a Chairman and other members to be appointed by the President. Section 2. Functions of the Commission. The Commission shall (a) Ascertain and evaluate any facts relating to activities conducted within the United States by the Central Intelligence Agency which give rise to questions of compliance with the provisions of 50 U.S.C. ' 403; Determine whether existing safeguards are adequate to prevent any activities which violate the provisions of 50 U.S.C. 403; (c) Make such recommendations to the President and to the Director of Central Intelligence as the Commission deems appropriate. Section 3. C ooperation hy and with Executive Departments and Agencies. The Commission is authorized to request, at the direction of the ChaiiTnan, from any executive department or agency, any information and assistance deemed necessary to carry out its functions (b) (271) 272 under this order. Each department or agency shall furnish such information and assistance to the Commission, to the extent permitted by law. The Commission shall furnish to the Attorney General any evidence found by the Commission which may relate to offenses under the statutes of the United States. Section. 4. Compensation., Personnel and Finance. (a) Each member of the Commission may receive compensation for each day he or she is engaged upon the work of the Commission at not to exceed the daily rate now or hereafter prescribed by law for persons and positions in GS-18, as authorized by law and may also receive travel expenses, including per diem in lieu of subsistence, as authorized by law (5 U.S.C. 5703) for persons in the government service intermittently employed. (b) The Commission shall have an Executive Director who shall be designated by the President and shall receive such compensation as may hereafter be specified. The Commission is authorized to appoint and fix the compensation of such other personnel as may be necessary to enable it to carry out its functions, and is authorized to obtain services in accordance with the provisions of 5 U.S.C. 3109. (c) All necessary expenses incurred in connection with the work of the Commission shall be paid from the appropriation for "Unanticipated Personnel Needs" P.L. 93-331, 88 Stat. 617, or from such other funds as may be available. Section 5. Administrative Services. The General Services Administration shall provide administrative services for the Commission on a reimbursable basis. Report and Termination. The Commission shall present report to the President not later than three months from the Section its final 6. date of this order. It shall tei-minate within one ing its final month after present- report. Gerald R. Ford. The White House, January ^, 1975. I Appendix II Statement by the President January I have today established a 4, 1975 Commission and evaluate any facts relating to activities conducted within the United States by the Central Intelligence Agency that give rise to questions as to whether the Agency has exceeded its statutory authority. I will soon be naming a distinguished group of members to serve on this "Blue Ribbon" to ascertain Panel. In the world in which we national security, it is live, beset vital that by continuing threats to our we maintain an effective intelligence and counterintelligence capability. This capability fundamental in providing the safeguards that protect our national interests and help avert armed conflict. notable record of operations, such The Central many Intelligence is Agency has had successes in this field, but successes by nature of a its and achievements cannot be divulged publicly. Republic that we meet our security requirements and at the time time avoid impairing our democratic institutions and fundamental freedoms. Intelligence activities must be conducted consistently with both objectives. To that end, in addition to asking the panel to determine whether the CIA has exceeded its statutory authority, I have asked the panel to determine whether existing safeguards are adequate to preclude Agency activities that might go beyond its authority and to make appropriate recommendations. The Commission will immediately have the benefit of the report already furnished to me by Director W. E. Colby of the CIA. The Justice Department is, of course, also looking into such aspects of the matter as are within its jurisdiction. I am aware of current plans of various Committees of the Congress to hold hearings on matters similar to those which will be addressed by the Commission. Whether hearings are undertaken by existing oversight Committees, or should the Congress deem a joint House-Senate Committee to be the best approach to avoid a proliferaIt is essential in this (273) 274 my strong hope that the Committee consider the findings and recommendations of the Commission. I am confident that through the cooperative efforts of the Executive tion of hearings, it is Branch, particularly by the nev7 Commission, and of the Congress, the results will be beneficial both to our national security and to the traditions and Moreover, I institutions of this Republic. am writing to those Department and Agency heads who are responsible for the overall intelligence activities of the United States as related to our national security and to the conduct of our foreign policy, for the purpose of emphasizing that they are at all times to conduct their activities within the scope of their respective statutory authorities. ; ; ; — ; Appendix ; III National Security Act of 1947, as Title 1 amended — Coordination for National Security NATIONAL SECURITY COUNCIL Section 101. (a) There is established a council to be known as the National Security Council (hereinafter in this section referred to as the "Council"). The President of the United States shall preside over meetings of the Council Promded, That in his absence he may designate a member : of the Council to preside in his place. The function of the Council shall be to advise the President with respect to the integration of domestic, foreign, and military policies relating to the national security so as to enable the military services and the other departments and agencies of the Government to cooperate more effectively in matters involving the national security. The Council shall be composed of ( 1 ) the President (2) the Vice President (3) the Secretary of State (4) the Secretary of Defense (5) the Director for Mutual Security [now abolished] (6) the Chairman of the National Security Resources Board [now abolished] ; and Under Secretaries of other executive departments and of the military departments, the Chairman of the Munitions Board [now abolished] and the Chairman of the Research and Development Board [now abolished] when appointed by the President by and with the advice and consent of (7) the Secretaries ; ; the Senate, to serve at his pleasure. (275) — 276 CENTRAL INTELLIGENCE AGENCY Sec. 102. (a) There is established under the National Security Council a Central Intelligence Agency with a Director of Central Intelligence who shall be the head thereof, and with a Deputy Director of Central Intelligence who shall act for, and exercise the powers of, the Director during his absence or disability. The Director and the Deputy Director shall be appointed by the President, by and with the advice and consent