From The Archives NEWS & POLITICS ARCHIVES Security THE FRONT ARCHIVES Washington, D.C.

The Spy Who Came Down on the Freeze

Rees, Reagan, and the Digest Smear: The Spy Who Came Down on the Freeze
August 16, 1983

“Certainly, while he was campaigning, and in the years before he was president, he had my material, and he made use of my material in his radio programs. And that goes back years. That goes back to the time he was governor of California.”

The man describing his intelligence gathering for the president is John Herbert Rees, right-hand man to John Birch Society chairman and Georgia con­gressman Larry McDonald. Rees has been dogged for years by charges that he is a con man, police informant, and agent pro­vocateur.

Rees may be boasting a bit. But ob­servers on both the left and the right have credited his articles as the primary source for the Reader’s Digest piece Reagan cited last fall as gospel “evidence” that the Soviets had “inspired” and were “ma­nipulating” the U.S. nuclear freeze move­ment. Digest author and senior editor John Barron assured reporters that the president “made very extensive inquiries, before he spoke, on the facts in that arti­cle.” FBI assistant, director Roger S. Young told The New York Times the same day that Reagan’s comments were “persistently consistent with what we have learned.” And in an Oval Office press conference, Reagan himself claimed he had verified the Digest piece.

Since then, FBI director William Webster has retreated from the allega­tions. But as surely as The White House stands by its charges, with the freeze reso­lutions now coming before the Senate, John Rees denies he was ever more or less than a journalist. However, documents released under the Freedom of Informa­tion Act, and recently produced in a Na­tional Lawyers Guild lawsuit charging unconstitutional government surveillance, prove that Rees made informing on politi­cal groups “a profession”; moreover, a 1968 FBI memo concludes, “Rees is an unscrupulous, unethical individual… Information from him cannot be con­sidered reliable.”

[related_posts post_id_1=”717345″ /]

Given current political realities, it’s no great surprise that the president echoed charges which first appeared in print under Rees’s byline. Rees, 57, plays a central if largely unseen role among the coterie of ultraconservative commentators and courtiers influential with Reagan, a group whose legitimacy Reagan’s presidency has boosted enormously. Reagan, after all, chaired the unsuccessful senatorial cam­paign of arch-conservative Birch sup­porter Loyd Wright in the 1962 California GOP primary. Such are the connections that lie at the heart of the smears against the U.S. freeze movement.

It is Rees’s job, within this clique, to “document” the charges of “subversion” often used in right-wing attacks on the left. Besides covering Washington for var­ious Birch periodicals, Rees publishes the closely circulated Information Digest (subscription price: $500 a year), which purports to focus on “the background … operations and real capabilities of social movements and political groups.” ID reports have been distributed mostly among intelligence units and conservative politicians such as former governor Meldrim Thomson of New Hampshire and Reagan.

Rees is also listed as editor at the curious Western Goals Foundation, founded in 1979 by Larry McDonald in Alexandria, Virginia, to “rebuild and strengthen the political, economic and so­cial structure of the U.S. and Western Civilization so as to make any merger with totalitarians impossible.” To this end, Rees produces foundation tracts such as “The War Called Peace — The Soviet Peace Offensive,” and oversees the com­puterization of what McDonald claims are 100 file cabinets of data on “terrorism and subversion.” (In an outgrowth of an ACLU lawsuit charging Los Angeles po­lice with improper intelligence activity, the department recently investigated whether one of its detectives improperly supplied confidential police files to West­ern Goals. According to Stern magazine, staff members of the German-based Western Goals Europe have been linked to the CIA and its German equivalent, the BND.)

The New Right’s leading lights have shined warmly on Rees. Robert Moss, co­author of The Spike, who in the summer of 1981 testified as an “expert on terror­ism” at Senator Jeremiah Denton’s hear­ings on “Terrorism: The Role of Moscow and Its Subcontractors,” says Information Digest is “the most important public source available in this country on the activities of the radical left … ” Allan Ryskind, an editor at Human Events, which Reagan has called “must reading,” says he has reprinted articles from Information Digest “directly,” and lauds “Rees’s enterprising journalism and credibility.” Heritage Foundation pundit Sam Francis cites Rees as “authoritative.” Reed Irvine of Accuracy in Media con­fidently quotes “John Reese (sic) … a well-known investigative journalist.”

Such endorsements may help explain the striking similarities between Rees’s Birch and Western Goals screeds and the Reader’s Digest piece Reagan cited last October. In the February 1982 issue of American Opinion, Rees concluded that “the Soviet Union is running the current worldwide disarmament campaign through the KGB and front organizations … ” Eight months later, Barron averred in The Reader’s Digest that the U.S. freeze campaign “has been penetrated, manipulated and distorted to an amazing degree by people who have but one aim — to promote communist tyranny by weak­ening the U.S.”

[related_posts post_id_1=”720727″ /]

In the Atlanta Constitution last No­vember, Ann Woolner and Jerry Nesmith said Barron told them he had seen the Western Goals report, but that it was one of over 200 sources. Woolner and Nesmith listed numerous instances in which Bar­ron cites the same meetings, excerpts the same quotes, and uses paraphrasing simi­lar to Rees’s. For example:

In March, in his Western Goals report, “The Soviet Peace Offensive,” Rees wrote: “Mel King, active with both the World Peace Council and the U.S. Peace Council, gave a militant speech, saying, ‘We’ve been too damn nice … (and) al­ways on the defensive … It’s time we stopped just getting mad and started get­ting even.’ ”

In October, in Reader’s Digest, Barron wrote: “Mel King, a Massachusetts state legislator active in both the World Peace Council and the U.S. Peace Council, demanded a more militant spirit. ‘We’ve been too damn nice,’ he declared. ‘It’s time we stopped just getting mad and started getting even.’ ”

In March, for Western Goals, Rees wrote: “Rep. Gus Savage (D-Il.) stressed the need to bring black and other minority groups into the disarmament move­ment.”

In October, in Reader’s Digest, Barron wrote: “Congressman Savage spoke about how to induct blacks and other minorities into the disarmament drive.”

In March, Rees wrote: “… U.S. Peace Council executive director Mike Myerson, who has been a Communist Party U.S.A. functionary since his student days some twenty years ago, emphasized the U.S. Peace Council and World Peace Council’s unique responsibility of merging the fight for Western disarmament with pro­vision of support to … revolutionary groups in El Salvador, Guatemala, Chile, South Africa and the PLO … ”

In October, Barron wrote: “The execu­tive director of the U.S. Peace Council, Michael Myerson, a longtime communist functionary, asserted that the U.S. Peace Council had a unique responsibility to fuse the cause of disarmament with that of the Palestine Liberation Organization and guerrillas in El Salvador, Guatemala, Chile and South Africa.”

[related_posts post_id_1=”724707″ /]

“John Rees is simply a good journalist who has done a valuable service in alerting the American people and the American government to the threats against our se­curity from terrorists, subversive, total­itarian and extremist organizations,” said Larry McDonald in the Congressional Record in 1981. “John Rees deserves com­mendations and accolades from the Amer­ican people.” Law enforcement agencies, however, have not always agreed with Rees’s boss.

The FBI first took note of Rees in the early 1960s in his native England. He worked in a minor business position for the London Daily Mirror. According to an FBI memo released under the FOIA, Rees misused his personal accounts, and was fired by the Mirror. Agents in the FBI office at the London U.S. Embassy dis­covered that during 1962 Rees had been “keeping the company” of a bureau steno­grapher. “Rees’s background and the fact that he was married and had five children were confidentially furnished to this stenographer, who was visibly shaken by this news inasmuch as she had planned to marry Rees,” the memo notes. Humil­iated, the secretary resigned from the FBI.

Leaving his family behind, Rees came to America in 1963 to take a reporting job. The job fell through. But when Rees was introduced that fall to Grace Metalious, author of Peyton Place, he presented himself as a writer for a Boston daily, and talked her into letting him do a “profile” on her. Metalious had been ruined by her own success, writes Emily Toth in Inside Peyton Place. She was recently divorced, isolated, and a chronic alcoholic.

The promised profile never appeared. But Rees soon became Metalious’s lover and business manager, and by December had moved into her Gilmanton, New Hampshire, estate. According to Toth’s book, Rees often kept family and friends away from her as Metalious sank deeper into alcoholism. On a rare visit, Metalious’s daughter Marsha found the house strewn with garbage and empty liq­uor bottles.

During a trip to Boston shortly there­after, Metalious collapsed, and died on February 25, 1964, of cirrhosis of the liver and massive cerebral hemorrhaging. Her deathbed will left her entire estate to Rees and nothing to her three children. She had known Rees less than six months. After the will was contested on behalf of the children, Rees relinquished his claim for what he called moral reasons. The FBI reached a different conclusion: “Rees subsequently renounced all claim to the estate when it was determined that the liabilities exceeded the assets.”

[related_posts post_id_1=”714416″ /]

By 1968 Rees had relocated in riot-stricken Newark where he worked as a research director in a Great Society job­-training program until he was forced to resign. Auditors discovered that while col­lecting his federal pay, Rees was often out of town for his own company, National Goals, Inc., a “non-profit organization spe­cializing in areas of education, training and law enforcement.”

In a plan submitted to the U.S. Justice Department, National Goals proposed the creation of “community peace patrols” to quell “the summer months and threats of violence and disorder.” Rees wanted to use federal funds to equip Anthony Imperiale’s North Ward Citizen’s Commit­tee, a white militant group, and Kamiel Wadud’s United Brothers of Newark, a black militant group, with uniforms, helmets, walkie-talkies, tape-recorders, cameras, patrol cars, four offices, and two warehouses. Attorney General Ramsey Clark and New Jersey governor Richard Hughes denounced it as a vigilante scheme.

Meanwhile, Rees and an investigator for the House Committee on Un-Ameri­can Activites (HUAC) quietly visited the Newark FBI office to cut a deal. “He stated he had information of a racial and criminal nature which he and the in­vestigator from HUAC believed was of an interest to the FBI,” agents observed in a report. “He attempted to sell himself and his services to the FBI.”

But like the Justice Department, the FBI wasn’t buying — at least. not yet. “Rees talked in generalities … and furnished no information of value,” the memo concludes. “The interviewing agents believed his interests were self­-serving and that he came to the FBI thinking this would enhance his creden­tials in contacting other potential clients.”

Rees remained undaunted. In Septem­ber 1968, according to FBI documents, he was undercover in Chicago, covertly tap­ing lawful political meetings for secret testimony he would later give before HUAC. Again a HUAC investigator of­fered the FBI the fruits of Rees’s labors. Again agents shied away. “We should not initiate any interview with this un­scrupulous, unethical individual concern­ing his knowledge of the disturbances in Chicago,” wrote an agent, “as to do so would be a waste of time.”

[related_posts post_id_1=”724683″ /]

Yet Rees had found his niche. He’d made several cameo appearances before HUAC, peddled his information to vari­ous police departments, and by now, ac­cording to Rees, Information Digest was finding its way onto the desks of Reagan gubernatorial aides beset by campus pro­tests. Frank Donner charged in The Age of Surveillance that “Rees used a familiar scam: he would hawk information to one department (typically a lurid tale of a violent plot) and in the course of this transaction pick up information that he in turn would peddle to a unit in another city. In the same way, he enlarged his sources for Information Digest.”

He also found a spouse. John Rees and Sheila Louise O’Connor arrived in Wash­ington, D.C., just before the 1971 May Day protests and quickly assimilated themselves into left circles.

Rotund, bearded, and longhaired, Rees was an articulate pamphleteer who often sported an Anglican priest’s collar. Sheila, big-boned and over six feet tall, was a whiz at office work. They came complete with then-rare commodities: an IBM Selectric and Gestetner mimeograph ma­chine.

In July Secret Service agents spotted Rees in a demonstration at the South Vietnamese Embassy. Running a com­puter check on him, they received several interesting reports. According to a Secret Service memo obtained by the National Lawyers Guild, the Washington Metro­politan Police Department disclosed that it employed Rees as an informant. The Chicago Police Department reported “subject is unreliable and is known to make a profession of providing intelli­gence to police departments.” The Secret Service memo also stated that the IRS had revealed “subject was a known con man in England.”

The agents also learned that Rees “possibly carries a gun” and used a string of aliases, including John Sealy, S. L. O’Connor, and Jonathan Goldstein. Besides his work as an informant, agents found, he had no known employment.

Yet at about the same time, FBI docu­ments indicate, the FBI designated Rees Potential Security Informant (PSI) No. WF-3796. (Sheila would later become a PSI too.) Like full-fledged informants, PSIs are paid for their information.

Former FBI agents and congressional staff familiar with intelligence matters said the government’s negative evalua­tions of Rees should have disqualified him from working for the FBI. But they noted that, as with Mel Weinberg in the Abscam case and Gary Thomas Rowe in the Ku Klux Klan, the bureau has used less-than-­credible informants in attempting to get convictions or discredit a target. The FBI will use “anybody they can,” explained a former agent. “But I wouldn’t touch Rees with a 10-foot pole … all you’re going to do is get yourself in trouble.”

[related_posts post_id_1=”716582″ /]

Rees and O’Connor moved into a left collective at 1616 Longfellow Street, N. W. Friction quickly developed. One day while searching for a packet of checks she be­lieved the Reeses had taken from her, a housemate stumbled upon a bizarre cache in their usually locked room. Pat Richartz, now a West Coast legal assistant, recalled finding “several guns, boxes of bullets,” and “a large black suitcase con­taining everything to wiretap a house.”

In the midst of Richartz’s discovery, the Reeses returned. According to Rich­artz’s signed affidavit, Sheila beat her “unmercifully” while John held her two young daughters. Stew Albert, then a D.C. activist and now a California-based writer, saw Richartz shortly after the al­leged attack. “She came up to my apart­ment looking very messed up,” he said. “She said John and Sheila did it to her.” Richartz claims she still takes daily medi­cation for migraine headaches stemming from the assault.

Richartz accused the Reeses of being informants, but no one believed her at the time. She was seen as an outsider; the Reeses were valuable volunteers. Richartz left for California. In researching this arti­cle, Sheila Rees could not be reached for comment on the charges.

When in July 1972 the National Law­yer’s Guild opened a Washington chapter and became rapidly involved in represent­ing activists and antiwar groups in Wash­ington, Sheila volunteered to be office manager. Soon she became the office’s key administrator and a member of the Guild’s national executive board; mean­while, John supplied the FBI a steady stream of internal Guild documents.

During the Guild’s 1973 national con­vention in Austin, Texas, for example, Rees provided the bureau with “ex­tensive” information, according to FBI memos, noting who spoke, what they said, the names of petition signers, and amounts of chapter contributions to the national office. He also supplied a letter concerning the Guild’s anti-surveillance project.

The Guild’s worst fears were not con­firmed until 1975, however, when New York State Assembly staff investigating Information Digest contacted them. The Reeses, now living in Baltimore, soon be­came central figures in anti-surveillance lawsuits brought by the Guild, the In­stitute for Policy Studies, and the Social­ist Workers Party. Shortly thereafter, ac­cording to a deposition Rees gave IPS attorneys, he transferred Information Digest‘s materials to McDonald’s office. McDonald brought O’Connor onto his congressional staff, and made Rees editor at Western Goals.

[related_posts post_id_1=”717255″ /]

When enough time had passed after the Reader’s Digest article to form a fat political cushion, FBI director Webster told Face the Nation in April that “the overall freeze effort does not seem to us to have been dominated … or successfully manipulated” by the Soviets. Yet those most vocal about alleged dissemblance in the freeze movement were most reticent about government reports on Rees’s shady past.

Reader’s Digest prides itself on its ac­curacy. It touts Barron, a former naval intelligence officer, as an expert on Soviet spying. But while Digest staff assured me that he’d picked up my messages, Barron returned none of my calls.

Last September, Jeremiah Denton en­tered some of Rees’s work into the Con­gressional Record to back up his claim that freeze supporters were commie dupes. Denton’s press aide said he was too busy for an interview during the next two weeks. But questioned briefly on his way to a Subcommittee on Security and Ter­rorism meeting, Denton said he was un­aware that the FBI had evaluated Rees as “unreliable,” or that the IRS had reported he was a “con man.” Asked if he did consider Rees reliable, Denton explained, “I was handed that stuff, that’s it, just to get information into the record on that matter … I didn’t get to see it … ”

McDonald refused requests for an in­terview. When shown a copy of an FBI memo on Rees outside an elevator, he summoned a nearby officer. “This reporter is bothering me,” he told the cop.