of the Senate, from among the commissioned officers of the armed services, whethei- in an active or retired status, or from among individuals in civilian life Provided^ however^ That at no time shall the two positions of the Director and Deputy Director be occupied simultaneously by commissioned officers of the armed services, whether in an active or retired status. (b) (1) If a commissioned officer of the armed services is appointed as Director, or Deputy Director, then (A) in the performance of his duties as Director, or Deputy Director, he shall be subject to no supervision, control, restriction, or prohibition (military or otherwise) other than would be operative with respect to him if he were a civilian in no way connected with the Department of the Army, the Department of the Navy, the Department of the Air Force, or the armed services or any component thereof and (B) he shall not possess or exercise any supervision, control, powers or functions (other than such as he possesses, or is authorized or directed to exercise, as Director, or Deputy Director) with respect to the armed services or any component thereof, the Department of the Army, Department of the Navy, or the Department of the Air Force, or any branch, bureau, unit, or division thereof, or with respect to any of the personnel (military or civilian) of any of the foregoing. (2) Except as provided in paragraph (1) of this subsection, the appointment of the office of Director, or Deputy Director, of a commissioned officer of the armed services, and his acceptance of and service in such office, shall in no way affect any status, office, rank, or grade he may occupy or hold in the armed services, or any emolument, : ; perquisite, right privilege, or benefit incident to or arising out of any such Any such commissioned officer shall, while serving in the office of Director, or Deputy Director, continue to hold rank and grade not lower than that in which serving at the time of his appointment and to receive the military pay and allowances (active or retired, as the case may be, including personal money status, office, rank, or grade. allowance) payable to a commissioned officer of his grade and length of service for which the appropriate department shall be reimbursed from any funds available to defray the expenses of the Central Intelligence Agency, He also shall be paid by the Central Intelligence ; ; ; — ; 277 Agency from such funds an annual compensation at a rate equal to the amount by which the compensation established for such position exceeds the amount of his annual military pay and allowances. (3) The rank or grade of any such commissioned officer shall, during the period in which such commisioned officer occupies the office of Director of Central Intelligence, or Deputy Director of Central Intelligence, be in addition to the numbers and percentages otherwise authorized and appropriated for the armed service of which he is a member. (c) Notwithstanding the provisions of section 652 [now 7501] of Title 5, or the provisions of any other law, the Director of (^entral Intelligence may, in his discretion, terminate the employment of any officer or employee of the Agency whenever he shall deem such termination necessary or advisable in the interests of the United States, but such termination shall not affect the employment i-ight of such officer or employee any other department or agency of the Government if declared eligible for such employment by the United States Civil Service Commission. (d) For the purpose of coordinating the intelligence activities of the several Government departments and agencies in the interest of national security, it shall be the duty of the Agency, under the direc- to seek or accept in tion of the National Security Council (1) to advise the K^afional Security Council in matters con- cerning such intelligence activities of the (government depart- ments and agencies as relate to national security (2) to make recommendations to the National Security Council for the coordination of such intelligence activities of tlie depart- ments and agencies of the Government as relate to the national security (3) to correlate and evaluate intelligence relating to the na- and provide for the appropriate dissemination of such intelligence within the GoA'ernment using where appropriate existing agencies and facilities: Prorided. That the Agency shall have no police, subpoena, law-enforcement powers, or internalsecurity functions: Provided further. That the departments and other agencies of the Government shall continue to collect, evaluate, correlate, and disseminate departmental intelligence: And provided further. That the Dii-ector of Central Intelligence shall be responsible for protecting intelligence sources and methods from unauthorized disclosure tional security, j 1 perform, for the benefit of the existing intelligence agencies, such additional services of common concern as the National Securtiy Council determines can be more efficiently accom(4) to plished centrally — 278 (5) to perform such other functions and duties related to intelligence affecting the national security as the National Secu- may from time to time direct. (e) To the extent recommended by the National Security Council and approved by the President, such intelligence of the departments and agencies of the Government, except as hereinafter provided, relating to the national security shall be open to the inspection of the Director of Central Intelligence, and such intelligence as relates to the national security and is possessed by such departments and other agencies of the Government, except as hereinafter provided, shall be made available to the Director of Central Intelligence for correlation, evaluation, and dissemination Provided^ hoioever^ That upon the written request of the Director of Central Intelligence, the Director of the Federal Bureau of Investigation shall make available to the Director of Central Intelligence such information for correlation, evaluation, and dissemination as may be essential to the national rity Council : security. (f) Effective when the Director first appointed under subsection (a) of this section has taken office (1) 1339, the National Intelligence Authority (11 Fed. Reg. 1337, February 5, 1946) shall cease to exist; and and records of the Central Intelligence Group are transfer-red to the Central Intelligence Agency, and such Group shall cease to exist. Any unexpended balances of (2) the personnel, property, appropriations, allocations, or other funds available or authorized to be made available for such be authorized to be ture by the Agency. made Group shall be available available in like manner and shall for expendi- Appendix IV Biographical Information and Acknowledgements Members of Commission The Honorable Nelson A. Rockefeller, Vice President of the United States, was graduated from Dartmouth College with a B.A. degree in 1930, where he was elected to Phi Beta Kappa. Vice President Rockefeller was elected Governor of New York in 1958 and was reelected in 1962, 1966 and 1970. In 1973, he resigned to organize the Commission on Critical Choices for Americans and to serve as its Chairman. From 1940—14, he served as Coordinator of Inter- American Affairs. He was Assistant Secretary of State for