Rees himself, in an abruptly termi­nated interview, said he was merely a reporter with a unique philosophy. He said he favors stories that focus on “what I like to call the further shores of political thought, which range from Marc Raskin at IPS to Gus Hall of the Communist Party to the people who run Posse Com­itatus and the Minutemen and the Klan. And I see no difference between Marc Raskin and the Grand Dragon of the Klan because they’re both fuckheads … who want to control the world. I don’t like that.”

Rees claimed that similarities between his stories and the piece by Barron, whom he has described as a friend, were “coincidence.” He said Reagan had used his information during the 1980 campaign, and that while he was governor “members of his staff were getting Information Digest.”

He challenged charges that he or his wife had ever worked as government in­formants. “You just have to do one thing,” he said. “Find me proof that we have been paid informants … ”

Faced with such documents, however, Rees refused to comment and halted the interview. He and his assistant left our table at a congressional cafeteria, went directly to McDonald’s office, and slammed the door.

[related_posts post_id_1=”405355″ /]

In his suite at the J. Edgar Hoover Building, FBI assistant director Roger Young and two assistants sat at the op­posite end of a huge coffee table, on chairs about a foot higher than the long, low couch where I sat alone.

Young said the FBI was familiar with the Barron article, but could recall no White House requests to verify it. He shrugged off questions about Rees. “We cannot be involved in evaluating some­body’s factual situation,” he said. “Our job is not to evaluate one journalist’s statements.”

The agent who escorted me out suggested, “It would probably be better if you went through the White House.”

White House deputy press secretary Lyndon Allin spoke with me several times over the phone, carefully evading my questions.

“When the president said he verified the Reader’s Digest article, did he mean it was examined as to its factual content?”

Allin: “Well, I think the term ‘ex­amined’ is a little harsh …. ”

“Who would have actually checked it?”

“I have no idea … There was no for­mal investigation — we don’t do that with the free press in this country for crying out loud!”

“Can you tell me who, if not an agency, verified the Digest piece?”

“No. We don’t get into process around here. That isn’t the way you run a govern­ment.”

“Was the president aware that one of the main sources for the Digest story was John Herbert Rees, a former police informant whom the FBI once called an ‘unscrupulous, unethical individual’ and an ‘opportunist,’ whom the IRS once described as a ‘con man’?”

“I just told you I wasn’t going to go any further … ”

“Rees claims he sent materials to Mr. Reagan and his staff during the presidential campaign, and that tbe president used them. Is that true?”

“I have absolutely no idea.”

“The FBI seems to contradict the pres­ident’s assertion that the KGB is manipu­lating the U.S. freeze movement. They say they’ve attempted — and failed — to manipulate it.”

“No. I think they say they’ve at­tempted to control it … But the fact of the matter is that the definition of ‘ma­nipulation’ is, ah, I think, subject to some discussion … Look — I’m not Noah or Daniel or whatever his name was that wrote the dictionary. And I’m not gonna get into that. The president’s word stands. And that’s that.” ■


Beautiful Butchers: The Shah Serves Up Caviar and Torture

The proof that torture can look better through a cham­pagne glass and taste better after a mouthful of caviar will be provided next Tues­day by the arrival in the United States of someone who can boast of a most notable achievement: He has made torturers chic. Though Hitler won the ad­miration of half the British upper classes in the 1930s, even he could not make the same boast.

Yet the Shah of Iran, whose own father was so ardent an admirer of the Nazis that he abdicated in 1941, can claim a double distinction: being the bane of the U.S. taxpayers (who paid the bills for his instal­lation on the Peacock Throne and his maintenance thereafter) and being at the same time the toast of the smart set in Washington, New York, Paris, and London. Thus does the Shah differ from Idi Amin or the Em­peror Bokassa, for, though as many pris­oners scream in his torture chambers and face his firing squads, he is socially okay —  and so are his emissaries abroad.

The social success of the Shah in the galaxy of international despots is the end result of a careful campaign, premised on two vital ingredients: snobbery and cash. Barbara Walters was recently able to confide to her ABC audience that, “There aren’t too many kings and queens around these days. Of the handful left, two couples have particular fascination for Americans. England’s own Queen Elizabeth and Prince Philip. And, for different, reasons, the Shah and Empress of Iran.

[related_posts post_id_1=”720386″ /]

It was not always thus for the House of Pahlavi. The Shah can race a regal an­cestry only to his father, Reza Shah, a fellow of common origins who was hoisted onto the Peacock Throne in the ’20s by the British. Reza Shah’s achievements — apart from looting the Iranian people in a fairly methodical manner — included the intro­duction of torture on a wide scale. Thus, when the present Shah was finally and securely installed on the throne in 1953 with the help of the CIA, he was not particularly well placed to be a truly fashionable mon­arch.

But gradually he inched ahead of his peers, who at that time included such U.S. clients as Battista of Cuba and Trujillo of the Dominican Republic. Neither of those gentlemen ever had truly overweening social ambitions beyond the amassing of huge fortunes and the total control of their dominions. The Shah’s thoughts, however, always soared higher and he yearned to be placed in the national historical pantheon ranging back to the ancient Persian kings.

And in the eyes of international society, at least, he achieved his ambition with the famed coronation at Persepolis in 1967. Virtually every king was there except Kong. In a tented city a goodly proportion of the executives, chiselers, and spongers of western capitalism gathered to marvel and stayed to gorge at a coming-out gala for a regime of unexampled savagery.

Since then the Shah has gone from strength to strength, most notably in the boom days since the oil price hikes of 1973. Tehran is, as they say, the Mecca of every investment banker, industrialist, arms salesman, developer, and straightforward adventurer with a prospectus in one pocket and a bribe in the other.

[related_posts post_id_1=”717345” /]

Steady accrual of status was expressed through the increasing social success of the Shah’s plenipotentiaries abroad — most not­ably in the career of Ardeshir Zahedi, the present Iranian ambassador in Wash­ington. This Zahedi’s father, General Fuzullah Zahedi, was one of those instrumen­tal in securing the throne for the Shah in 1953. The son himself was once married to the Shah’s daughter. His function in Wash­ington has been that of every ambassador: to lie abroad for his country. Zahedi — as is evidenced in the gossip columns weekly — ­has managed to sell the beautiful people on torture by the simple expedient of throwing large parties, amply furnished with caviar. He mastered, you might say, the political economy of Elizabeth Taylor and realized that one star-studded bash, well-reported in the gossip columns, can do much to offset a couple of Amnesty reports about torture and a few intellectuals detailing exactly how the Shah’s secret police ripped out their fingernails.

Zahedi threw the parties and in they came. Henry Kissinger, Nancy Kissinger, Senator Ed Brooke, Elizabeth Taylor danc­ing wildly with Senator Ed Brooke, Marion Javits, paid by the Iranians for the pleasure of her PR. William Rogen, John Murphy, John Lindsay, Barbara Walters, Walter Cronkite, Julian Goodman, Gregory and Veronique Peck, Phyllis and Bob Evans, the Baroness Stackelberg, Mrs. Drew Pearson, Page Lee Hufty, Polly Bergen, Buffy Cafritz, Sandra McElwaine, Diane von Furstenberg, David Frost, Mr. and Mrs. Tom Braden, Mrs. Frank Ikard, Diana Vreeland, Andy Warhol, Yolanda Fox, even Birch Bayh. On and on the list of names goes, and on and on the parties go too: the political crowd, the Hollywood crowd, the art crowd, and the straight tacky crowd.

How do they like the parties and their host? Here’s a fairly representative series of remarks from Mrs. Bill Cafritz, wife of a Washington builder. “Every adjective in the book has been used to describe Ar­deshir,” she confided to The Voice‘s Jan Albert a few months back. “He’s a warm, marvelous host, expert with food and wines. He’s not just an ordinary host. His centerpieces are famous. He’s had glass globes with flowers coming out of them. For Andy Warhol’s party, he had hearts with Campbell soup cans. All his parties, in every detail, from food to music to guests to decor are highly imaginative. He makes every guest feel that he is intent and interested in them. An invitation from Ardeshir is something to be cherished. He invites all the glamour people — Polly Ber­gen and Diana Vreeland came to the Warhol party.”

Mrs. Cafritz was then asked how she felt about the matter of torture in Iran, and whether she had asked Zahedi about it. “He’s not anti-American,” she replied. “At almost all of his parties he makes after­ dinner speeches toasting the friendship of Iran and America. He is a good friend of America’s. Besides, these reports are exaggerated. There are open lines of communication between our countries and the Shah is our friend. It’s not for me to make judgments. They should be made at a higher level. Everyone just has the best to say about him.”

To a similar sort of query from Jan Albert, Mrs. Frank Ikard (wife of the head of the American Petroleum Institute) stressed the beauties of Zahedi’s charac­ter — “the most kind, warm-hearted man, the friendliest and most outgoing” — while taking a balanced view on the matter of torture. “I have never been interested in international news,” she said. adding that she was the kind of person who felt we should “clean things up in our own back yard first. Besides, if you had a brother who was a black sheep I wouldn’t hold it against you. These reports are largely youthful mutterings. Anyway, Ardeshir’s house is not the place to find out such things.” She added that her son, a reporter in Iran for the Tehran Journal, had never mentioned such subjects to her.

[related_posts post_id_1=”725566″ /]

And so it goes — from Elizabeth Taylor through fascist chic’s recording angel, Andy Warhol, with his Polaroid and his tape recorder.

Would they all go to a similar sort of bash, hosted by Amin’s Washington envoy? Probably not, for reasons of taste. And of course there is the fact that the Iranians are, as you might say, sophisticated — and not even Arabs at that: the children of Xerxes rather than Ham.

If the Shah’s regime were not so repul­sive, there would be something pathetic about his pronounced social ambitions and desire to make his palace a haven for the rich, the famous, and the beautiful. Not so long ago it was the turn of Farrah Faw­cett-Majors to rest up in the shadow of the Peacock Throne. In his arriviste dreams, said one journalist long in Tehran, the Shah probably thought a double-barrelled name was a sure emblem of ancient and distinguished social lineage.

The bloom is going off the rose. Despite Zahedi’s greatest efforts and the precipi­tate rush to his parties by the beautiful people, there is general recognition that the Shah’s regime is not an emblem of liberty. The U.S. will continue to sell him arms. American universities will go on taking his money, socialites will go on drinking his champagne and eating his caviar. Money always talks, but it will have to do so amid increasing clamor about one of the most savage regimes of the 20th century. ■

[related_posts post_id_1=”723288″ /]

How Rich is the Shah?

The present inhabitant of the Peacock Throne has attained the dream of every rich person around the world: he has funneled his assets into a private founda­tion whose proceedings are secret and whose operations are beyond scrutiny. The Pahlavi Foundation, now 19 years old, is thought to have assets of more than $1 billion and is a combined charitable foundation and family trust fund. The Shah is its chief officer and selects all board members. The income is tax-free and can be drawn only the Shah’s family.

The Shah’s father (a former army sergeant who seized the throne under the aegis of the British in 1926) laid the basis for the Pahlavi family’s wealth by simply stealing it. He confiscated vast estates which he designated as crown lands. His son later sold off some of this land and began to invest in industrial and financial enter­prises: the cement industry (which the Shah virtually controls); sugar-processing installations; insurance and banking businesses; assembly plants; hotels; computer equipment marketing, and the like. The Shah is thus not only the leader of his country; he is also its chief stockholder.

In addition, the national budget provides expenses for the imperial court, plus $1 billion for a revolving discretionary fund. Prudently mindful of the possibility of exile one day, the Shah is also thought to have over $1 billion banked abroad.

As the Pahlavi Foundation’s chief officer, the Shah is entitled to 25 percent of the income of the foundation. He has stipulated that he is not accepting this money. His son and heir will become entitled to the 25 percent take, which as Eric Pace of The New York Times pointed out last year in a report on the foundation — could run into tens of millions of dollars annually.

[related_posts post_id_1=”714924″ /]

New Yorkers who desire an immediate sense of the Shah’s financial status can proceed to the southwest corner of Fifth Avenue and 52nd Street where a 36-story building for the tax-exempt Pahlavi Foun­dation of New York is being erected. The Pahlavi Foundation of New York was created by the Pahlavi Foundation of Iran in 1973. The nominal charitable purpose of the New York outfit is to provide funds for Iranian students going to American universities. In an article on the U.S. founda­tion published last fall, Ann Crittenden reported in The New York Times that, “Two individuals close to these early arrangements say that from the first, howev­er, the acquisition [of the site] was con­sidered solely as an investment for the Iranian foundation and as a showcase site for offices of Iranian companies and government agencies in New York City — such as the Iranian consulate, the National Iranian Oil Company, the Bank Melli, and various tourist offices. One man who was intimately involved and who asked not to be identified, laughed when asked if the scholarship program was ever discussed: “It’s egregious,” he said,”with all of the problems New York City has, for an immensely wealthy foreign outfit to come in and receive a tax exemption at almost the same moment when the same government has just created an oil crisis.’ ”

Vitally concerned with the establishment of the tax-exempt foundation here were several well-known local faces: one was William Rogers, former secretary of state under Nixon and partner in the law firm of Rogers and Wells. Rogers set up the foun­dation and its address is currently at his law office. Also involved was Representative John Murphy of Staten Island, a frequent visitor to Iran. He, along with Rogers, is on the board of the foundation and has acknowledged his involvement in its business affairs, particularly in the construction contracting for the Fifth Ave­nue building. And indeed, helping out one would-be contractor — John Tishman of Tishman Realty and Construction Company — was former Mayor John Lindsay. The architect is John Warnacke. Another adviser to the Pahlavi Foundation is former Assistant Treasury Secretary James A. Reed. He told Crittenden that foundation officials in Tehran had said they would not go ahead with the New York operation unless they were able to get tax-exempt status. Thus, American tax­payers help finance an operation designed to further the Shah’s personal and political interests abroad. Even Amin hasn’t the gall to demand these kinds of favors. ■

[related_posts post_id_1=”714416″ /]

The Iranian National Pastime: Torture

“The torture on the second day of my arrest consisted of seventy-five blows with a plaited wire whip at the soles of my feet. I was whipped on my hands as well, and the head torturer took the small finger of my left hand and broke it, saying he was going to break my fingers one by one, each day. Then I was told that if I didn’t confess my wife and thirteen-year-old daughter would be raped in front of my eyes. All this time I was being beaten from head to toe.

“Then a pistol was held at my temple by the head torturer, Dr. Azudi, and he prepared to shoot. In fact, the sound of the shooting came and I fainted. When I opened my eyes, I was being interrogated by someone called Dr. Rezvan. The interrogation, combined with psychological torture and sometimes additional beating, went on for 102 days until I was let out…

” … There were also all sizes of whips hanging from nails on the walls. Electric prods stood on little stools. The nail-pluck­ing instrument stood on the far side. I could only recognize these devices upon later remembrance and through the description of others, as well as by personal experience. The gallows stood on the other side. They hang you upside down and then someone beats you with a club on your legs, or uses the electric prod on your chest or your genitals, or they lower you down, pull your pants up and one of them tries to rape you while you’re still hanging upside down …

” … This is what happens to a prisoner of the first importance. First, he is beaten by several torturers at once, with sticks and clubs. If he doesn’t confess, he is hanged upside down and beaten; if this doesn’t work, he is raped; and if he still shows signs of resistance, he is given electric shock which turns him into a howling dog; and if he is still obstinate, his nails and sometimes all his teeth are pulled out, and in certain exceptional cases, a hot iron rod is put into one side of the face to force its way to the other side, burning the entire mouth and the tongue. A young man was killed in this way. At other times he is thrown down on his stomach on the iron bed and boiling water is pumped into his rectum by an enema.

“Other types of torture are used which have never been heard of in other despotic systems. A heavy weight is hung from the testicles of the prisoner, maiming him in only a few minutes. Even the strongest prisoners are crippled in this way. In the case of the woman, the electric baton is moved over the naked body with the power increased on the breasts and the interstices of the vagina. I have heard women screaming and laughing hysterically, shouting, ‘Don’t do it, I’ll tell you.’ Rape is also a common practice. Thirteen-year-old girls have been raped in order to betray their parents, brothers or relatives.” Reza Bahareni was finally freed from the Shah’s prisons in 1974 under international pres­sure. His descriptions come from his book, God’s Shadow and from an article by him published in The New York Review of Books on October 28, 1976. Other state­ments attributed to Bahareni in this issue of The Voice are taken from the same article. ■

[related_posts post_id_1=”105301″ /]

Some Facts at a Glance 

• “The Shah of Iran,” said Martin Ennals in the introduction to Amnesty International’s Annual Report for 1974-5, “retains his benevolent image despite the highest rate of death penalties in the world, no valid system of civilian courts and a history of torture which is beyond belief.” The total number of political prisoners for 1975, stated the report, “has been reported at times throughout the year to be anything from 25,000 to 100,000.”

• Thousands of people have been executed over the last 23 years. According to Bahareni, more than 300,000 people have been in and out of jail in the last 20 years.

• Ninety-five percent of the press is controlled by two families taking their orders from the Shah and the police.

• There is only one political party — the Resurgence Party — whose membership is compulsory for the entire adult popula­tion.

• The vast bulk of the population is desperately poor, undernourished, and un­educated. In Quri-Chai, the northern slums of Tabriz, there is only one school for 100,000 children.

• There are 34 million people in Iran. Only half are Persian; the rest are Azar­baijanis, Kurds, Arabs and Baluchis, along with Christians, Jews, and Zoroastrians. The Shah considers all Iranians to be Aryan, who must learn one language, Persian. He is attempting to purge the Persian language of all Arab and Turkish elements, thus proscribing 40 percent of the vocabulary. The Shah himself speaks Persian badly, faring better in French and English. ■

[related_posts post_id_1=”714117″ /]

Why the US Backs the Shah

The reason the Shah is where he is today is because the U.S. government put him there.

By 1949, the Middle East was perceived by American foreign policy planners as perhaps the most critical area in the world in the contest between the U.S. and the Soviets. As George McGhee, then assistant secretary of state for Near Eastern Affairs, recently recalled in congressional testi­mony: “The governments in the area were very unstable. We had no security pact covering this area. The Soviets had threat­ened Greece, Turkey, and Iran. As a result of the very strong position taken by President Truman we were able to dislodge the Soviets from northern Iran, where they had demanded an oil concession. Although we had already bolstered Greece and Turkey through the Greek-Turkish aid program, both were still in a precarious state. The Arab states were hostile to us because of our involvement in Israeli affairs.”

McGhee pointed out, “At this time the principal threat to the Middle East lay in the possibility of nationalist leaders mov­ing to upset regimes which were relatively inept and corrupt, and not attuned to the modern world. There was also always in the background the reaction in the Arab states to what happened elsewhere. For example, had there been a Communist seizure in Iran, we would have expected a similar threat in the Arab states.” And, of course, underlying American concern for the politics of the region was the business of oil, which McGhee described as “the jackpot of world oil. To have American companies owning the concession there was a great advantage for our country.”

It was against this background that Iran’s nationalist premier, Mohammed Mossadegh, sought to increase the country’s participation in the affairs of the British-controlled Anglo-Iranian Oil Co.

When the British refused to meet his demands, Mossadegh nationalized the company. The seizure reverberated throughout the Middle East. In Saudi Ara­bia the finance minister threatened to shut down the Aramco concession if more money was not forthcoming.

[related_posts post_id_1=”714267″ /]

Both Aramco officials and the U.S. State Department, acting independently, con­cluded — as McGhee later put it — that a “big move had to be made.” Thereupon, the Middle East underwent political con­vulsions which eventually were felt within the U.S. itself. First, this country did a secret deal with Saudi Arabia that allowed Aramco to take a tax break, offsetting its royalty payments to Saudi Arabia against U.S. taxes. The net effect of this was a subsidy, continuing to this day, of Saudi Arabia and the oil companies by the U.S. taxpayer.

Meanwhile, the Justice Department, quite independently of other branches of government, began to press actively two grand jury investigations, attacking the international petroleum cartel. These in­vestigations followed publication of a lengthy report by the Federal Trade Com­mission, which spelled out the details of the cartel’s operations. When Dean Acheson, then secretary of state, found out about the Justice Department probe, he opposed it vigorously, on the grounds that the results of such an investigation “will probably be to cause a decrease in political stability in the region [Middle East].” Acheson’s view eventually prevailed and President Tru­man himself downgraded the inquiry from a criminal to a civil proceeding, on national security grounds.

Eisenhower, taking office at the start of 1953, held to the same line. By the middle of 1953 Allen Dulles, head of the CIA, turned up in Switzerland for meetings with Loy Henderson, the ambassador to Iran, and with the sister of the present Shah. Soon after, American intelligence agents — not­ably Kermit Roosevelt — appeared in Te­hran. The Shah dismissed Mossadegh, who paid no attention and remained in office. The Shah left the country. On August 18, units of off-duty police and soldiers joined mobs in overthrowing Mossadegh. The Shah returned from exile and, thus aided by the CIA and Iranian associates, took charge of the country.

Two months after the Shah was restored to power, Herbert Hoover, Jr., set to work reorganizing the Iranian oil industry. Hoover soon persuaded major American oil companies to join in a consortium that would exploit Iran’s oil: In part, they agreed with the plan because of the down­grading of the Justice Department’s cartel case. Eisenhower’s attorney general formally sanctioned the new deal, ruling that the proposed consortium would not, in itself, constitute an unreasonable restraint of trade. The cartel was never brought to trial and instead members of the consor­tium signed a participants’ agreement which had the effect of sanctioning the cartel and indeed making it an instrument of cold war policy.

[related_posts post_id_1=”724683″ /]

Hence it is no academic exercise to regard the Shah not only as a U.S.-­sponsored oppressor of his own people but of the American people as well. His role has been to help maintain the international oil cartel, with the resulting bogus shortages, price hikes, and penalties attaching to the present international system of oil extrac­tion and distribution.

Oil, of course, forms the basis for American interest in Iran. But in the last 25 years the game has changed somewhat from its original primitive terms. Now, in order to get the oil, the American government has to pay off the Shah in other ways. As part of the U.S.’s policy to maintain the Shah and his repressive apparatus, it was necessary to train and supply a police force and army for him. The tastes of the army have grown more profligate over the years.

In 1972, the U.S. was sending the Iranians a half-billion dollars worth of military armaments. In the current fiscal year the U.S. is sending $5.3 billion worth of weap­ons. This is paid for by Americans in the form of higher prices for petroleum products, and in aid. The long-term scheme for Iran is a vast process of industrialization, with American companies forming joint ventures with Iranian companies, leading toward the establishment of industries such as aluminum, steel, and a whole variety of mining exploration. The idea in this is not to make life any better for the Iranian people, but to achieve savings in manufac­ture, due to the plentiful and immediate supply of energy (natural gas).

The Shah, always a client of the United States, visits Washington next week (until the postponement of his trip, President Carter was to have dropped in on Tehran for lunch later in the month in the course of his grand tour). As Henry Kissinger remarked, the interests of the United States and Iran coincide, and Zbigniew Brzezin­ski, Carter’s security adviser, agrees. Iran is one of those impending powers, argues Brzezinski, to which the U.S. may pay court. Other nations on the Carter schedule included Venezuela, Brazil, and Ni­geria. For all the talk about human rights, the Carter administration has been careful not to offend Iran. The king of torturers will be received with decorousness and respect, even though any honest toast at the White House banquet would demand silence and sorrow for the thousands who have died for opposing a regime built in blood. ■

[related_posts post_id_1=”725990″ /]

Law Enforcement in Iran

Every tyranny needs an efficient secret police force and Iran can boast of one of the most awesome in recent world history —  namely, the infamous SAVAK.

The Sazamane Ettella’at va Amniyate Keshvar (State Security and Intelligence Organization) was set up in 1956 with the help of the American CIA and, according to some reports, Israeli intelligence. The Shah himself has claimed that SAVAK has about 3000 people. Other estimates put the number at more than 60,000 and beyond that to an army of agents and informants amounting to hundreds of thousands. SAVAK, controlled by the Shah, is now run by General Hossein Fardust, a former classmate of the Shah, described by him as “a special friend.”

SAVAK is not only the cutting edge of oppression and torture in Iran, but operates on a worldwide scale as well. Documented cases of its activities in Europe and the United States have received much publicity — including espionage and harassment of Iranian students working abroad and of political exiles. Agents of SAVAK have been dispatched abroad with missions of assassination.

This army of spies and torturers should have a special meaning for American citizens. As exiled writer Reza Bahareni put it: “Imagine a more tyrannical and primi­tive George III being crowned 6000 miles away by the very descendants of George Washington and Benjamin Franklin with money raised by the American taxpayer. The CIA re-created the monarchy, built up the SAVAK and trained all its prominent members, and stood by the Shah and his secret police as their powerful ally. Iran became the police state it is now.” Ba­hareni did not mention that as a final expression of courtesy Richard Nixon sent former CIA head Richard Helms to be the American ambassador in Tehran. ■

[related_posts post_id_1=”717255″ /]

Welcoming Committees 

Already, law enforcement officials In Washington are worried about reception committees for the Shah when he arrives next Tuesday. It is possible that as many as 20,000 demonstrators will converge from around the country for the two-day visit. A compromise supervised by the Secret Service and the National Park Service has stipulated that on Tuesday pro-Shah demonstrators will be allowed to congre­gate nearer the White House. Anti-Shah Iranian students will be given the prime spot on Wednesday, when he leaves.

According to Iranian students in the U.S. opposed to the Shah, SAVAK agents have been carefully building up for the Shah’s visit, offering individuals from all over the U.S. up to $300 to travel to Washington to demonstrate their loyalty. Iranian students in the New School’s political economy division have stated that they have been approached and offered bus fare to Washington, if they join the pro-Shah group. Anti-Shah demonstrations will also be held in San Francisco. The Shah will be staying in Blair House. No demonstrators will be allowed within 500 feet of the building.

Anti-Shah Iranian students in the United States have not only been harassed by SAVAK agents, but also by college administrations and U. S. police. Darioush Bayandor, adviser to Iran’s ex-prime min­ister Hoveida, has been quoted as saying that “SAVAK has agents outside Iranian borders to detect subversive elements and their links with other countries that might be against Iran and to penetrate the ranks of students and make sure their organizations are not used to harm Iran.” Iranian student groups at American colleges around the country have protested the interference of college administrations and police in their meetings, demonstrations, and finally their private conversations.

[related_posts post_id_1=”659688″ /]

At Emporia College in Kansas, a group of Iranian students were told that they would be arrested if they picketed in the presence of an Iranian government representative at a cultural day on campus. The official pretext was that the students were not an officially recognized organization. They had made repeated applications and were denied approval.

Ninety-two students in Houston, marching in front of the French Consulate at the end of 1976 to protest the expulsion of some Iranian nationals from Paris, were arrest­ed and beaten up by local police. Many witnesses have testified to the fact that the demonstration was orderly and peaceful and that the attack by police was unprovoked.

At San Jacinto College in Pasadena, Texas, students were forbidden to form a club by school officials who insisted that tapes of any meetings held in their native tongue be made and handed over to the administration for review. If held in Eng­lish, a school representative was to be present. This harassment culminated in several students being arrested for conversing in Persian over lunch. A teacher approached them and reminded them that it was against the rules to hold meetings in “a foreign language.” Police arrived and charged students with resisting arrest and menacing police and school authorities. In this and other in­stances, the police passed the names of Iranian student transgressors along to the Iranian consulate, and received letters of congratulation on a job well done and thanks from Zahedi. ■


New York’s Whitest

Keeping the Melting Pot on the Back Burner 

Last month New York City agreed to add 126 blacks, 167 Hispanics, and one Asian, along with 306 whites, to its ap­proximately 30,000-member police force. For the first time, minority police appoint­ments reflected New York’s ethnic re­alities — and the principle that all are equal in as well as under the law.

There is a general impression that we have Mayor Koch to thank for that: for his graceful yieldling, despite his high if con­tradictory principles, to a federal court­-ordered hiring quota for cops; yielding, that is, for the year or more it will take him to appeal it. As the reason for his good losership, Koch cited our urgent need for more cops to prevent imminent bloodshed, Miami-style.

But this was the very same reason he gave federal Judge Robert L. Carter back in December when Koch insisted the city couldn’t change its hiring policy for cops. No matter that Judge Carter had found (not for the first time) that this policy was discriminatory and therefore illegal.

[related_posts post_id_1=”721023″ /]

It was this attitude on the part of the city that led to the quota in the first place — and to Judge Carter’s charge that the city not only discriminated against its racial minorities, but did so deliberately.

Carter based his conclusion on court records stretching back over nearly a dec­ade of litigation, in an uphill and contin­uing struggle by the city’s black and His­panic cops to reconcile the letter and the spirit of anti-discrimination law.

The record shows:

  • The city’s Police Department and its Personnel Department knew as far back as 1969 that exams discriminated by race;
  • They knew by 1971 that such dis­crimination had nothing to do with the requirements of the job or ability to perform it;
  • Individual officials unable to act on that knowledge invited and encouraged the ongoing lawsuit by the minority cops,­ back in 1972;
  • Nonetheless the city chose to fight the case, and even now claims it has never discriminated against minority cops;
  • Throughout the course of subsequent litigation, the city continued to test and hire and fire without making any substantial changes in the system.

A decade later, minorities, now nearly half the city’s population, were still only 10 per cent of a police force whose most pressing task is to combat a rise in crime that is polarizing communities along ra­cial lines. Yet Koch in 1980 continues to fight an affirmative-action quota for blacks and Hispanics — a quota he en­dorsed two years ago for policewomen and, more recently, for city construction contractors from poverty neighborhoods. As if affirmative action was not a right but an act of charity.

[related_posts post_id_1=”724782″ /]

Carter’s view that the city dis­criminated with intent — not intent to do wrong, but intent not to do right — pre­vailed (along with his one-in-three quota) for seven months, from January of this year until last July. At that time, federal appellate Judge Jon Newman decided the city hadn’t erred on purpose, though it had erred, and the quota (reduced to one-­in-four) would stay in force.

Newman’s revision was hailed by the Koch administration as a “vindication,” and by the media as a breath of sanity and common sense (as though the perception of injustice were de facto a neurosis). Such a view of events and of Koch, who as mayor must take the rap not only for his own actions but for that of the city as a continuous entity, says a great deal about this moment in the recent history of Amer­ican civil rights.

Forget the editorial rejoicing over the arrival of our long-awaited troops; forget the staged spectacle of mayoral blessing upon the union of black and white in uniform; forget our (false) sense of satis­faction at a problem finally solved.

Look at the record and remember that this is supposedly an enlightened era, and we are supposedly an enlightened city. And then remember what is supposed to happen to people who forget history.

[related_posts post_id_1=”721001″ /]


In 1967, following a wave of racial violence, the federal Kerner Commission began looking at the low numbers of blacks and Hispanics in police departments across the country. Cities began to respond to the problem. In 1968, minority appointments to the New York City Police Department almost doubled: by 1970, when a job freeze halted all hirings, some 1400 minority officers had been hired, or 18.4 per cent of all appointments to the force between 1968 and 1970. And still the 29,500 member police department was, as the department itself observed, 90.8 per cent “lily white.”

This problem did not go unnoticed by the Lindsay administration. In August 1969, the city Department of Personnel released its two-year study of a previous civil service exam for the entry level posi­tion of patrolman.Comparing test-takers of similar employment, education, and family background, Personnel found that only “the ethnic factor” — race — affected exam scores. That finding prompted the department to investigate its most recent exams. The results would not be ready for four years, but eventually they and other studies supported the 1969 speculation of the personnel department: that greater numbers of blacks and Hispanics could have made perfectly fine cops but never got past the front door “because of below passing test grades which may have been unrelated to actual job performance.” (My emphasis.)