American Republic Affairs from 1944 to 1945 served as Chairman of the Development Advisory Board (Point 4 Program) from 1950-51 and as Under Secretary of Health, Education and Welfare from 1953 to 1954. He also served as Special Assistant to President Dwight D. Eisenhower from 1954 to 1955. The Honorable John T. Connor received his A.B. degree (magna cum laude) from Syracuse University in 1936, where he was elected to Phi Beta Kappa, and his J.D. degree from Harvard Law School in 1939. He served as U.S. Secretary of Commerce from 1965 to 1967. After practicing law in New York City from 1939 to 1942 with the firm now known as Cravath, Swaine and Moore, he served the federal goverimient from 1942 to 1947 as General Counsel of the Office of Scientific Research and Development; Air Combat Intelligence Of-^ ficer, U.S. Marine Corps; Counsel, Office of Naval Research; and Special Assistant to the Secretary of the Navy. Mr. Connor joined Merck & Co., Inc. in 1947 as General Attorney and became President and Chief Executive Officer in 1955. He is presently Chairman and Chief Executive Officer of Allied Chemical Corporation. The Honorable C. Douglas Dillon received his B.A. degree from Harvard University (magna cum laude) in 1931. He served as Secretary of the Treasury from 1961 to 1965. In 1953 Mr. Dillon was ap; (279) 280 pointed as Ambassador to France where he served until 1957 when he became Deputy Under Secretary of State for Economic Affairs, which office was raised to the Under Secretary level in 1958. From 1959 to 1961 he served as Under Secretary of State. During 1968 and 1969 he was a member of the General Advisory Committee on U.S. Control and Disarmament. Mr. Dillon served as Chairman of the Board of Dillon, Read & Co., Inc., of Xew York City from 1946-53. and is presently a Managing Director of that firm. Arms The Honorable Erwin N. Griswold A.M. to Phi received his A.B. and degrees from Oberlin College in 1925, where he was elected Beta Kappa, and his LL.B. degree from Harvard Law School in 1928 and his S.J.D. in 1929. From 1967 to 1972 he was Solicitor General of the United States, after having served as Assistant Professor of Law at Harvard Law School from 1934-35, Professor of Law from 1935-46 and Dean of the Harvard Law School from 1946-67. He was an attorney in the Office of the Solicitor General and Special Assistant to the Attorney General from 1929 to 1934, and he was a member of the United States Civil Rights Commission from 1961 to 1967. He is now a partner in the Washington, D.C. firm, Jones, Day, Reavis and Poague. Lane Kirkland was graduated from the United States Merchant Marine Academy in 1942 and served as a licensed deck officer aboard various merchant ships. He received a B.S. degree from Georgetown L^niversity School of Foreign Service in 1948. Since 1969 he has AFL-CIO, with which he has been associated in various positions since 1948, serving as Executive served as Secretary-Treasurer of the AFL-CIO from 1961 to 1969. General Lyman L. Lemnitzer served as the Chairman of the Joint Chiefs of Staff from 1960 to 1962, when he became :N'ATO's Supreme Assistant to the President of the Commander in Europe, serving in that capacity until his retirement in 1969. General Lemnitzer is a 1920 graduate of the United States Military Academy and during World War II served on the staffs of Allied Mark Clark and Field Marshal Alexander. He was Commander-in-Chief of the Far East and L^'nited Nations Commands from 1955 to 1957. From 1959 to 1960 General Lemnitzer General Eisenhower, General sen'ed as Army Chief of Staff. The Honorable Ronald Reagan reka College, Illinois, in 1932. He received his A.B. degree from Euserved as Governor of the State of California from 1966 until the completion of his second term in 1974. Governor Reagan was a motion picture and television actor from 1937 to 1966, except for service as an officer in the L'nited States Air Force from 1942 to 1945. He was the President of the Screen Actors Guild from 1947 to 1952 and again in 1959, and serv^ed two terms as Presi- 281 dent of the Motion Picture Industry Council which was composed of all labor and management groups in the Motion Picture Industry. Edgar Shannon received from Washington & Lee University, where he was elected to Phi Beta Kappa, and received an A.M. degree from Duke University in 1941 and from Harvard University in 1947. He received his Ph.D. degree from Oxford University, England, where he was a Rhodes Scholar. He was a member of the Harvard University faculty from 1950 to 1956, when he joined the faculty of the University of Virginia, where he is presently Dr. F. his A.B. degree in 1939 Commonwealth Professor of English. From 1959 until 1974 he served and was President of the National Association of State Universities and Land-Grant Colleges in 1966. He served in World War II from 1941 to 1946 as an officer in the Naval Reserve and is a Captain, USNR (Ret.). He was a member of the Board of Visitors of the United States Naval Academy from 1962-1964 and of the Board of Visitors of the United States Air Force Academy from 1965 to 1967. as President of the University of Virginia Executive Director David W. Belin a graduate of the University of Michigan where in six years he earned A.B. (1951), M.Bus. Adm. (1953) and J.D. — is with high distinction. He is a member of the Des Moines, Iowa, law firm of Herrick, Langdon, Belin, Harris, Langdon and Helmick, where he has practiced since 1954. From the University of Michigan Law School he received the Henry M. Bates Memorial Award, made to each of the "two most outstanding seniors in the law school" and is a member of the Phi Beta Kappa and the Order of the Coif. In 1953-54 he was Associate Editor of the Michigan Law' Review. In 1964 he served as Assistant Counsel with the President's Commission on the Assassination of President Kennedy (Warren Commission). (1954) degrees all Senior Counsel Harold A. Baker is a graduate of the LTniversity of Illinois (A.B. 1951) and the University of Illinois Law School (J.D. 1956). Mr. Baker is a partner in the Champaign, Illinois, law firm of Hatch and Baker, where he has practiced law since 1956. He also is a lecturer in Advocacy at the LTniversity of Illinois Law School. Mr. Baker is a member of the Order of the Coif and he is a Fellow of the American College of Trial Lawyers. Ernest Gellhom was graduated with a B.A. degree from the University of Minnesota (1956) and was graduated magna cum laude 282 from the University of Minnesota Law School with a J.D. deo^ree (1962), He is a member of Phi Beta Kappa and the Order of the Coif and was Note Editor of the Minnesota Law Review in 1961-1962. After practicing law in Cleveland, Ohio, he entered the teaching profession and since 1970 he has been Professor of Law at the University of Virginia Law School. Robert B. Olsen was graduated from the University of Michigan (A.B. 1953) and from the University of Michigan Law School (J.D. 1955), where he served as Editor-in-Chief of the Michigan Law Review. He is a member of Phi Beta Kappa and the Order of the Coif. He has practiced law in Kansas City, Missouri, since 1955 and he is a member of the law firm of Olsen, Talpers and Welte. William Schwarzer was graduated cum laude from the University of Southern California (A.B. 1948) and cum laude from Harvard Law School (LL.B. 1951), where he was a teaching fellow until 1952. He then entered the practice of law in San Francisco and is a member of the law firm of McCutchen, Doyle, Brown & Enersen. Mr. Schwarzer is a Fellow of the American College of Trial Lawyers, W Counsel Marvin L. Gray, Jr. was graduated from Princeton University (A.B. 1966) and Harvard Law School magna cum laude (J.D. 1969), where he was Articles Editor of the Harvard Law Review. From 1969-70 he served as Law Clerk to Judge Henry J. Friendly and 1970-71 he served as Law Clerk to Mr. Justice John M. Harlan of the Ignited States Supreme Court. He is an Assistant LTnited States Attorney, Seattle, Washington. George A. Manfredi was graduated from Brown University cum laude (A.B. 1966) and New York University Law School (LL.B. 1969), where he was Managing Editor of the New York University Law Review. From 1969-1974 he was associated with the law firm of O'Melveny and Myers and he is presently a partner in the Los Angeles law firm of Costello, Manfredi & Thorpe. James N. Roethe graduated from the ITniversitv of Wisconsin (A.B. 1964) and the University of Wisconsin Law School (J.D. 1967) where he was Editor-in-Chief of the Wisconsin Law Review. He is a member of the Order of the Coif. Since 1967 he has practiced law in San Francisco, where he is associated with the law firm of Pillsbury, Madison and Sutro. James Burton Weidnor is a graduate of Bowdoin College (A.B. 1964) and the Cornell Law School (J.D. 1967) where he won the first and second year Moot Court Competitions and was a finalist in the 283 third year Moot Court Competition. He has practiced law in York City since 1967 with the firm of Rogers & Wells, where he New is a partner. Special Counsel Greene was graduated from Harvard College (A.B. 1964 magna cum laude) where he was a member of Phi Beta Kappa, and the Harvard Law School (LL.B. 1968, summa cum laude) where he received the Fay Diploma and Sears Prize for ranking first in his class. He served as Note Editor of the Harvard Law Review from 1967-68. He was a Law Clerk to Mr. Justice Thurgood Marshall of the U.S. Supreme Court from 1968-69 and he is associated with the Washington, D.C., law firm of Wilmer, Cutler and Pickering. Ronald J. Staff Members R. Mason Cargill was graduated from the Georgia Institute of Technology (B.S. 1970, with highest honor) and the Harvard Law School (J.D. 1973, magna cum laude), where he was a member of the Board of Student Advisers. After graduation, he entered active duty as a reserve officer with -the TTnited States Navy, assigned to the staff of Assistant Secretary of Defense Terence E. McClary. Pursuant to the request of the Commission, he was temporarily assigned to its staff. Peter R. Clapper was graduated from Princeton University (A.B. 1949) and spent thirteen years as a news correspondent for The ABC and Westinghouse Bi-oadcasting. He has been a Public Affairs Officer with the United States Environmental Protection Agency since 1972, and prior to that he was a Public Affairs Officer with the Agency for International Development for four years. Pursuant to the request of the Commission, INIr. Clapper was temporarily assigned as a Public Aft'airs Officer for the Commission. Timothy S. Hardy was graduated from Amherst College (B.A. 1969, magna cum laude), where he was a member of Phi Beta Kappa, and was graduated from the Yale Law School (J.D. 1972) where he was an editor of the Yale Law Journal. After serving as a Law Clerk for Judge Max Rosenn of the T'nited States Court of Appeals for the Third Circuit, he entered active duty as a reserve officer with the United States Navy, assigned to the staff of Assistant Secretary of Defense Terence E. ]\IcClary. Pursuant to the request of the Commission, he was temporarily assigned to its staff. Washington Post, CBS, : 284 Acknowledgments The Commission wishes thank Sol Neil Corbin, Special Counsel to the Vice President Peter J. Wallison, Counsel to the Vice President and Hugh Morrow, Assistant to the Vice President, for their assistance and contributions to the preparation of this Report. The Commission also wishes to acknowledoe the assistance of Frank R. Pagnotta, Assistant to the Vice President for Administration, who helped expedite so many matters ranging from the remodeling of facilities at 712 Jackson Place to accommodate the Commission stafi', to securing personnel, equipment and supplies. In addition, the Commission wishes to thank the following secretaries and support personnel for their unstinting efforts on behalf of the Commission to ; Secretaries and Support Personnel Carolyn Bazarnick Ruth V. Johnson Roxanne ISIarsh Domia L. ISIona Kathryn Baker Carroll Donald Connor Marie Dene Donald Harper Ruth E. Johnson A. Meier Sammie L. Newman Ramona Overton V. Modene Reed Barbara Rose I APPENDIX V Highlights of Civil Disturbances and Other Disorders in the United States January 1966 through — January 1973 This Appendix reviews major social and political unrest, disturbances, disorder and violence in the United States during the late 1960's and early 1970's. It is offered by way of perspective on the Presidential initiatives that influenced activities of the Central Intelligency Agency during that period with respect to dissidents and dissident groups. The chronology that follows covers representative items from the period between January 1966 and the end of direct United States military involvement in the Vietnam War in January 1973. That period was preceded by other episodes of disorder and violence earlier in the 1960's. In 1963 and 1964, civil rights disturbances occurred in Birmingham, Savannah, Cambridge (Maryland), Chicago and Philadelphia. Early in 1965, serious disorder took place in Selma, Alabama, and in August of 1965 the Watts section of Los Angeles became the scene of massive rioting and destruction. By 1966, news coverage of domestic turmoil had almost become a part of everyday life in the United States. 1966 Jan. 31 The resumption of United States bombing raids against North Vietnam after a 37-day pause brought Apr. 9 The Berkeley, California, headquarters of the anti-war Vietnam Day Committee was blown up. May Student protests against draft procedures broke out a series of demonstrations across the country. 14 at several universities, and in some cases students seized their school's administration buildings. May A 15 demonstration for peace in Vietnam brought 8,00011,000 demonstrators to Washington. (285) 577-475 O - 75 : 286 James H. Meredith, who had integrated the University of Mississippi in 1962, was shot from ambush. Rallies and demonstrations followed. The bombing of oil installations on the outskirts of Hanoi and Haiphong set off a series of protests in June 6 June 29 the United States. Destruction and widespread rioting swept Omaha's Near North Side, Chicago's West Side, the Brooklyn neighborhood known as East New York, and the Cleveland neighborhood of Hough. July Aug. 6 Anti-Vietnam war protests were staged across the Aug. 16-19 At September was investigating Americans who aided the Viet Cong in Vietnam. Rioting swept sections of Atlanta, Dayton and San country. least 50 persons were arrested for disorderly conduct at hearings held in Washington by the House Un-American Activities Committee. The Committee Francisco. 