With this speculation, the anonymous drafters of the personnel study unwittingly hit upon the crux of a matter that still confuses many people — who ask, some­times pointedly, exactly how something “neutral” like a civil service test does discriminate racially.

The answer is not simply that we don’t know, but — as the personnel investigators foresaw — that it doesn’t matter just how racial bias is “built in” to an exam if the exam itself is irrelevant to the job.

This is the conclusion the U. S. Supreme Court reached in a landmark 1971 decision. In Griggs v. Duke Power Co., the court ruled that if minorities can prove a seemingly “neutral” job requirement or test has a racial bias, then that job re­quirement or test is illegal unless the em­ployer, in turn, can prove it is “job-related.”

[related_posts post_id_1=”724399″ /]

Proof that a test is biased is a straight-forward matter of statistics. Evidence that it is “job-related” (or that the employer genuinely tried to make it so) is more complex. But at minimum the employer is expected to be able to describe in simple English exactly what the job is (the writ­ten job analysis). And obviously, a positive relationship between an employ­ee’s test score and his or her on-the-job­performance would be helpful to the de­fendant-employer.

No such relationship was discovered when, in the fall of 1971, the personnel bureau within the police department re­leased its own study. Minority patrolmen, it noted, were promoted to detective slots a — promotion based on job performance­ — at a higher rate than their white col­leagues. Yet when it came to promotions of equal rank that required civil service ex­ams, minority patrolmen did poorly. In short, there clearly was no connection be­tween a minority cop’s on-the-job performance and the civil service test for promotion. Here was a strong suggestion that this would hold true for the hiring tests as well, which ought to have alerted top brass to the need for a written job analysis.

But as of March 3, 1972, Peter Smith Ring, special assistant to the commanding officer of the personnel bureau, was forced to warn the police commissioner:

There appears to be general agreement that existing testing, and our own past recruitment efforts, are the major roadblocks to adequate minority rep­resentation … I have deep reserva­tions about both efforts as they presently stand … it is impossible to develop a new test until we undertake a job analysis for the rank of pa­trolmen … To the best of my knowledge this is not being done … we have little time to lose.

In fact, the department had no time at, all. On that same day, black and Hispanic officers represented by the Guardian As­sociation and the Hispanic Society sued the city.

[related_posts post_id_1=”719880″ /]


The Guardians’ case did not catch its defendants, the city’s police and personnel departments, unawares. Behind the scenes, high-level city officials had not only acknowledged (if only to each other) that the department’s practices were dis­criminatory; they had already tried, and failed, to correct the problem.

The day the Guardians brought suit, the police department’s legal division delivered the fruits of its research on “the possibility that a significant legal trend may be developing” of anti-discrimination challenges to police departments.

The report, circulated in draft form before its official release, contrasted cur­rent laws with all the department knew of its recruitment and promotion practices and concluded they “are vulnerable to litigation charging discrimination. This Department and the Department of Personnel will be hard pressed to show job-relatedness … Such a suit … will have a good chance of success.”

The department did more than antici­pate the suit — it invited it. In 1971, an informal committee began meeting, com­posed of Police Commissioner Patrick Murphy, Deputy Police Commissioner Benjamin Ward, representatives of Mayor John Lindsay, and Personnel Director Harry Bonstein. Ward later testified to “an agreement pretty much all around the table, that something was wrong with our testing process … All parties agreed to that except Harry Bronstein. He was clear­ly opposed to changing the system.”

[related_posts post_id_1=”724625″ /]

Director Bronstein had been kicked up­stairs to his desk from a key spot in Lindsay’s budget burea, where he was know in that inflationary era as “The Abominable No-Man”. Says a former Lindsay administrator: “Bronstein was bright, he could have done anything, but he was a Depression baby. He wound up in civil service because that’s all there was.” In his official capacity, Bronstein appeared to his colleagues to be acting out of personal spite.

Whatever the reasons for it, Bronstein’s resistance was not overruled by the mayor.

Ward, Murphy, and representatives of the mayor met again, Ward said under oath, “and it was pretty much the con­clusion of the people then in that room that the problem was with the Depart­ment of Personnel … A strategy was then designed and devised to deal with the problem …” That strategy, as Ward testified, was to approach the NAACP. He said police and personnel were aware “that I had spoken to the NAACP Legal Defe1;1se Fund and asked them to bring an action both against the Department of Personnel and the Police …”

Today Ward is Koch’s commissioner of corrections. Through a spokesman, he says he may not comment, “but he stands on his testimony.” The staff attorney from the NAACP with whom Ward spoke, Eliz­abeth DuBois Bartholet, now of Harvard Law School, confirms it. The NAACP worked with the pro bond law firm that handled the suit; the Puerto Rican Legal Defense Fund was later brought in as well.

[related_posts post_id_1=”721906″ /]


But instead of using the suit to force the desired change in its policy, the ad­ministration chose to fight it. The enormous contrast between the city’s private actions and its public posture may be explained in part by Lindsay’s presidential ambitions, and by the rules of the game of politics: a public admission of racial guilt by city leaders, at a time when race relations were especially volatile and when moreover the police department was already under fire following the Knapp Commissions’s exposure of another kind of police corruption, would have predictably unpleasant consequences for the Lindsay administration. If any consideration other than this obvious political one entered into the city’s turnabout, today — eight years later — the matter is still under wraps. Jay Kriegel, who in 1972 was Lindsay’s liaison to the police department, claims total memory loss on this issue and is unwilling to have his memory jogged.

The Guardians challenged the use of seven exams given between 1968 and 1970 (the date of the last exam before the hiring freeze took effect), including the ones the city knew were discriminatory. Yet the first step of the city’s defense was to ask for still another study. Since the hiring lid was on, the Guardians agreed to postpone trial while this study, by the Rand In­stitute, was undertaken.

But before the results were in (they would, again, confirm the Guardians’ posi­tion) the lid was lifted, and the city­ — using familiar threats of civil unrest­ — proceeded swiftly to hire according to eligibility lists based on scores from the challenged exams.

The Guardians tried to halt the hirings, but the court waited so long before re­sponding that the issue became moot; then, for that reason, it denied their injunction request.

The lawsuit, however, had forced the city to hire all those applicants who’d passed the challenged exams, including the low-scoring minorities who would oth­erwise have been bypassed by the holding of a new exam. Thus both the Guardians and the lame duck Lindsay adminis­tration were content for the moment to leave matters in legal limbo.

[related_posts post_id_1=”4736″ /]

But then the Beame administration began and with it, the fiscal crisis: Despite expressions of concerns from city Human Rights Commissioner Eleanor Holmes Norton and from Mayor Abe Beame himself about the effect of civil service “separation policies” upon the last-hired minority workers, in 1975 22 per cent of all Hispanic cops and 18 per cent of all back ones were let go, compared to only 9.8 per cent of the white force.

Uncertainty in the press about whether more cops would be fired or rehired made it urgent for the Guardians to halt further job actions and seek adjusted seniority for those minorities hired later than they would have been but for poor scores on the biased exams. The Guardians renewed their case in 1976.

At the trial that year, the city insisted the exams were valid, job-related ones, although it was still unable to produce a written job analysis. It also tried to poke holes in the by now overwhelming mass of statistical evidence (much of it collected by the city itself) of discrimination — in short, to deny the facts.

Finally, in its ugliest move, the city argued that it had never discriminated because Title VII, the part of the Civil Rights Act that bans job discrimination, didn’t apply to cities until March 1972 (just three weeks after the Guardians’ suit was first filed). Since all the recent hirings and layoffs were based on exams given before 1972, the city claimed they weren’t discriminatory.

This reasoning, set side by side with the evidence above that the city knew long before 1972 that it was discriminating due to race, was rejected by Judge Carter — ­first in March 1977 and again in February 1979 (Carter was required by the appellate court to reconsider in light of a then-recent Supreme Court decision that appeared to lend weight to the city’s argument).

[related_posts post_id_1=”715930″ /]

At this point, enter Mayor Koch.

Faced with Carter’s reaffirmation that the 1968-70 exams were biased and that the city was wrong to use them, Koch could have decided to drop the line he’d inherited from Beame and move to settle with the Guardians in good faith. He was not dealing, after all, with the kind of “radical,” “revolutionary” black politi­cians he claims to abhor, but with a group of hard-working, dues-paying family men who wished for nothing more than the means to be among those middle-class, law-abiding citizens Koch considers his constituency.

Koch chose instead to apeal. He lost that appeal before Appellate Judge Thom­as Meskill, in a decision that was totally ignored by the press, last July 25. The city is appealing and this time so are the Guardians, because Judge Meskill has re­duced by about 700 the number of minor­ity officers who could receive retroactive seniority in, compensation for the city’s actions.

Koch had had another opportunity to turn over a new leaf in the fall of 1978 when, true to his campaign pledge to hire more cops, his administration made plans for a new patrolman’s eligibility exam, from which 4000 officers were to be hired over the course of his administration. Yet Koch failed to ensure that the lessons of the past were respected. Though changes were made in the test-preparation process, they seem to have been executed in a spirit of indifference to its impact on the lives of real people — and with a carelessness that could only be from stupidity or arrogance.

The facts support at minimum the Guardians’ claim that the new exam was biased. Of those who passed the exam, held in June 1979, 15.4 per cent were minorities, though they formed at least 30.9 per cent of all test-takers; in contrast 66.6 per cent were white, though whites were only 53.8 per cent of the total. (A number of applicants declined to identify themselves by race.) The statistical dis­parity, the courts agree, is too great to be by chance.

[related_posts post_id_1=”725262″ /]

The Guardians filed their complaint last October. But in November, the month of the trial, the city went ahead and hired using the contested exam. Of the 415 ap­pointees, all but 45 were white. And even as Judge Carter mulled over his decision, the city announced a second group to be hired in January 1980: of a total of 380, only 38 would be minority officers.

The city’s expressed determination to use the challenged exam even after Carter personally informed its lawyers in Decem­ber that in his forthcoming opinion he would declare it illegal, forced Carter to issue his written opinion just hours after the last hearing on the case. Very likely the city’s uncooperative attitude, right down to the wire, helped settle any linger­ing doubts Judge Carter may have had about its good intentions.

Intentions were not legally at issue. The city hadn’t been charged with deliberate discrimination, because that — like rape before the corroboration law was repealed — is almost impossible to prove. But the question of good faith creeps in the back door when one must assess the credibility of a witness on matters of great complexi­ty; and Carter, unlike the Appellate court, has been dealing with the city on this issue for years.

His ruling, on January 11, found “that Examination No. 8155 was designed either with a deliberate intention to discriminate against blacks and Hispanics or with reck­less disregard of whether the test would have that effect.” And he ordered the hiring quota.

Of course, as we know, the city ap­pealed. Judge Newman of the federal ap­peals court was inclined to give the city the benefit of the doubt in matters of faith, but when it came to matters of fact he could only conclude the exam was illegal. He modified, but nonetheless upheld, the hiring quota.

Without that so-called “drastic” reme­dy, the number of black and Hispanic cops in New York City — after a decade of of­ficial affirmative action and litigation — ­would still be only 10 per cent.

[related_posts post_id_1=”722370″ /]



At each stage of these events, the mayor — Lindsay, Beame, and finally Koch — had two options: to make peace; or to accept the legalisms that propped up the city’s resistance, along with the prac­tical obstacles that he would otherwise have to struggle to overcome.

Like Lindsay, like Beame, Koch chose the latter course. Since he has bought it, Koch now must defend — along with the present — the past.

Why didn’t the city buck the civil ser­vice system? “Put yourself in the position of the police commissioner,” says one of Koch’s attorneys who is handling the case. “In the back of his mind are 29,500 white police officers, breathing down his neck.”

Why didn’t — why doesn’t — the city of­fer a settlement? “Where were we going to get the money for that? Do you have any idea how much that retroactive seniority would cost? There’s backpay, there’s pen­sion contributions … We can’t even total it up; we’ve tried.”

Yes, money is tight. Yes, the PBA, to which, in bitter irony, the minority officers must pay dues, has filed briefs against the Guardians in this case. (The PBA has also successfully fought efforts to bring quali­fied minority youths into the department under an internship program.)

But these aren’t reasons for the city’s stand, they’re excuses. The city lays the blame for the status quo on the status quo, a tautology that becomes more suspect when we look at what other cities have accomplished. Detroit, for one, has a vol­untary affirmative action quota for its police, one it was willing to go to bat for when white cops attacked it in court.

So have Tampa, Seattle, and Sacra­mento County. Closer to home, Syracuse, when its voluntary plan came under at­tack, worked out a settlement with the state Civil Service Commission; there is no reason why New York City could not do likewise. The long list of local govern­ments that have reached settlements in the past year rather than fight suits brought by the U. S. Justice Department (a “friend of the court” on behalf of the Guardians in this case) includes Cincin­nati, Fort Lauderdale, and the Ohio State Police.

[related_posts post_id_1=”717345″ /]

And New York, of course, is willing to promise hiring quotas to its policewomen. The consent agreement between the de­partment and the Policewomen’s Endow­ment Association in April 1978 pledges the department “will in good faith use its best efforts to have women comprise 10 per cent of the entry level police officer positions within five years of the date of this agree­ment. To achieve this goal the Police De­partment will use its best efforts to have women comprise a minimum of 30 per cent of the officers hired to the Police Department during the aforesaid five-year peri­od.”

Finally, only one explanation for the city’s intransigence remains. When I pressed Koch’s attorneys to explain why the city didn’t just bow to the inevitability of justice, they said — as Koch has said, in different words, before them — “But we haven’t done anything wrong.”

“You know, I used to be glad whenever I saw a black cop,” a friend of mine said not long ago, “and I used to think it was because I was so unbiased, because it confirmed my political beliefs.

“Then I realized that wasn’t it at all. I was happy to see a black man in uniform because that meant he was one less I had to worry about.”

I heard these words with a jolt of self­-recognition. My friend and I are white, we think of ourselves as decent and progressive. But there is more than one variety of racism.

So it is, speculates one of his adminis­trators, with Ed Koch. The mayor seems to see himself as he likes to see himself: he knows he means well. Trust him. And meanwhile, like the rest of us, he is trav­eling the path of least resistance, and we know where that leads — not despite, but because of “good intentions.” ❖

From The Archives Security show-old-images THE FRONT ARCHIVES Washington, D.C.

The CIA Report the President Doesn’t Want You to Read

A 24-Page Special Supplement

The Pike Papers: An Introduction by Aaron Latham

These are not the Pentagon Papers, but there are points of similarity. For, once again, an American president has set himself against the publication of a government study of dangerous government adventures. Once again the White House is seeking to protect the American people from a reading of a part of their own history.

The history in this case was written by the House Select Committee on In­telligence, which is chaired by New York Congressman Otis Pike. The com­mittee’s report was finished on January 19, 1976, but ten days later the House of Representatives voted not to release it until it is censored by the executive branch. Since the report details at great length all the obstacles which the execu­tive branch put in the way of the Pike committee from the beginning of its work to the end, the White House would not seem the ideal, unbiased expurgator. 

If the executive branch “sanitized” the report the way it sanitized many of the documents it turned over to the com­mittee, little would remain. For, according to the report, “sanitized” quite often turned out to be “merely a euphemism for blank sheets of paper with a few scattered words left in, often illegible, sometimes misleading, and usually in­conclusive. One page was blank except for the following: “3/ND/DOLL-VNM/T-0144-6SG TRANSLATED DECRYPT UNJAC/VN NR I Y 30/300G FM IJB TO CQ INFO BBM STOP CNMB 30119 5610M Tol: 30JA68/10/22 300.” Another page was blank except for the “TOP SECRET” stamp. 

At the moment, the White House and the House are stalemated. Perhaps this unofficial publication of the Pike Papers will moot that stalemate. The reports are now in the custody of Carl Albert, the Speaker of the House, who must decide what the House’s next move will be. One Congressional source says that Albert plans simply to sit on the report until the press prints it. Then he will be able to move to make it public officially. 

The Pike committee report is divided into three sections: (I) “The Select Committee’s Oversight Experience”… (II) “The Select Committee’s Investigative Record”… and (III) “Recom­mendations.” In the text which follows this introduction, we are printing only the second section and even here some of the footnotes have had to be trimmed for space reasons. (As a result, the footnotes are not numbered consecutively; we have followed the committee report’s numbering throughout.) We chose to omit the first section because it is primarily a record of the committee’s frustrations rather than its findings. We had no choice but to leave out the third section, the recommendations section, since, as we went to press, these had not yet been written.

[related_posts post_id_1=”695043″ /]

The first section of the report, missing here, begins with this sentence: “If the Committee’s recent experience is any test, intelligence agencies that are to be controlled by Congressional lawmaking are, today, beyond lawmaker’s scrutiny.” The document then goes on to present an 81-page catalog of obstruction which begins but does not end with the “sanitizing” of papers. 

For example, one Pike committee witness was harassed. A man named Martin Kaiser, who manufactures wiretap equip­ment, testified that the FBI bought eaves­-dropping devices from him through a middleman, the U.S. Recording Company. This middleman’s sole function was to camouflage the Bureau’s purchases, and yet the company tacked on a 30 percent markup to the price. The committee eventually learned that the president of U.S. Recording was a poker buddy of a top FBI official.

After Kaiser testified, two FBI agents subjected him to a six-hour interroga­tion. They then wrote out a statement recanting several trivial aspects of his testimony and stood over him while he signed it. Undaunted, Kaiser went back before the committee, complained about the harassment, and repudiated the statement written for him by the G-men.

But the biggest single obstacle, ac­cording to the report, was Secretary of State Henry A. Kissinger. The Pike com­mittee report accuses Kissinger of putting forth “a new doctrine that can best be characterized as ‘secretarial privilege.’ ” He defied Congressional subpoenas, prevented State Department witnesses from testifying, and leaked stories to embarrass the committee. 

The committee began the second sec­tion of its report, the section we do print, with an attempt to make visible the long invisible intelligence budget. The Pike Papers conclude that Congress is told that the intelligence budget is about $3 billion, but that it is really closer to $10 billion.

The report also concludes that even within the intelligence agencies, where they presumably know what the real budgets are, “spending controls [are] inadequate.” The study supports this allegation with such examples as the CIA station in a small country which turned in a one-year liquor bill of $41,000… the taxpayers’ money spent to provide heads of state with female companions” and more tax dollars invested in the making of pornographic movies, one of which was entitled Happy Days with former Hughes Tool executive Robert Maheu acting “as casting director, make-up man, cameraman, and director.”

What happened to that station chief who managed to spend $41,000 on alcohol? He was transferred to Angola.

Having answered the question, how much does it cost?, the Pike committee then turned to another question: Is it worth it? In attempting to answer this question, the committee undertook case studies of six intelligence failures: the Tet Offensive, the Russian invasion of Czechoslovakia, the 1973 Mid-East War, the coup in Portugal, India’s first atomic test, and the coup in Cyprus. 

They began with Tet. As background to this predictive failure, the committee chronicled the pressure on the CIA to provide “confirmation of the contention that there was light at the end of the tunnel.” For example, the committee reported that Walt Rostow, the then as­sistant to the president for national security affairs, asked the CIA for a report on pacification-program successes. When an intelligence officer replied that there had not been many, Rostow re­portedly replied, “I am amazed at your unwillingness to support the president in his time of need.” The agency eventu­ally did supply an optimistic pacification report, but with a caveat letter attached. Rostow removed the letter and then gave the report to the president, remarking: “At last an objective appraisal from CIA.”

[related_posts post_id_1=”717255″ /]

Moving from Asia to Europe, the committee found that we could be caught just as much by surprise in Czechoslovakia as in Vietnam. The committee dis­covered that one reason we did not anticipate the 1968 Russian invasion was simply this: “We ‘lost’ the Russian army for two weeks.”

How did we finally learn that the USSR was in fact invading Czechoslovakia? Soviet Ambassador Dobrynin called at the White House and told President Johnson that that was what Russia was doing. At least we had found the Russian army. 

Moving to the Holy Land, the com­mittee reported: “The Mid-East war gave the intelligence community a real test of how it can perform when all its best technology and human skills are focused on a known world ‘hot-spot.’ It failed.”

The failure of our intelligence before the Arab assault has been generally rec­ognized for some time, but the Pike Papers maintain that there may have been an even more serious intelligence failure after the attack. Since we had not anticipated trouble in the Middle East, our spy satellites were caught out of position. We were therefore unable to monitor adequately the progress of the fighting and wound up relying “al­most unquestioningly” on Israeli battle­field reports. We therefore believed the Israelis when they said they had not violated the cease-fire.

The Pike committee concluded: “Thus misled, the U.S. clashed with the better-informed Soviets on the latter’s strong reaction to Israeli cease-fire violations. Soviet threats to intervene militarily were met with a worldwide U.S. troop alert. Poor intelligence had brought America to the brink of war.”

Moving on to Portugal, the committee asked: “Do our intelligence services know what is going on beneath the sur­face in allied nations that are not making headlines?” The answer on April 25, 1974, turned out to be no. 

We failed equally to predict the first nuclear test in the Third World. It hap­pened in India on May 18, 1974. A De­fense Intelligence Analysis report issued shortly before the test carried this title: “India: A nuclear weapons program will not likely be pursued in the near term.”

A CIA post-mortem report said of our intelligence blindspot: “This failure de­nied the U.S. Government the option of considering diplomatic or other initia­tive to try to prevent this significant step in nuclear proliferation.”

[related_posts post_id_1=”714267″ /]

In Cyprus, our apparent failure to predict the overthrow of Archbishop Makarios helped set the stage for a spectacular diplomatic failure: we somehow managed to offend all sides and to under­mine NATO’s southern flank. However, in this case, it is not altogether clear how much of the blame belongs to the CIA and how much to the State Department. For some evidence suggests that we may not have been totally surprised by the Cyprus coup. 

The man behind the overthrow of Archbishop Makarios was Greek strongman General Dimitrios Ioannides, who happened to be on close personal terms with the CIA station chief in Athens. Evidently the station chief had exclusive access to the dictator, which meant that the U.S. ambassador to Greece was walled out. This special relationship be­tween our spook and their chief of state made many believe that we were either stupid in missing signs of a developing crisis — or else we encouraged it. 

An internal State Department memorandum, written by a critic of Kissinger’s handling of the Cyprus crisis, concluded: “I believe that strong U.S. representations to Ioannides would have prevented the crisis.”

The coup which the United States might have been able to prevent led not only to thousands of casualties, a near war between NATO allies, and a deterioration of our relations with Greece, Turkey and Cyprus. It also got an American ambassador killed. Roger Davies, our ambassador to Cyprus, was fatally shot during an anti-American demonstration at the embassy in Nicosia.

The Pike committee report says: “Contemporary accounts concluded that Davies was simply struck by a stray bullet. Information made available to the Committee suggests that Davies may have been the victim of an assassination.” Our intelligence and/or diplomatic failure may have led to the assassination of our ambassador. 

Having concluded that the U.S. tax­payer does not receive his money’s worth in foreign intelligence, the Pike com­mittee turned to domestic intelligence — ­and came to the same conclusion.

The Pike Papers report that the FBI investigated the Institute for Policy Study, a left-wing Washington think tank, for five years without ever observ­ing criminal violations. Yet the FBI manual states that investigations should be terminated within 90 days if criminal violations are not observed. 

[related_posts post_id_1=”717232″ /]

The FBI investigation of the Socialist Workers Party went on for 34 years. Back in 1941, the Bureau did prosecute several members under the Smith Act, but the portions of the law used to bring those cases have since been declared unconstitutional. Since 1941, the FBI has brought no charges at all against SWP members.

The net result of the IPS and SWP operations would seem to be 39 years of wasted funds.

[related_posts post_id_1=”714416″ /]

One of the most important conclusions reached by the Pike committee’s report is that the CIA is not a “rogue elephant” — as Senator Church, the chairman of the Senate select committee on intelligence, once called it. The Pike report says: “All evidence in hand suggests that the CIA, far from being out of control, has been utterly responsive to the instructions of the President and the Assistant to the President for National Security Affairs.”

The committee came to this conclusion after an unprecedented study of all covert operations approved by the Forty Committee over the past ten years. The Forty Committee, which is chaired by the president’s foreign policy adviser, is supposed to pass on all sensitive covert activities undertaken by the CIA. The Pike committee categorized different types of covert operations and looked for patterns.

It may surprise some to discover that the largest single category of covert activity concerned tampering with free elections around the world. These election operations make up a full 32 percent of the covert action projects approved by the Forty Committee since 1965. The report says the operations usually mean “providing some form of financial election support to foreign parties and individuals. Such support could be negative as well as positive.” Most of the money has gone to developing countries and generally “to incumbent moderate party leaders and heads of state.” One “Third World leader” received $960,000 over a 14-year period. 

The second largest covert action category is “media and propaganda.” The committee found that 29 percent of the covert projects approved by the Forty Committee fell under this heading. The report says: “Activities have included support of friendly media, major propaganda efforts, insertion of articles into the local press, and distribution of books and leaflets. By far the largest single recipient has been a European publishing house funded since 1951.… About 25 percent of the program has been directed at the Soviet Bloc, in the publication and clandestine import and export of Western and Soviet dissident literature.” 

The third largest category is “Paramilitary/Arms Transfers.” These make up 23 percent of the total Forty Committee–approved covert action projects. Although these rank third in total numbers, they rank first in expense. The committee report states: “By far the most interesting, and important, fact to emerge was the recognition that the great majority of these covert action projects were proposed by parties outside CIA. Many of these programs were summarily ordered, over CIA objections. CIA misgivings, however, were at times weakly expressed, as the CIA is afflicted with a ‘can do’ attitude.” 

[related_posts post_id_1=”716582″ /]

As a part of its investigation of covert action, the Pike committee examined three recent operations: our funding of pro-U.S. elements during the 1972 Italian election, our funding of the Kurdish rebellion in Iraq, and our assistance to one of the contending factions in Angola.

The committee report says that we spent $10 million in the 1972 Italian general election “perhaps needlessly.” The election produced not only a bitter struggle between Italy’s Christian Democratic party and its Communist party — it also produced an even more bitter struggle between our CIA station chief in Rome and our ambassador in Rome. 

The ambassador, Graham Martin, wanted to pour money into the election, but the CIA station chief cabled headquarters that “money is not the problem.” While this tug-of-war continued, President Nixon, according to the report, “was indirectly approached by prominent international businessmen, who were former nationals” of Italy. Ultimately the CIA was ordered to draw up a covert election-funding operation. The ambassador had won. 

Then Ambassador Martin wanted to run the operation himself as if he were the station chief. The actual station chief sent a memorandum to Washington, which protested: “I do not feel that any ambassador has the requisite background in clandestine activities to successfully manage a covert political action program.” But again the ambassador, backed by Kissinger, won. 

In charge now, Ambassador Martin decided he wanted to give $800,000 to General Vito Miceli, the head of the Italian military intelligence agency, described by the Pike committee as a man “clearly linked to anti-democratic elements of the right.” General Miceli currently faces charges in Italy for his alleged involvement in a 1970 plot to overthrow the Italian government. The failed plot was led by Prince Junio Valerio Borghese, known as the “Black Prince,” who hoped to rule Italy. 

Challenging the ambassador, the CIA station chief opposed giving money to Miceli. At one point the CIA man asked the ambassador if he really cared if Miceli’s proposed propaganda operation turned out to be successful. Martin replied, according to a CIA cable, “Yes, I do, but not a helluva lot. Important thing is to demonstrate solidarity for the long pull.” 

Relations between the ambassador and the station chief became so strained that the ambassador once told the CIA man he would “instruct the Marine guards not to let you in this building and put you on the airplane [home].” 

In the end, the ambassador and the station chief not only hated one another but the Christian Democrats did not do very well in the election. They narrowly won the general election — continuing an unbroken string since 1948 — but they suffered severe reverses in the subsequent local elections held last year. 

[related_posts post_id_1=”716252″ /]

But by then Ambassador Martin was no longer in Italy. He was our ambassador in Saigon presiding over an even greater foreign policy debacle, the fall of South Vietnam. 

In 1972, Dr. Henry Kissinger met with the Shah of Iran, who asked the U.S. to aid the Kurds in their rebellion against Iraq, an enemy of the Shah. Kissinger later presented the proposal to President Nixon who approved what would become a $ 16 million program. Then John B. Connally, the former Nixon Treasury secretary, was dispatched to Iran to inform the Shah, one oil man to another. 

The committee report charges that: “The President, Dr. Kissinger and the foreign head of state [the Shah] hoped our clients would not prevail. They preferred the insurgents simply continue a level of hostilities sufficient to sap the resources of our ally’s neighboring country [Iraq]. This policy was not imparted to our clients, who were encouraged to continue fighting. Even in the context of covert action, ours was a cynical enterprise.”

During the Arab-Israeli war, when the Kurds might have been able to strike at a distracted Iraqi government, Kissinger, according to the report, “personally restrained the insurgents from an all-out offensive on the one occasion when such an attack might have been successful.”

Then, when Iran resolved its border dispute with Iraq, the U.S. summarily dropped the Kurds. And Iraq, knowing aid would be cut off, launched a search-and-destroy campaign the day after the border agreement was signed.

A high U.S. official later explained to the Pike committee staff: “Covert action should not be confused with missionary work.”

In its section on Angola, the Pike committee says: “Information supplied to the committee suggests that the military intervention of the Soviet Union and Cuba is in part a reaction to U.S. efforts to break a political stalemate in favor of its clients.”

The committee also learned that a task force composed of U.S. experts on Africa “strongly opposed military intervention” in Angola, but National Security Council aides removed this recommendation from the task force report.

At one point, the Forty Committee approved $300,000 for non-military activities in Angola. Part of this money went to pay for 50,000 campaign-style FNLA buttons. But these did not seem to be winning any more battles than the WIN buttons at home. 

The Pike report also deplores seventeen wiretaps which the FBI “installed for Dr. Kissinger,” pointing out that these “posed a risk that the FBI could become the tool by which an administration in power obtains political information.”

And finally the study censures Henry Kissinger for his “passion for secrecy,” especially regarding possible violations of the Strategic Arms Limitation treaties. The committee says: “Nowhere is the risk of corrupting intelligence greater than in recent efforts to restrict and shape important data on Soviet compliance with strategic arms agreements.”

In many ways, the moral of the Pike Papers seems to be: controlling the intelligence community must begin with controlling Henry Kissinger.

The Select Committee’s Investigation Record


  1. Deceptive Budgets 
  2. An Absence of Accountability 
  3. Spending Abuses
    Covert Procurement 
    Local Procurement 
    Accommodation Procurements
    Research and Development 
    Colleges and Universities 
    U.S. Recording Co.
  4. Budget Secrecy 


  1. TET: Failure to Adapt to a New Kind of War
    The Order of Battle Controversy 
    The Consequences
    The Aftermath
  2. Czechoslovakia: Failure of Tactical Warning 
  3. The Mid-East War: The System Breaks Down 
  4. Portugal: The U.S. Caught Napping
  5. India: Priorities Lost
  6. Cyprus: Failure of Intelligence Policy 
  7. Domestic Internal Security and Counterintelligence
    Institute for Policy Studies 
    Socialist Workers Party
  8. President’s Foreign Intelligence Advisory Board 
  9. National Security Council Intelligence Committee
  10. The Management and Production of Defense Intelligence

C. Risks

  1. Covert Action
     Ten Year Survey 
    Election Support 
    Media and Propaganda 
    Paramilitary/Arms Transfers
    Organizational Support
    Three Projects
  2. Intelligence Collection
    Interception of International Communications
    Manipulation of the Media
    CIA Presence in the Executive Branch
    CIA Relationships with U.S. and Foreign Police
  3. Domestic Intelligence Investigations
    Programs as Abuses
    Law Enforcement Turned Law-Breaking
  4. SALT: Political Control of Intelligence 

The Select Committee’s Investigation Record


No money shall be drawn from the Treasury, but in Consequence of Appropriations made by law; and a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time.
Art. l, Sec. 9, cl. vii, U.S. Const. 

Money and spending were the first topics of Committee hearings. This choice of a beginning was founded on Constitutional responsibilities, and it implemented a straightforward investigative tech­nique — by following the dollars, the Committee would locate activities and priorities of our intelligence services. 