1967 Jan. 21 About 2,000 people marched in front of the White House in Washington, demanding a halt to the bombing of North Vietnam and a de-escalation of the ground war in South Vietnam. Mar. 8 A bill declaring Congress' intention of supporting United States Armed Forces in Vietnam, of supporting efforts to end the war honorably, and of preventing its expansion was passed by both Houses and was signed by the President on March 16. Massive demonstrations and parades were held in New York and San Francisco to protest United States policy in Vietnam. A parade in support of United States troops in Vietnam was held in New York. The New York Times estimated that there were about 70,000 participants. The parade was organized to counter anti-war demon- Apr. 15 May 13 May 16-17 Police May 19 Southern University. 486 students were arrested. United States jets bombed the center of Hanoi for the strations. and students exchanged rifle fire at Texas first time. Summer of 1967 The summer of 1967 was marked by the worst racial disturbances in the history of the United States. The Senate Permanent Investigations Subcommittee on November 1 made public these statistics on riots in 1967 Number of riots Persons killed Persons injured Number arrested Number convicted Estimated cost (in millions) 75 83 1, .'^97 16,389 2,157 $664.5 287 Although severe racial rioting had occurred in United States cities in previous summers, it never had been as widespread or as intense as it became in 1967. In the two cities hardest hit, Newark (26 dead) and Detroit June June 21 (43 dead), conditions of near-insurrection developed in ghetto areas, and police and National Guardsmen with weapons fire. Stokely Carmichael, the former Chairman of the Student Non-Violent Coordinating Committee, and H. Rap Brown, the Chairman of the SNCC, called for "guerrilla warfare" in urban ghettos. Violence and rioting broke out in Tampa, Dayton, Boston, Cincinnati and Buffalo. Sixteen alleged members of the Revolutionary Action Movement (RAM), were arrested on charges murder moderate civil rights leaders. of plot- ting to ] July Rioting swept sections of Los Angeles, Detroit, Newark, Plainfield, New York, Rochester and Cambridge. In Detroit the disturbances brought the first use of Federal troops to quell civil strife in 24 years. July 27 A Special Advisory Commission on Civil Disorders was appointed by President Johnson to "investigate the origins of the recent disorders in our cities." The President said that the Nation had "endured a week such as no nation should live through a time of I ; and tragedy." Arson, vandalism and looting occured in northwest Washington, D.C. President Johnson announced plans to send an addiviolence i Aug. 1 Aug. 3 tional 45,000 to 50,000 troops to Vietnam by July 1968. Aug. 6 SNCC Chairman R. Rap Brown York that the summer's told a rally in racial riots New were only "dress I rehearsals for revolution." I Aug. 11 |i Aug. 15 , cities. I ' United States planes launched an intensified air offensive against North Vietnam. Martin Luther King, Jr. called for a campaign of massive civil disobedience in Northern United States April-August Among other cities and communities around the country where racial rioting was reported (in order j t I of date) Nashville (8-10 April) Cleveland (16 April) Jackson^ Mississippi; Lansing, Michigan (14-15 June) Kansas City, Missouri (9 July) Waterloo, Iowa (9 July) Erie, Pennsylvania (11-12 July and 18 July) Fresno, California (16-17 July) Des Moines, Iowa (16 July) Nyack, New York (19 July) Birming: ; ; ; ; ; ; ; ; ; ham, Alabama (22 July) Yotingstown, Ohio (22 July) New Britain, Connecticut (22-23 July) Toledo, Ohio (24.-26 July) Mount Vernon, New York (24-28 July) Phoenix, Arizona (25-26 July) ; ; ; ; ; ; 288 April-Augiist — Continued Saginaw, Michigan (25-26 July) South Bend, InPeekskill, New York (27-28 diana (25-28 July) San Francisco, Oalifomia (27-28 July) July) Long Beach, California (28 July) Marin City, California (28 July) Memphis, Tennessee (28 July) Wilmington, Delaware (28-29 July) Newburgh, York (29-30 July) Castle, Pennsylvania New New ; ; ; ; ; ; ; ; ; Rockford, Illinois (29^30 July) West Palm Beach, Florida (30 July) Portland, Oregon (30-31 July) San Bernardino. California (29-30 July) ; ; ; ; (30-31 July) Riviera Beach. Florida (31 July) Wichita, Kansas (31 July, 3-5 August) Peoria, ; ; ; Wyandanch, New York (2-4 (2 August) August). George Lincoln Rockwell of the American Nazi Party was shot to death in Arlington. Virginia. SNOC Chairman H. Rap Brown told a cheering crowd in riot-stricken Detroit "You did a good job here." But he said the riots in Detroit would "look like a picnic" when blacks united to "take their due." The Reverend James E. Groppi led a series of daily open-housing demonstrations in Milwaukee. The drive was frequently marked by violence. About 500 members of the Women's Strike for Peace clashed with Washington ix)lice in front of the White House. Demonstrations against the draft were held through the United States by opponents of United States policy in Vietnam. A massive demonstration took place in Washington, D.O. in a protest against United States policy in Vietnam. Many demonstrators at the Pentagon were arrested after clashing with United States Army troops and Federal Marshals. Demonstrations supIllinois Aug. 25 Aug. 27 ; : Aug. 28 Sept. 20 Oct. 16-21 October : porting Ignited States troops in Vietnam were held New York area and other parts of the United Demonstrations occurred in various parts of the country in 1967 to protest job recruitment by Dow Chemical Company, which manufactured napalm iised in Vietnam. The protests reached their peak in October. FBI agents in Baltimore arrested three persons, including a Roman Catholic clergyman, for pouring duck blood on records at the city's Selective Service in the States. Oct. 27 Nov. 12 headquarters. President Johnson cancelled plans to attend the annual meeting on November 13 of the National Grange 14 York, to avoid a threatened antiwar demonstration. Hundreds of anti-war demonstrators clashed with police in New York during a rally in protest against Secretary of State Rusk, who was attending a dinin Syracuse, Nov. ner there. New 289 Dec. 4 Dec. 4—8 Dec. Martin Luther King announced plans in Atlanta for a massive civil disobedience campaign to disrupt federal activities in Washington in April, 1968. A coalition of about 40 anti-war organizations staged "Stop the Draft AVeek" demonstrations throughout the United States. The marchers sought to disrupt United States Armed Forces induction centers. The build-up of United States forces in Vietnam reached approximately 500,000 men by the end of 1967. In an overview of the situation in December 1967, the FBI reported "One of the most : Amerthe evolution and growth significant features of the ican scene of the 1960's is what has become known as the 'new left.' This movement of rebellious youth, involving and influ- of encing an estimated 100,000 to 300,000 college students, is having a jarring impact upon contemporary society and portends serious trouble for this country. * * *" Apr. 4 1968 Assassination of Martin Luther King, widespread Jr., followed by rioting. Apr. 26 Secretary of Defense