The inquiry was fruitful and interesting. By the time it was over, GAO accountants on loan to the Committee had concluded that the foreign intelligence budget is three to four times more costly than Con­gress has been told. (135) An OMB review of the domes­tic intelligence budget, conducted at the Commit­tee’s request, concluded that it may be five times the estimate given to Congress by federal officials. 

Totals do not tell the whole story. Congressional and Executive scrutiny of these budgets was found to range somewhere between cursory and nonexistent. Spending controls by the agencies themselves were, likewise, often inadequate, as a few preliminary examples indicate. 

  • A CIA Station in a small country spent $41,000 on liquor in one year.
  • Taxpayer monies were spent to provide heads of state with female companions, and to pay people with questionable reputations to make pornographic movies (137) for blackmail. 
  • The “accommodation procurement” mechanism was used to buy limousines for foreign dignitaries, with cash payments that were difficult to verify. 
  • A huge arsenal of weapons and access to ammu­nition have been developed by CIA, giving it a capa­bility that exceeds most armies of the world. 
  • A middleman who is a close friend of top FBI officials tacked thousands, if not millions, of dollars of unwarranted markups on to covert pur­chases. 

These examples reflect the wide range of problems with secret financing of secret activities. A more detailed review of these and other examples, along with the basic processes or mechanisms that accom­pany them, is a good base for suggested reforms. 

  1. Deceptive Budgets

Much attention is paid to numbers when the foreign and domestic intelligence budgets are prepared. Not much attention is paid to substance. 

The Office of Management and Budget (OMB), the Director of Central Intelligence (DCI), and other of­ficials go through an elaborate process in arriving at budget numbers. As described to Congress, it is an impressive procedure. 

What is not described is the close, almost inbred relationship between OMB officials and intelligence budget-makers. OMB also does not point out that it completely lacks the expertise to evaluate huge tech­nological expenditures by the National Security Agency. 

Executive officials do not stress the lack of a cen­tralized budget authority in the intelligence services, which causes enormous waste, duplication and hid­den costs in military intelligence. There is little con­sideration given to the extraordinary spending latitude granted to CIA, or to the CIA’s heavy use of “unvouchered”‘ funds. There is no explanation from FBI of the reasons for millions of dollars of “confidential” purchases. 

When appearing before Congress, executive officials do not review the inadequacies of internal Agency auditors. No mention is made of items trans­ferred elsewhere in the federal budget to keep the intelligence budget small. 

These officials do not remind Congress that our government’s auditors, the General Accounting Of­fice, have been denied access to secret intelligence budgets for more than a decade. They do not explain abuses of covert purchasing mechanisms, domestic as well as foreign. 

These same officials do, however, stress that anything they can or will say must be kept a secret. 

All this adds up to more than $10 billion being spent by a handful of people, with little independent supervision, with inadequate controls, even less auditing, and an overabundance of secrecy. 

It begins with OMB officials and their counterparts in the various agencies. Testimony before this Committee revealed that only six OMB employees work full-time on the foreign intelligence budget. Of those six, three are former CIA employees. In turn, the CIA official in charge of the Agency’s budget has re­cently arrived from OMB, where he had primary responsibility for ClA’s budget. 

This, in itself, does not bode well for a vigorous review of the merits of intelligence programs. It is set back further by the fact that OMB is not told of sensitive projects as they are being planned. Even after it is told, OMB’s officials are not free to evalu­ate all details of sensitive projects. 

The absence of real involvement by outsiders in intelligence spending continues. 

For example, CIA’s budget appears as only a single line item in the published Federal budget. This is done in the name of secrecy, but it gives CIA an un­usual advantage. Congress requires any agency wish­ing to transfer funds from one line item to another to come back to Congress for approval. 

This is called reprogramming. Most agencies have many line items, giving Congress some check on their spending. CIA has had no reprogramming problems in the past. It could tell Congress it was spending a certain amount on covert action, then proceed to transfer large amounts to covert programs without Congress’ approval. (148)

This is not, however, the most significant lack of knowledge about intelligence spending. Billions of dollars spent every year for intelligence are not in­cluded in the “official” intelligence budgets. 

One way this has been accomplished has been by shifting items that have traditionally appeared in the intelligence budget into other budget categories. For example, the Department of Defense has switched the following items, by reclassifying them as “com­munications”: Counterintelligence and Investigative Activities; Mapping, Charting, and Geodesy; and the Advance Location Strike Program. A sizeable secret reconnaissance activity at Defense was switched to “research and development.” All of these activities and many more were, until recently, in Defense’s in­telligence budget. (149) Defense is not alone in using this tactic. 

The costs given Congress for military intelligence do not include expenditures for tactical military intelligence, which would approximately double intelligence budgets for the three armed services. (150) Rough­ly 20 percent of the National Security Agency’s budget is not added into the intelligence budget. It should be noted that NSA does nothing else except gather and analyze technical intelligence, and it has one of the largest budgets in the intelligence com­munity. 

Sometimes entire agencies, such as the Defense Advanced Research Projects Agency are completely omitted from estimates of intelligence-related costs as well as the intelligence budget. 

The budget for the National Security Council is omitted completely, although a sizeable portion of their staff and subcommittees work exclusively on intelligence matters. (153)

Still another technique is undervaluation of the real cost of certain operations. The Committee ana­lyzed one covert operation and found that the dollar amounts given by CIA for weapons supplied were about half of the Defense Department’s contract prices.

At the Committee’s request, OMB did add up the total cost for all federal domestic intelligence, for the first time ever. The total they came up with was more than five times the amount that had been given to the Committee in testimony by domestic intelligence officials. (155) The FBI, for example, had neglected to include such clear intelligence functions as the National Bomb Data Center, or Counterintelligence. More significantly there had never been an attempt to add up all the divergent intelligence op­erations in the federal government. (156)

By using the new OMB figures for domestic in­telligence, and by adding such items as transferred expenditures, the full NSA budget, and revalued cost figures, the Committee estimated that the cost of intelligence today is at least three to four times the amount reported to Congress. 

An obvious question is how can there be such a difference in total cost estimates? One answer is the lack of coordination in approaching the budget. Another is that there are no adequate standards for what is, and is not, intelligence spending. A final answer may be that there is a conscious desire to keep the totals small, by dividing and confusing the estimates. 

It should be obvious that if nobody has ever added up the costs of the many domestic intelligence units, then certainly nobody is coordinating their budgets, as intelligence per se. In foreign intelligence, the problem is, to a large degree, a lack of centralized authority. For example, the DCI presents the entire foreign intelligence budget to Congress and the President, but he only has authority for CIA’s budget. Defense officials testified that a substantial part of their intelligence budget is considered the responsibility of the Secretary of Defense. The DCI, they say, merely reviews their work. 

Fragmented authority leads to overall coordination problems. A good illustration is the existence of sep­arate counterintelligence budgets in FBI, CIA, NSA, DIA, Army, Navy, and Air Force. (159) Some are in­cluded in the intelligence budget; some are not. Some coordinate with other counterintelligence programs; some do not. The FBI testified, for example, that it does not know if CIA has a counterintelligence group, that it does not know how much CIA’s operations cost, and that it does not know if CIA duplicates FBI’s work. (160

Fragmented authority and coordination leave the budget wide open to distortions. Each agency applies its own budget standards… 

There is, for example, no standard for allocating the cost of a military base whose primary purpose is to support intelligence operations. The repair of a submarine damaged on intelligence duty may or may not be included in spy costs. The Committee asked OMB, GAO, and all the intelligence agencies for their standards for allocating support costs. No agency had any to offer. No agency had even a basic defi­nition of intelligence. 

In a statement prepared for the Committee, the DCI made it clear that there are no good definitions in use today. As he said, “…[I]n essence, it boils down to a judgment call.”

The Committee has compiled its own set or sug­gested guidelines. (164) In addition, a good first step would be to include the same items in the intelligence budget from one year to the next. This alone would have prevented the official intelligence budgets from remaining at constant levels over the past few years, which is fundamentally deceptive.

(135) A special study done in 1971 by Dr. Schlesinger, as head of OMB, concluded that the foreign intelligence budget was nearly double the amount being told to Congress at that time. See, A Review of the Intel­ligence Community, OMB (March 10, 1971). 

(137) One of these was titled “Happy Days,” with Mr. Robert Maheu as casting director, make-up man, cameraman and director. 

(148) MR. ASPIN. For the record again, tell us who has to approve reprogramming, who is informed, and who approves reprogramming?
“MR. COLBY. I do.
“MR. ASPIN. And that is all?
“MR. COLBY. Yes…”
…Comm. Hearings… Aug. 4, 1975. 

(149) In total, the transfer of these programs from the “intelligence” portion of DoD’s budget to “Communi­cations” and “Research & Development” by them­selves involved hundreds of millions of dollars and thousands of personnel. 

(150) Some costs for military/tactical activities are dis­closed to Congressional Committees in chart form, entitled “Intelligence Related.” However, after examination, the staff believes that the charts vastly under­state the costs of military/tactical intelligence activi[ties].

(153) Examples of this would be the Forty Committee whose sole task is to approve covert action projects, or the Verification Panel and its Restricted Working Group who verify intelligence indicating alleged Soviet violations of SALT. 

Letter to Staff Director. from Mr Ogilvie, OMB, Nov. 12, 1975:

Department of Justice
                                                                           FY76 except as noted
                                                                               $ in K      Personnel
Deputy Attorney General’s Office                      125                    5
Federal Bureau of Investigation                     87,119             3385
Drug Enforcement Administration                11,913               463
Immigration & Naturalization Service              814                 38
Criminal Division                                               1,262                  51   
–                                                                          101,233             3942

Civil Service Commission
National Agency Check & Inquiry                   3,366               265
Full Field Investigations                                   15,386               722
Other Investigations                                           3,082                 95     
–                                                                             21,834             1082

Department of Treasury
Bureau of Alcohol, Tobacco & Firearms       62,929            2269
Customs Service                                                183,441             7748
Internal Revenue Service
     Intelligence Division                                    101,942            3813
     Internal Security (Inspection)                       12,141              553
Secret Service                                                      94,466            2934
INTERPOL dues                                                       140*          —–
INTERPOL other                                                     388*          —–     
–                                                                            455,447           17,317  

Energy Research & Development
                                                         295                 15

TOTALS                                                              578,809        22,356”
*1975 costs                                                           ———-       ———-

(156) Testimony on Aug. 7, 1975, by Eugene W. Walsh, Assistant Director, Administrative Division, Federal Bureau of Investigation:
“MR. FIELD. It sounds like that is all they are over there for and that it is a way of shifting the real cost of intelligence out of that budget. How about the National Bomb Data Center?
“MR. WALSH. Yes, sir.
“MR. FIELD. That is intelligence?
“MR. WALSH. It may be in the dictionary’s definition, sir, but it is not in ours.” Comm. Hearings… Aug. 7, 1975.

(159) When Mr. Walsh appeared before the Committee on Aug. 7, 1975, he was asked if FBI was aware of the multitude of counterintelligence programs:
“Are you aware that the CIA, the DIA, the Army, the Navy, the Air Force and NSA, all have their counterintelligence programs?
“MR. WALSH. I haven’t acquainted myself with their programs, sir.” Comm. Hearings… Aug. 7, 1975. 

(160) Mr. Walsh was also asked: “Do you know if the CIA spends more than you do?
“MR. WALSH. I would certainly think so.
“MR. FIELD. Has anybody in the administration ever told all of these people, who spend multi-multi millions of dollars, over and over again — really on the same program — has anybody in the vernacular of my generation, told them to ‘get their act together’?
“MR. WALSH. I have no knowledge on that, no sir.” Comm. Hearings… Aug. 7, 1975. 

(164) The Committee used three major classifications: 

  1. Foreign/National — This intelligence relates to “national” programs (i.e., overhead reconnaissance with various detection and sensing devices) targeted against foreign countries. Intelligence of this nature is “national” in the sense that it is a concerted effort of the CIA, DoD components and State Department.
    a. National intelligence is intelligence bearing on the broad aspects of U.S. national policy and national security transcending the competence of a single agency to produce.
  2. Domestic Intelligence — This intelligence includes activities of civil departments and agencies such as DEA, IRS, FBI. It is conducted within the United States and directed at U.S. citizenry.
  3. Military/Tactical — Intelligence of this nature includes a variety of DoD activities to support military commanders ranging from detailed weapons performance assessments of our adversaries, to R&D projects for upgrading present radar early warning and ocean surveillance and patrol systems.
    a. Tactical intelligence is intelligence in support of military plans and operations at the military unit level.
    b. Strategic intelligence is intelligence in support of military plans and operations at national and international levels.

2. An Absence of Accountability 

The General Accounting Office (GAO) is the auditing arm of Congress. When it comes to intelligence agencies, that arm is no arm at all. 

In the early years, GAO was generally limited to an auditing function. With the passage of time, Congress has turned to GAO for more than balancing books. Today, under authority of law, GAO is empowered to analyze the economy and efficiency with which government funds are spent. 

The Comptroller General, who heads GAO, testified that he cannot even balance CIA’s books, let alone analyze its efficiency. Specifically, he said that from 1962, GAO has made no attempt to audit the CIA, because it was allowed scant access to classified spending. 

Last year GAO was directed to compile basic budgetary information on federal investigative and intelligence functions. It was refused information by CIA, NSA, and intelligence agencies of the Defense Department. In another recent instance, the FBI refused to permit GAO to examine case files. The Bureau offered special summaries, but refused to allow any verification of those summaries. 

The Executive agencies’ treatment of GAO is curious. In January 1966, the CIA enter into a sole-source contract with the management consulting firm of Peat, Marwick, Livingston & Co., for a total contract price of $55,725.00. CIA could have saved taxpayers some money, if it had given GAO access. 

CIA officials conceded that these independent consultants were given complete and free access to all classified procurement documents, as well as all personnel concerned with Agency procurement activities. In June 1966, the firm completed its work and issued a full report of findings and recommendations. A cover memorandum addressed to the Inspector General expressed appreciation for the Agency’s full cooperation. 

By contrast, this Committee’s staff encountered lengthy delays in gaining limited access to similar documents and personnel, including the report of Peat, Marwick, Livingston & Co. 

The issue is not really whether Congress — with Constitutional responsibility for federal spending — should have equal access with a private company. The issue is whether an objective look at secret expenditures ever takes place. 

It does not take place at OMB. GAO cannot look. Even this Congressional investigating committee has now tested access and come up wanting. 

Do intelligence agencies themselves adequately audit their own operations? No. 

The CIA is a good example. Their audit staff is undermanned for a comprehensive review of complex and extensive agency spending that takes place worldwide. They are allowed to balance books, but they are not always allowed to know the exact purpose of expenditures. Only five percent of all vouchered transactions are checked, even though these add up to 20 percent of CIA’s entire budget. Substantive corroborating records are not kept. Their audits deviate from the standards of professional Certified Public Accountants, and CIA has not compiled a list of these exceptions to control the deviances. 

These and other shortcomings in audit and control, for both foreign and domestic intelligence agencies, lead to an inevitable result — spending abuses. 

3. Spending Abuses 

The easiest way to illustrate problems encountered in secret spending is to examine a number of mechanisms currently in use, and a number of situations that have grown out of those mechanisms. 

a. Covert Procurement 

Many CIA covert actions and clandestine operations must be supported in a “non-attributable” manner, which led CIA to establish a covert procurement branch. Unfortunately, covert procurement has become an overused, expensive, and often uncontrollable technique for questionable purchasing. 

The branch’s activities include support of overseas stations and the procurement of weapons and paramilitary materials. To facilitate these requirements, covert procurement has under its control a number of operational proprietaries and “notional” companies. Notional companies are merely paper firms, with appropriate stationery and checking accounts. These companies make requests to the proprietaries so the proprietary can bill an apparently legitimate company for covert requirements. Needless to say, it is an expensive way to buy a refrigerator, and should not be used unnecessarily. 

When an overseas station requires an item that cannot be traced to the United States government, it sends a requisition with a special code. One code is for items that should not be traceable to CIA. Another code means it should not be traceable to the U.S. government. 