Clark Clifford announces establishment of Riot Control Center at the Pentagon. June 5 Senator Robert F. Kennedy shot in Los Angeles and dies the following day. More than 50,000 persons demonstrate in Washington, D.C. in Poor People's Compaign. Resurrection City set up near Lincoln Memorial. By the middle of July serious racial disorders had occurred in 211 cities. Widespread disorder in Chicago, concurrent with Jime 19 July Aug. 26-29 Democratic National Convention. Ann Sept. 29 CIA Nov. stroyed by bomb. Dozens of United States college campuses explode with Recruiting Ofiice in Arbor, Michigan^ de- violence. Nov. 20 CIA recruiter routed from South Bend, Indiana, in connection with recruiting at Notre Dame University. January February 1969 Extensive disturbances at San Francisco State College. Rioting at University of Wisconsin and Duke University. |, I Apr. 2 21 Black Panther Party members charged with plot- bomb New York City stores. Harvard University students seize University Hall. Students from Cornell University seize University Building, carrying rifles and shotguns. ting to Apr. 9 Apr. 20 May 15 Oct. 15 Rioting at University of California in Berkeley. Massive observances of anti-war moratorium throughout the United States. 290 Nov. 13 Nov. 15 46,000 persons engage in "March Against Death" past the White House. More than 250,000 persons stage peaceful march and rally against war in Washington, D.C. During 15-month period from 1 January 1969 to 15 April 1970 United States experienced 4,330 bombings, 1,475 unsuccessful bombing attempts, and 35,129 threatened bombings. Included were a of bomb threats at CIA number buildings. 1970 Feb. 26 Mar. 6 Governor Reagan declares state of emergency in Santa Barbara after student rioting and bombing of a bank. Greenwich Village townhouse demolished by explosions thought to be bomb factory for Weatherman faction of SDS. Four students killed and others wounder at Kent State University in clasli with National Guardsmen. A crowd of 100.000 in Washington, D.C. protest United States actions in Cambodia. 448 United States univei'sities and colleges on strike — May 4 May 9 May 10 or closed over May 15 Two Cambodia action youths killed by police fire protest. during demonstration at Jackson, Mississippi, State College. June 13 President Nixon names nine-member commission to explore campus violence and student grievances. Aug. 7 California Judge Harold Haley and his three kidnap- pers killed in e.scape attempt at San Rafael Courthouse. Warrant later issued for arrest of Angela Davis. Aug. 24 Sept. 11 Oct. 3 Research Building at University of Wisconsin destroyed by bomb. President Nixon orders use of Federal armed guards on overseas flights of United States airlines, following numerous skyjacking incidents. United States Commission on Campus Unrest Issues report warning of growing crisis. 1971 Jan. 12 Mar. 1 Mar. 8 Apr. 8 Apr. 22 Father Berrigan and five others charged with conspiracy to kidnap Dr. Kissinger and to lilow up heating systems of Federal Buildings in Washington. Powerful bomb explodes in Senate Wing of the Capitol. Break-in at FBI Office at Media, Penn.sylvania, resulting in theft of numerous .sensitive documents. Administration Building at Santa Cruz campus of University of California destroyed by arsonists. Tliere followed fires and fire bombs at Tufts University of Hawaii, and Cornell University. 110 demonstrating veterans arrested at Supreme Court Building. i 291 Apr. 24 Massive, but peaceful, anti-war rallies held in Washington crowd at 200,000, San Francisco crowd at May Thousands of anti-war protesters arrested 150,000. 3-5 in Wash- ington, D.C. in connection with attempts to disrupt and immobilize Government. York Times begins publication of Pentagon traffic June 13 New Aug. 21-22 Papers. 25 persons arrested in raids on Selective Service Offices in Buffalo, New York, and Camden, New Jersey. Apr. 10 May 8 May May 19 21-22 Aug. 12 July and August 1912 United States begins deep penetration raids into North Vietnam for the first time since November 1967, provoking new wave of protests. President Nixon announces mining of North Vietnamese harbors, touching off another intense wave of anti-war protests and widespread violent clashes with police. Bomb explodes in the Pentagon Building. More than 400 protesters arrested in Washington, D.C, during battles with police. Last United States combat troops leave South Vietnam. Heavy air raids conducted over North Vietnam. Democratic and Republican National Conventions take place in Miami Beach with only minor incidents. 1913 January 23 and 27 President Nixon announces signing of agreement in Paris to end the war in Vietnam. ; ; : — ; Appendix VI Proposed Amendments to Statute In Reconimendation (1), the Commission proposes that 50 U.S.C. Section 403(d) be amended to read (Additions are italicized; deletions are marked through) (d) For the purpose of coordinating the foreign intelligence activities of the several government departments and agencies in the interest of national security, it shall be the duty of the [Central Intelligence] Agency, under the direction of the National Security Council (1) to advise the National Security Council in matters concerning such foreign intelligence activities of the government departments and agencies as relate to national security (2) to make recommendations to the National Security Council for the coordination of such foreign intelligence activities of the departments and agencies of the government as relate to the : national security and evaluate foreign intelligence relating to the national security, and provide for the appropriate dissemination of such foreign intelligence within the government using where appropriate existing agencies and facilities: Provided^ that except as specified by the President in a, published Executive Order^ in collecting foreign intelligence from United States citizens in the United States or its possessions, the to collect, correlate (3) Agency rnust disclose to such citizens that su€h intelligence is being collected by the Agency. Provided further, that the Agency shall have no police, subpoena, law enforcement powers, or internal security functions: Provided further, that the departments and other agencies of the government shall continue to collect, evaluate, correlate and disseminate departmental intelligence And shall provided further, that t4^ Director of Centra IntclligenGO fee l- rcgponsible 4ei= protecting intelligence aourceo ftft4 meth - ods from unauthorized dincloouro (4) to perform, for the benefit of the existing intelligence agencies, such additional foreign iritelligence services of common (292) ; 293 concern as the National Security Council determines can be more efficiently accomplished centrally (5) to perform such other functions and duties related to for- eign intelligence affecting the national sex^urity as the National Security Council (6) may from time to time direct. and tnethods of from unauthorized disclosure. Within the to he responsible for protecting sources foreign intelligence United States this responsibility shall be limited (a) to lawful means used to protect against disclosure by {i) present or former employees^ agents or sources of the Agency or (ii) persons, or .^ employees of persons or organizations, presently or formerly under contract with the Agency or affiliated with it, and (b) to providing guidance and technical assistance to other government departments and agencies performing intelligence activities. — Appendix VII Assistance To and Federal, State The following information From and Local Agencies provided as a supplement to that material set forth in Chapter IT, Section B. involving CIA assistance to and from state and locallaw enforcement agencies. Its purpose is to provide additional detail and identify' some additional contacts between the CIA and state and local police authorities not referred to in the chapter. As specific Agency files on relations with state and local law enforcement agencies were not established as such until 1970, this summary does not purport to be an exhaustive description of all such acti\'ities. is A. Other Assistance Given to State and Local Police ' 1 I Among those Agency training courees referred to in Chapter 17 were the Washington ^letropolitan Police Department, most Washington suburban police departments, the Mar\dand and Virginia State Police, and the police of Los Angeles. Miami, and Chicago. CIA records show that in 1968 and 1969, four three-week training programs in lockpicking and positiveaudio surveillance were given to an aggregate of 24 police officials from in and around the "Washington. D.C., area. In July and August of 1972, two one-week courses in lockpicking were presented to Washington area police. In September 1972. twelve representatives from the Xew York Police Department attended a seminar on clandestine collection methodology', the basic theories of intelligence, and the Office of Security's role in the intelligence effort. Other shorter briefings, seminars and demonstrations on a wide variety of topics have been sponsored by the Agency. police departments sending representatives to — In 1970 the Office of Security, with the approval of the Director of Central Intelligence, provided six (294) men to the Law Enforcement 295 [ ! Assistance Administration to brief police and local on a "trace metal detecting technique" developed by the Agency. These six men, operating as Law Enforcement Assistance Administration consultants, conducted a number of briefings on the technique in different locations throughout the country. For several years training officials and disarmament an isolated Agency in explosives detection has been given to local police representatives at North Carolina. That provide the Agency with a capability for detecting, handling and disarming all types of explosive devices. Police departments from all over the country have funneled information concemiag new types of explosive devices to this CIA facility, which in turn has studied the information and attempted to ascertain the most appropriate methods of detecting ^and disarming each type of explosive device studied. In turn, the CIA facility in facility >ras established to has periodically brought representatives to the facility from local law ^enforcement agencies to share with them the knowledge concerning new it has learned devices. Just before the Presidential Inauguration in January of 1969, a representative of the Washing'ton Metropolitan Police Department's Intelligence Division asked the Office of Security to provide the police radio-equipped automobiles to assist the Department in monitoring the large groups expected to congregate during the inauguration ceremonies. The purpose of obtaining the CIA equipment was to provide the police department with an additional assigned radio frequency for use in connection with the planned activities during the jwith several inauguration, and to open up the Department's own radio frequency Other agencies normally able to assist were fully utilizing their radio equipment during this period. From six to nine radio-equipped automobiles some privately owned and others Agency owned were furnished the Department by the CIA under the condition that these vehicles remain totally under the for ordinary police communications. — — control of Office of Security employees. The police agreed to this condition and both the vehicles and drivers were provided by the Office of Security. Command posts for monitor- ing intelligence reports were established at both the headquarters Agency and the Intelligence Didepartment. The CIA also provided building of the Central Intelligence vision headquarters of the police footmen radios for other police officers to utilize while on the street, communicate with the CIA vehicles or either command post. Similar assistance was rendered by CIA to the Metropolitan Police Department on at least two other oc<?asions (the antiwar moratorium demonstrations in November 1969 and the May Day demonstrations in 1971) and possibly a third. Bnabling I them to 296 As is discussed in Chapter 17, the Office of Security has occasionally loaned electronics equipment to police departments for training or for use in police operations. Some equipment has been given outright. Technical assistance on the proper use of such equipment has also been given on occasion. As a general rule, the Office of Security has restricted the availability of this electronics equipment to police de- Washington, D.C. metropolitan area (primarily to the Montgomery County and Metropolitan Police Departments). However, in isolated incidents, electronics equipment has also been loaned to the New York and San Francisco police departments. Included in the type of electronic equipment loaned or given to police were transmitters, telephonic decoders, touchtone dial recorders, tunpartments in the Kelcom SK-7 audio devices (for use in audio surveillance), amplifiers, transmitter beacons, and receivers. In addition, some nonelectronic equipment, including cameras and photographic gear, gas masks, tear gas grenades, and protective flack jackets has been furnished to Washington metropolitan area police departments, primarily for use during the period when the dissident groups were at their peak of activity from 1967 through 1971. The CIA has on at least one occasion provided some technical assistable receivers, ance in an actual police operation being carried out by the Metropolitan Police Department. In late 1968 or early 1969, CIA was asked Department with transmitters which could be planted in several lamps to be placed in the apartment of a police informer who frequently met with members of dissident groups. CIA agreed to provide the requested equipment. The lamps were provided to CIA and the transmitter devices were installed in the lamps by personnel from the Office of Security. The lamps were then placed back in the police informer's apartment by the police. The police informer was aware that the apartment was being bugged and con- to provide the sented to the operation. In early 1973 the CIA permitted the Metropolitan Police Department to use one of its safe houses in the Washington metropolitan area during the course of a police investigation. The safe house was used on a part-time basis in an attempt to purchase an extremely large quantity of heroin from out-of-town interests. This use of the safe house was approved by the Director of Security and continued until June of 1973. one other occasion the Office of Security made special arrangements to allow three policemen to use an Office of Technical Services photography facility to develop some police film taken during an operational police assignment. The film was considered to he so sensitive that the normal police facilities could not be used without the On possibility of compromising the entire police investigation. 