Theoretically, once these codes, called “sterility codes,” (180) are attached, there is no more traceable involvement with the government. However, the Committee reviewed documents which showed that items purchased in a non-traceable manner are sometimes transported by U.S. military air-pouch, rather than sent by private carrier as a truly non-government purchase would be. 

Another procedure which the Committee staff questioned was the routing of requests for small quantity, low-cost, and even non-traceable items through the expensive covert process. The logical alternative would be to have the item purchased either overseas or here with petty cash, avoiding the expense of covert procurement. These included such items as quantities of ball point pens, ping-pong paddles, or hams. 

The staff was also unable to determine the reason for certain high-cost items being purchased through this mechanism. Hundreds of refrigerators, televisions, cameras, and watches are purchased each year, along with a variety of home furnishings. 

The question is why an American television would be purchased here and sent to Europe if someone was trying to conceal his involvement with the United States. This is especially true because the power requirements abroad are different, and a transformer has to be installed on an appliance bought in the U.S. before it will work. In fact, a large percentage of electrical appliances did not have transformers added, which raises the possibility that these items are being covertly purchased for use in the United States. 

The same question arises with the purchases of home furnishings. A review of overseas station purchases showed, for example, that one station bought more than one hundred thousand dollars of furnishings in the past few years. In that context, additional covert purchases here at home seem excessive. Finally, why not buy a Smithfield ham through normal purchasing channels? There is no way that ham could be traced to the CIA or the U.S. government, no matter how it was bought. 

As in every other component of the Agency, the effort to maintain secrecy, even within the branch itself, is highly emphasized. 

The Committee was told that because proprietary employees do not have a “need to know,” they are not put in a position to question any request the Agency might make. Three high procurement officials have conceded that the sterility code is not questioned by the covert procurement staff. The 1966 study by Peat, Marwick, Livingston & Co., stated that there was excessive use of these codes, without justification. (188) The Committee’s investigation indicates that this situation has not been remedied. 

b. Local Procurement 

The Committee’s investigation of the covert procurement mechanism led to a review of records from local, or in-field, procurement. The staff reviewed records for the past five fiscal years from three typical overseas stations varying in size and number of employees. Overspending and under-auditing seemed to be prevalent. 

An example is a medium-sized station that purchased over $86,000 in liquor and cigarettes during the past five years. (189) The majority of these purchases were designated “operational gifts” — gifts to friendly agents or officials in return for information or assistance. 

It would appear that spending practices have an uncanny way of changing with new station chiefs. A station that purchased $41,000 in liquor in 1971, had a new chief in 1972. Liquor purchases dropped to $25,000, which is still a lot of liquor. (190

One station had purchased over $175,00 in furnishings for leased quarters and safehouses. (191

In an effort to determine whether this kind of spending is questioned by CIA auditors, the staff interviewed the CIA audit official who audited these stations. He recalled the liquor, and that when he inquired as to the quantity, he was told by the Station Chief that they would “try to hold it down in the future.” (192) The same auditor had audited the station that purchased over $175,000 in furnishings. When questioned, he was not even aware of the total figure. 

This experience led the Committee staff to interview several members of the Internal Audit Division, as well as eight overseas case officers and chiefs of station. From these interviews, several things became apparent. 

Auditors do not perform thorough reviews of case officers’ “advance accounts.” At all overseas stations, each case officer is allotted an advance, which is nothing more than a petty cash fund. From this fund, the officer pays operating expenses and the salaries of his agents. He is required by Agency regulations to obtain a receipt for every expenditure, but, due to manpower considerations, these are only spot-checked when audited — which is not often. (195) Such funds run into millions of dollars each year. 

Every case officer and Internal Audit officer conceded that the Agency must “rely solely on the integrity of its case officer.” When a case officer’s agents refuse to sign receipts, the case officer “certifies” that he expended the funds. A case officer might have as many as ten agents working for him, each of whom may receive between $50 and $3,000 per month, all in cash. 

Finally, audits of all overseas stations are not performed on a regular basis. It may be two or three years, or more, before a station is audited. Even then, the Committee discovered that recommendations made by auditors are usually not disclosed in the auditor’s report to headquarters.

c. Accommodation Procurements 

In addition to procuring goods and services for its own use, CIA makes “accommodation procurements” for foreign governments, officials, agents, and others. 

The Agency serves more or less as a purchasing agent for an undisclosed principal. Although the individual for whom the accommodation procurement was made advances the necessary funds or repays the Agency after delivery, the indirect administrative costs are borne by American taxpayers. These costs include the salary of the agency purchaser, certain transportation charges, accounting costs, and in some cases the salaries of training and technical personnel. 

In investigating one series of accommodation procurements, the Committee learned that a foreign government received a 20 percent discount by having CIA buy equipment in the name of the U.S. government. 

If the foreign government had contracted for the same items in its own name, this discount would not have been available. In just two of these actions CIA saved the foreign government over $200,000, at the expense of American suppliers. 

The Agency will usually refuse to make such procurements only if the requested item might appear to be beyond the requester’s financial means, and might therefore give rise to questions about the requester’s sources of income. Agency security officers feel that such questions might lead to disclosure of the requester’s relationship with the agency. 

Accommodation procurements involving less than $3,000 require only the approval of a CIA chief of station. When larger sums are involved, approval must be obtained from the Deputy Director for Operations. When the amount is more than $500,000, it must also be approved by the Director of Central Intelligence. 

The Committee examined a number of accommodation procurement records. The following two examples illustrate that the facilities and resources of the United States government are sometimes used to satisfy little more than the whims of foreign officials. 

In one instance, a foreign official described his son’s enthusiasm for model airplanes to the chief of station. The foreign official wanted three model airplane kits, and even advised the CIA officer precisely where the kits could be purchased in the United States. A cable was sent to Agency headquarters asking for the purchase of three kits from the store in Baltimore suggested by the foreign official. Further, the cable instructed that the items were to be designated by a “sterility code,” to indicate that the purchase of the kits could not be attributable to the United States government. Documents provided to the Committee in this case by the Agency were sanitized. (206

In another instance, the President of an allied nation was preparing to play golf on a hot afternoon. Anticipating his thirst after several hours in the sun, he made a “priority” request to the local chief of station for six bottles of Gatorade. An Agency employee was immediately relieved of his ordinary duties and assigned to make the accommodation procurement. (207

Nor was this the chief of state’s only experience with the Agency’s merchandising talents. In the past, the Agency has purchased for him several automobiles, including at least two custom-built armored limousines, (208) and, among other things, an entire electronic security system for his official residence. It is worth noting that these security devices are being supplied to a man who runs a police-state. 

Accommodation procurements have also involved more expensive and politically sensitive items. For example, another head of a one-party state had long been fascinated by certain highly sophisticated electronic intelligence gathering equipment. He wished to develop his own independent collection capability. As an accommodation, and to “share the take,” the Agency procured an entire electronic intelligence network for him in two phases. Phase I involved contract costs in excess of $85,000, and Phase II cost more than $500,000. 

In investigating one series of accommodation procurements for an oil exporting country, the Committee asked CIA officials about the coordination and effect of the Agency’s purchasing favors on the foreign country’s oil pricing policy. The country’s oil policy, incidentally, has not been among the most favorable to the United States. Agency officials were uncertain as to the effect, but they indicated that the two policies are largely considered separate issues. 

In return for making accommodation procurements, the Agency is usually reimbursed by the requesting party. Although reimbursement may be in U.S. dollars, it is usually made in local foreign currency. (210) The Committee was unable to learn whether the Agency has any firm policy on what rate of currency exchange is to be used in making reimbursement. In many countries, U.S. dollars exchanged for local currency at the official rate bring fewer units of local currency than if exchanged at an unofficial, but more commonly used, rate. 

d. Research and Development 

CIA has long prided itself on technological capability, and many of its projects operate at far reaches of the “state of the art.” Such accomplishments are made by the Agency with assistance and advice from the private sector. 

Each year, CIA’s Deputy Director for Science and Technology enters into hundreds of contracts with industry, usually in the name of other government agencies. (211) These contracts total millions of dollars for Agency contracts alone. Not only does the Agency contract for its own research and development programs, but also for national intelligence programs. Total contracts for both programs amount to hundreds of millions of dollars, annually. 

Committee Staff interviewed numerous members of the Science and Technology Staff. A major target of this investigation was “contractor selection” practices. Although Mr. Colby testified before the Committee that CIA has established management controls to insure that contracting is carried out according to the intent of Congress, the investigation revealed that 84 percent of these contracts are “sole source contracts.” 

Staff also examined “cost overrun” aspects of research and development contracting. CIA claimed two and one-half percent of all research and development contracts involved cost overruns of 15 percent or more. There is no reason to doubt the figures; however, certain caveats must be considered. Contractors’ cost estimates in sole-source contracts can easily be inflated to cover anticipated cost increases. Overruns can also be labeled “changes in scope.” 

In several interviews with contracting officers, “by the book” answers were given to questions regarding which officer is authorized, and does, accept contract changes. However, one former Agency Contracting officer indicated that, to a considerable degree, the technical representative actually makes the contractual decisions, and the contracting officer then has to “catch up” by preparing contract amendments to legitimize changes already made. 

Another target of the investigation was the disposal of Government Furnished Equipment (GFE). Regulations regarding GFE appear to be precise in determining when to “abandon” this equipment. However, the Office of Communications, for example, contracted in 1965 with an electronics company to do research work. The contract required the purchase of a large piece of industrial equipment, as well as related testing equipment. CIA provided funds for the equipment as well as the research. (221) The testing equipment cost $74,000 and the industrial equipment over $243,000. At the termination of the contract in 1975, the testing equipment was sold to the contractor for $18,500, the large piece of industrial [equipment] was abandoned, in place. 

Calls to the manufacturer of this piece of machinery, as well as two “experts” in the field of this particular type of testing, revealed that the machinery which was abandoned, while perhaps “useless” to the Agency, was not a “worthless” piece of equipment which should have been “abandoned.” According to documents provided to the Committee, CIA made no attempt to contact other government agencies, to see if the chamber could have been used by another

e. Colleges and Universities 

In 1967 Ramparts Magazine disclosed CIA support to the National Students Association. As a result, President Johnson issued a flat prohibition against covert assistance to educational institutions; but the Agency unilaterally reserved the right to, and does, depart from the Presidential order when it has the need to do so. (224

There is no evidence that a President authorized this departure from the Johnson directive. 

As background, President Johnson had appointed a committee to investigate the matter and make policy recommendations. 

Under Secretary of State, Nicholas deB. Katzenbach, and CIA Director, Richard H. Helms, served on the Committee. It recommended that “no federal agency shall provide any covert financial assistance or support, direct or indirect, to any of the nation’s educational or private voluntary organizations.” 

On March 29, 1967, President Johnson issued a statement accepting the recommendation and directing “all agencies of the government to implement it fully.” 

The Agency then issued internal policy statements to implement the President’s orders, stating that, whenever possible, the Agency’s identity and sponsorship are to be made known. But the Agency was to clearly retain the option of entering into a covert contract with colleges and universities, after obtaining approval from the Deputy Director for Administration. 

Mr. Carl Duckett, Deputy Director for Science and Technology, testified before the Committee on November 4, 1975, that the Agency still has on-going contracts with “a small number of universities.” Mr. Duckett also revealed that some of the contracts involved “classified work,” and some are covert. 

f. U.S. Recording 

On October 9, 1975, the Committee held hearings on electronic surveillance in the United States. One of the witnesses. Mr. Martin Kaiser, was a manufacturer of electronic surveillance and counter-measure equipment. In the course of his testimony, he revealed that all sales of his equipment were routed — pursuant to FBI instructions — through a cutout or middle-man, U.S. Recording Company, of Washington. D.C. (232)

The equipment was neither modified nor serviced by U.S. Recording. Kaiser testified that he delivered 80 percent of his equipment directly to the FBI. On one such occasion Kaiser noticed an invoice from U.S. Recording for equipment he had supplied, and it showed that U.S. Recording had tacked on 30 percent more than it had paid for the devices. (235

The markup interested Committee investigators because, according to Kaiser, the middle-man had handled only paperwork and deliveries. The staff therefore acquired records of all sales between U.S. Recording and the FBI involving Kaiser’s equipment. A Committee staff accountant did a detailed study and determined that the 30 percent markup on the invoice seen by Mr. Kaiser was representative of all such sales. 

As a result of numerous interviews, it became apparent that Mr. Joseph Tait — the President of U.S. Recording— was a long-time friend and poker-playing companion of Mr. John P. Mohr, the Associate Director of the FBI in charge of Administration until 1972. (236)

During the course of investigation, the staff learned the poker games had been held at the Blue Ridge Club near Harpers Ferry, West Virginia, on several weekends each year for the past decade. (237) Guest lists included FBI officials connected with the Administrative Division, OMB officials, and a procurement officer from CIA. The only non-governmental officials at the poker games were Tait, and Mr. Gus Oberdick — the President of Fargo International — a supplier of police equipment to the FBI and CIA. (238) Mr. Mohr had invited all the guests, although Mr. Tait was the only person in the poker games who possessed membership in the Blue Ridge Club. 

Interestingly, the Blue Ridge Club burned to the ground the evening before two staff attorneys traveled to Harpers Ferry to examine its records. 

Most purchasing procedures of the FBI are governed by General Services Administration (GSO) regulations. However, confidential contracts are not subject to GSA regulations or supervision. The U.S. Recording Company was the sole company serving as an FBI cutout. (239) Interviews revealed that there was virtually no control exercised over the confidential contracts between U.S. Recording Company [and] the FBI. 

Neither the Laboratory Division, which initiated the equipment requisitions, nor the Administrative Division, which authorized the requisitions, had any knowledge of the percentage markup being charged. The General Services Administration was consulted and gave an opinion that an appropriate markup for similar services would have been in the 5 percent range. 

FBI’s use of U.S. Recording was apparently motivated by the need for secrecy in purchases of sensitive electronic equipment. That justification appears questionable. In most instances, FBI Laboratory Division personnel negotiated for equipment directly with the manufacturers. When manufacturers later received purchase orders from U.S. Recording, for equipment with corresponding model number, quantities, and prices, it was apparent that the equipment was indeed going to FBI. In fact, the FBI told Kaiser that they were using U.S. Recording Company and not to worry about it. 

FBI’s use of U.S. Recording represents a grossly inefficient expenditure for intelligence equipment. Similarly, the fact that the persons within the FBI responsible for requisitioning and purchasing the equipment had no clear knowledge of the chain of authority regarding the arrangement, is at best, nonfeasance. Further ramifications are presently being investigated by the Criminal Division of the Justice Department, and by the IRS. The Committee has made its information on this matter available to both authorities.

[related_posts post_id_1=”605560″ /]

(180) “Sterility Codes,” as they are termed within the Agency, designate the “degree of traceability” which can accompany an item procured or shipped. These codes range from “unclassified,” which may be attributed to CIA, to a code which designates that a purchase is so sensitive that it is an “off-shore purchase of a foreign item.” 

(188) …This was one of many deficiencies and recommendations highlighted by the study. Some of the recommendations were adopted; most were not, according to the Committee’s investigation. 

(189) This figure was computed by Committee staff during several reviews of Local Procurement expenditures for one of the three typical overseas situations. 

(190) Those two figures were likewise computed by Committee staff during reviews of Local Procurement records. The same Agency employee who was chief of the station in 1971, is now responsible for CIA operations in Angola. 

(191) Figures computed by staff during review of local procurement expenditures. “Leased Quarters” are housing units supplied by CIA for staff or contract employees at field stations. “Safehouses” are housing units where the Agency’s primary interest is that of a secure location to conduct clandestine meetings; its housing function, per se, is only incidental. The Agency also provides furnishings for these quarters, such as refrigerators, ranges, and living room furniture, and at times provides luxury items, such as china or crystal ware. 

(192) Interview with Agency auditor, by S. A. Zeune, Oct. 29, 1975. The auditor concurred, with another high level Agency official, that in the country in question, it was “traditional” to give liquor and cigarettes as gifts. He also stated, “the controls on the issuances [of liquor] are not so stiff.” 

(195) Ibid. Agency regulations permit expenditures of less than $15.00 without receipts. 