297 On at least three separate occasions, alias documents (including and draft cards) were provided to police officers representing police departments in Washington, Miami, and Baltimore. The purpose of providing this documentation was to permit the recipients to engage in undercover police work. The alias documentation given to the Metropolitan Police Department was never used and has been turned over to, and been made a part of the I'ecorcl of, this Commission. It is not known whether the documentation provided to the Miami and Baltimore Police Departments was ever utilized. In 1968, the Office of Security provided copies of a reference document entitled "A\'liere's What" to a number of local police departments. "Wliere's What" is a publication compiled by a CIA Office of Security employee during the period of March 1965 to March 1966, as the recipsocial security ient of a Brooking-s Institution Federal Executive Fellowship. It is work designed a comprehensive reference investigator and is as a guide for the federal classified "confidential." The Office of Security distributed 1,000 copies of the book, the majority going to various federal agencies. Records reflect, however, that five copies each were given to the Arlington and Fairfax County Police; two copies to the Maryland State Police and a ; Washington request was made in total of 32 copies to the Metropolitan Police Department. Although a 1970 by the Law Enforcement Assistant Administration to republish a second unclassified edition of this booklet, the suggestion was rejected since the CIA felt that it would not be proper for it to publish law enforcement material for general usage and unclassified purposes. B. Other Assistance From State and Local Police In 1966, CIA contracted with a private company to undertake an extensive study on the use of polygraph machines as a tool in personnel investigations. The purpose of the study was to determine what kind of individuals could "beat the polygraph." During the period of the study (1966-1967), CIA's contractor drew upon the resources of the San Mateo County, California, sheriff's office to find subjects for the study. Various inmates of the San Mateo County jail were used in connection with this experiment. Police cover in the form of badges and other identification has, on several occasions, been obtained from local police departments. In 1960, nine CIA officers attached to the New York Field Office of the New York Police Department were provided with badges in connection with assignments directed against several foreign Office of Security intelligence targets in New York City. 298 In connection with the surreptitious entry of a business establishment in Fairfax County, CIA officers were provided with a metal badge obtained from the Fairfax City Police Department for use as "flash" identification in the event that any one should question their activities. It never became necessary for the officers engaged in the operation to use the badge for identification purposes. During the 1971 May Day demonstrations in Washington, D.C., the CIA was provided with approximately twenty Metropolitan Police Department identification cards for use while monitoring the crowds in cooperation with Washington police officer. The purpose of obtaining these identification cards was to permit CIA agents to cross police lines during the anti-war demonstrations. The credentials were subsequently destroyed. In September of 1971 a representative of the Office of Security's Washington Field Office approached the Fairfax County Police Department and requested the use of several sets of identification (including badges and identification cards) for "national security" purposes. These badges were, in fact, requested to facilitate a CIA surveillance then underway within Fairfax County of a former Agency employee threatening to make a public allegedly classified material. It w-as thought that any questionable activity on the part of those conducting the surveillance could be alleviated by showing the police badges to any concerned citizen. After some delay, the request was approved by the Chief of the Fairfax County Police Department. Nine patrolmen's and one sergeant's badge were delivered to CIA. In fact, these badges were never used in any CIA operation and were returned to the Fairfax County police in early 1973. While no evidence of additional use of police credentials by CIA officers has been found, it is the opinion of a former director of the Office of Security that additional police credentials may have been obtained from time to time from police departments in cities where the Office of Security maintains field offices. C. Gifts and Gratuities Given to Local Police Officials In addition to the items covered in Chapter 17, the Commission has learned of the following instances in which gifts or gratuities were given by the Office of Security to state or local police cooperative attitude towards CIA. On two occasions while those officials CIA officials for their furnished transportation to police officials were vacationing. In one instance, a rental vehicle was made available to a particularly cooperative police official while he was vacationing in the Los Angeles area. The bill for the rental of that vehicle came to approximately $800 and was paid from CIA 299 funds. The second instance involved the furnishing of a rental car to was vacationing in Puerto Rico. This car was used for approximately two days and was subthe Chief of that police department while he sequently returned as the Chief obtained access to other transportation. is The amount expended by the Office of Security for this vehicle unknown. sponsored dinners honoring two retiring inspectors of the Washington Metropolitan Police Department who had been particularly helpful in providing assistance In about 1965 or 1966, the to Office of Security CIA. Several contemporaries of the two inspectors from local police departments were invited guests. On each occasion the honoree was presented with a service revolver valued at about $75 or $80 as a gift from the Office of Security. In 1970 or 1971, a similar dinner was sponsored by the Office of Security for a captain of the Fairfax County Police Department. On this occasion, the captain was presented with a gift from the Office of Security of a w^atch valued at about $150. One retiree from the Metropolitan Police Department wdio desired to safeguard certain files in his home was also given a four drawer combination safe to facilitate the storage of these materials. In about 1969 or 1970 an inspector from another police department was given the use, free of charge, of a safe house maintained by the Office of Security in Miami, Florida, for about one week while he was on vacation there. The inspector had been helpful to the Agency in making personnel investigations U.S. and in other respects. GOVERNMENT PRINTING OFFICE : 1975 O - 577-475 1