(197) Staff interviews with case officers and a former Chief of Station revealed this fact. Interviews, by S. A. Zeune, Oct. 17 & 24, 1975, copies on file with Sel. Comm. on Intell. Further, it was revealed during these interviews that polygraph examinations of staff employees, at one time carried out on a regular basis, are no longer performed except during pre-employment investigations. The agency continues, however, to polygraph indigenous agents on a regular basis. 

(206) This information first came to the attention of the Committee from staff review of requisition documents in Sept. 1975. Further inquiry about the model plane purchases led CIA to give staff access to the cables. 

(207) This was related to Staff, in response to questions concerning “accommodation procurements” made for the President of the allied country. The response was supplied by the former Chief of Station in the country. Interview with Chief of Station, by S.A. Zeune, Oct. 31, 1975, copy on file with Sel. Comm. on Intell. 

(208) CIA documents made available to the Committee revealed that the Agency made three such accommodation procurements for the Chief of State. In all three instances — three times in the last ten years — the Chief of State requested that CIA procure the limousines. A Staff interview with the former Chief of Station disclosed that in the instances concerning the limousines, the Agency was reimbursed by way of American currency, hand-delivered in bags or briefcases to the Station. In one instance, the transaction involved the equivalent of (U.S.) $50,000. Further, the documents appeared to reveal that the Agency was not disturbed by the fact that the President, in two instances, did not reimburse the full balance to the Agency until some months after the transaction had taken place. Interview with Chief of Station by S.A. Zeune, Oct. 31, 1975, copy on file with Sel. Comm. on Intell.

(210) A staff interview with the member of CIA Review Staff (and former Chief or Station) revealed that this is considered a further accommodation to the requesting party, inasmuch as the local currency is certain to be more readily available than U.S. dollars.

(211) For security reasons, CIA usually contracts in the name of other government agencies, such as Department of Defense, Air Force, or Army. Contractor employees are usually unwitting of CIA’s association, although in most cases a high company officer will be briefed by the Agency on a “need to know” basis.

(221) In this instance, CIA did not advance the funds to the contractor for the purchase of the test equipment or the industrial equipment. The cost of both was added to the contractor’s fee to the Agency. Interview with Office of Communications staff members, by S.A. Zeune and J.C. Mingee, Oct. 28, 1975, copy on file with Sel. Comm. on Intell.

(224) “3. It is proposed that upon your approval:
“a. The attached guidelines be applied immediately to all future contractual arrangements with U.S. educational institutions.
“b. Contracts and grants now in existence be conformed to these guidelines as rapidly as feasible and wherever possible, no later than 30 December ’67 for relationships that will extend beyond that date… The thrust of the review of existing contracts and the placement of future contracts will be that our contractor relationships with academic institutions will be strongly on the premise that CIA will be identified as the contractor… Any special contract arrangement will be considered only when there is extremely strong justification warranting a variance from the principles of CIA identification as the contractor. It is felt that the Agency must retain some flexibility for contracting arrangements’ with academic institutions and this can be carefully monitored and accomplished within the policies and principles expressed in the Katzenbach report…” Memorandum for Director of Central Intelligence, June 21, 1967. 

(232) “I began my relationship with the FBI around 1967 or 1968. All my correspondence was sent directly to the FBI. However, I think it was on only one occasion that the Bureau ever contacted me personally. All other addresses were made personally or verbally. Once they began purchasing equipment I was directed not to send this equipment to the FBI, but rather sell it to a company known as United States Recording, a private company operating on South Capitol Street in Washington, D.C. I informed the Bureau, as if they needed that piece of information, that Federal law would not allow me to sell equipment to anyone except bona fide governmental agencies. The FBI agents assured me my actions were proper and subsequently supplied a stamp to United States Recording which purported to certify on the purchase order that the transaction was in accordance with Federal law.” Comm. Hearings… Oct. 9, 1975. 

(235) “I might point out at this time, by the way, that nearly all the equipment deliveries I made to the Equipment Bureau involving orders to United States Recording were handled by me and billed to United States Recording. So the paperwork went through that route. I discovered at one time that United States Recording was adding a 30 percent markup on the bills for the equipment. During my dealings with the Federal Bureau of Investigation I sold them approximately $100,000 worth of electronic equipment.” Comm. Hearings… Oct 9, 1975. 

(236) “MR. VERMEIRE. Mr. Tait, I believe at the last deposition, November 21, you mentioned that you had played poker on a number of occasions with Mr. John Mohr, former Assistant Director of the FBI.
“MR. TAIT. Yes.” Interview with Mr. Tait, by J.B.F. Oliphant and R. Vermeire, Dec. 1, 1975, copy on file with Sel. Comm. on Intell.
“MR. VERMEIRE. And I think you testified that you had played poker with him not only privately at each other’s homes or homes in the area but also at a club up in Harpers Ferry. I think at the time that is all that was said; it was up in Harpers Ferry.
“MR. TAIT. That’s right.
“MR. VERMEIRE. What was the name of that club?
“MR. TAIT. Blue Ridge.
“MR. VERMEIRE. How did you become a member of the club?
“MR TAIT. I used to play cards up there… with another man by the name of Parsons, Donald Parsons (former Chief of the FBI Laboratory Division).
“MR. VERMEIRE. And was Mr. Parsons alive when you became a member?
“MR. TAIT. No.
“MR. VERMEIRE. How long had you been playing at the club prior to becoming a member?
“MR. TAIT. I don’t know. I’d say probably four or five years.
“MR. VERMEIRE. Who is the one business person who was connected with private enterprise that was there?
“MR. TAIT. A man by the name of Oberdick.
“MR. VERMEIRE. Mr. Oberdick?
“MR. TAIT. Yes.
‘”MR. VERMEIRE: May I have his-first name?
“MR. TAIT. Godfrey.
“MR. VERMEIRE. What business was he in?
“MR. TAIT. He is — I don’t know exactly what you would say. He is a representative to various companies that supply equipment. What companies, I’m not sure.
“MR. VERMEIRE. What kind of equipment?
“MR. TAIT. Firearms, tear gas.” Ibid. 

(239) This fact was established through numerous staff interviews with knowledgeable FBI personnel in the Laboratory and Administrative Divisions.
“MR. VERMIERE. Were there other companies that you dealt with in that way?
“MR. HARWARD. I don’t know of any company.
“MR. VERMEIRE. U.S. Recording is the only company that you know of that you had this confidential relationship with?
“MR. HARWARD. Yes.” Interview with Mr. Harward. 

4. Budget Secrecy 

During Senate hearings in 1975, to confirm James Schlesinger as Secretary of Defense, Mr. Schlesinger indicated it might be possible to make public the total budget cost of foreign intelligence. When William Colby was confirmed as head of CIA in 1973, he, likewise, testified that publication of budget totals might not be harmful. (244)

In a television interview some years later, Dr. Schlesinger inadvertently revealed the size of the foreign intelligence budget. No great harm apparently came from that disclosure. 

In 1973, a recommendation to publish the annual costs of intelligence was made by a Senate Special Committee to Study Questions Related to Secret and Confidential Documents. 

On June 4, 1974, Senator J. William Proxmire of Wisconsin offered a floor amendment to a defense procurement authorization bill. His amendment would have required the Director of Central Intelligence to provide Congress with an annual, unclassified report describing the total amount requested for the “national intelligence program” in the budget submitted by the President. 

In June 1975, the report of the Rockefeller Commission recommended that Congress carefully consider whether all or part of the CIA budget should be made public. 

On October 1, 1975, Representative Robert N. Giaimo of Connecticut offered a floor amendment to a defense appropriations bill, prohibiting any of the funds provided for “Other Procurement, Air Force” from being expended by the CIA. Had the amendment been adopted, a subsequent amendment would have been offered to restore funds for the CIA, and a specific total for the agency would have been disclosed. 

Today, however, taxpayers and most Congressmen do not know, and cannot find out, how much they spend on spy activities. 

This is in direct conflict with the Constitution, which requires a regular and public accounting for all funds spent by the federal government. 

Those who argue for secrecy do not mention the Constitution. They do not mention taxpayers. Instead, they talk of rather obscure understandings the Russians might derive about some specific operation, (251) even if all the Russians knew was a single total which would be in the billions of dollars and would cover dozens of diverse agencies. 

How the Russians would do this is not clear. The Committee asked, but there was no real answer. What is clear is that the Russians probably already have a detailed account of our intelligence spending, far more than just the budget total. (252) In all likelihood, the only people who care to know and do not know these costs today are American taxpayers. 


(244) When the same question was put to William E. Colby during his confirmation hearings to be Direc­tor of Central Intelligence, he replied: “I would pro­pose to leave that question, Mr. Chairman, in the hands of the Congress to decide… We are not going to run the kind of intelligence service that other countries run.We are going to run one in the Ameri­can society and the American constitutional structure, and I can see there may be a requirement to expose to the American people a great deal more than might be convenient from the narrow intelligence point of view.” Cong. Rec. S. 9603, June 4, 1974. 

(251) “CHAIRMAN PIKE… Do you think the Soviets know what our intelligence effort is?
“MR. COLBY. They know a good deal about it, from the various books that have been published by ‘X’ members of the intelligence community.” Comm. Hearings… Aug. 6, 1975. 

(252) “CHAIRMAN PIKE… Don’t you think really that the Soviets have a far better estimate of what we are spending for intelligence than the average taxpayer in America has?
“MR. COLBY. I think they have put a great deal of time and attention trying to identify that, and they undoubtedly have a better perception of it than the average taxpayer who just takes the general statements he gets in the press. But — and that comes from the careful analysis of the material that is released. This does help you get a more accurate estimate of what it is.” Ibid. 


It is one thing to conclude that tens of billions of intelligence dollars have been rather independently spent, and sometimes misspent, over the past few years. 

The important issues are whether this spending sufficiently meets our needs, whether Americans have received their money’s worth, and whether non-monetary costs sometimes outweigh the benefits. 

The latter question is a matter of risks… To test the first two questions, the Committee investigated a representative spectrum of recent events. Some involved war; some involved law enforcement. Some involved American lives overseas; some involved personal freedoms at home. All involved important interests. 

How did intelligence perform? Let the events speak for themselves. 

1. Tet: Failure to Adapt to a New Kind of War 

War in Vietnam meant that intelligence had to adapt to an unconventional war, and true perceptions could spell life or death for Americans. In Tet, perceptions were shattered. 

Taking advantage of the Vietnamese lunar holiday, the North Vietnamese and Viet Cong forces launched an all-out offensive on January 30, 1968, against virtually every urban center and base in South Vietnam. The scale of attacks was unprecedented in the history of American involvement in the Vietnam War and flatly challenged the reassuring picture intelligence officials in Saigon and Washington had helped present to the American people. 

With nearly all provincial capitals under siege, the American embassy compound was penetrated by the Viet Cong, and the pacification program set back in all areas; predictions of successes, announced scant months before, had turned into one of the greatest misjudgments of the war. 

The Committee’s investigation of Tet focused on the questions of warning in a combat situation and communicating the realities of a guerrilla war to executive branch policy-makers. Both are interrelated. Mr. William Colby and the post-mortems certify, “warning of the Tet offensive had not fully anticipated the intensity, coordination and timing of the enemy attack.” A chief cause was our degraded image of the enemy. 

There were at least two primary causes for such degradation. First, the dispute between CIA and MACV (Military Assistance Command, Vietnam) over enemy strength — called Order of Battle figures — created false perceptions of the enemy U.S. forces faced, and prevented measurement of changes in enemy strength over time. Second, pressure from policy-making officials to produce positive intelligence indicators reinforced erroneous assessments of allied progress and enemy capabilities. 

a. The Order of Battle Controversy 

According to Mr. Colby, the CIA had been suspicious of MACV’s numerical estimate of the Vietnamese enemy since at least mid-1966. At an order of Battle conference held in Saigon in September, 1967, the differences between Washington and the field, and between CIA and MACV, were thrashed out; but according to Mr. Colby, to neither’s satisfaction. 

A resulting compromise represented the best resolution of MACV’s preoccupation with viewing the order of battle in the classic military sense and CIA’s assessment of enemy capabilities as a much broader people’s war. The Special National Intelligence estimate that emerged from this conference quantified the order of battle in MACV terms, and merely described other potential enemy forces. Categories now proposed from previous estimates of order of battle detailed as much as 200,000 irregular personnel, self [one word illegible] and secret self-defense forces, and assault [one word illegible] and political cadre. 

As foot soldiers realized at the time, and as different studies by the Army Surgeon General confirm, the destructiveness of mines and booby traps, which irregular forces set out, was increasingly responsible for American losses. This was primarily because American forces were engaging the enemy with increased frequency in his defensive positions. Documents indicate that, even during the Order of Battle Conference, there was a large increase in sabotage for which irregulars and civilians were responsible. It appears clear in retrospect that, given the nature of protracted guerrilla war, irregular forces were basic determinants of the nature and scope of combat. 

The numbers game not only diverted a direct confrontation with the realities of war in Vietnam, but also prevented the intelligence community, perhaps the President, and certainly Members of Congress, from judging the real changes in Vietnam over time. 

The Saigon Order of Battle Conference dropped numbers that had been used since 1962, and used those that were left in what appears to have been an arbitrary attempt to maintain some ceiling. It prompted Secretary of State Dean Rusk to cable the American Embassy in Saigon, on October 21, 1967: “Need your recommendation how to resolve problem of unknown percentage of enemy KIA (Killed in Action) and WIA (Wounded in Action) which comes from ranks of self-defense, assault youth and VC civilian supporters. Since these others not carried as part of VC strength, indicators of attrition could be misleading.” 

When the Systems Analysis office in the Department of Defense examined the results of the conference and reinterpreted them in terms consistent with prior quantification, it remarked that the new estimate should have been 595,000–480,000 if computed on the same basis as before. “The computations do not show that enemy strength has increased, but that previous estimates of enemy strength were too low.” 

In the context of the late 1960s, numbers were not at all an academic exercise. Mr. Colby has testified that “(T)he effort to develop a number with respect to the enemy strength was a part of the advising of our government, as to their amount of effort we would have to spend to counter that kind of (guerrilla) effort by the Viet Cong.” They were also used to inform Members of Congress and the American public on the progress in Vietnam. 

The validity of most of the numbers was significantly dubious. Unfortunately, they were relied on for optimistic presentations. For example, while mentioning in parenthetical and classified comments that the numbers supporting its indicators of progress in Vietnam were suspect, the Bureau of Intelligence and Research provided Assistant Secretary of State William Bundy with quantified measures of success. (263) General Westmoreland used such figures to support his contentions in the fall of 1967, that the enemy’s “guerrilla force is declining at a steady rate.” 

In testimony before this Committee, Mr. Colby has stated that the “infatuation with numbers” was “one of the more trying experiences the Intelligence Community has had to endure.” In the context of the period it appears that considerable pressure was placed on the Intelligence Community to generate numbers, less out of tactical necessity than for political purposes. 

The Administration’s need was for confirmation of the contention that there was light at the end of the tunnel, that the pacification program was working and generally that American involvement in Vietnam was not only correct, but effective. (266) In this sense, the Intelligence Community could not help but find its powers to effect objective analysis substantially undermined. Whether this was by conspiracy or not is somewhat irrelevant. 

b. The Consequences 

Four months after the Saigon Order of Battle Conference, the Tet offensive began. On February 1, hours after the initial mass assaults, General Westmoreland explained to a press conference, “I’m frank to admit I didn’t know he (the enemy) would do it on the occasion of Tet itself. I thought he would do it before or after.” The U.S. naval officer in command of the river forces in the Mekong Delta and his army counterpart were similarly caught off guard. Appalled at how poorly positioned they were to provide quick and efficient response, the naval officer, now a retired Vice Admiral, has told the Committee that he “well remember(s) the words of the Army General who brought us the orders to extricate ourselves from the mudflats as fast as possible. They were, ‘It’s Pearl Harbor all over again.’ ”

The April, 1968, post-mortem done by a collection of intelligence officers discussed the general question of warning. It concluded that while units in one corps area were on alert, allied forces throughout the country, generally, were caught unprepared for what was unfolding. Certain forces even while “on a higher than normal state of alert” were postured to meet “inevitable cease-fire violations rather than attacks on the cities.” In other areas “the nature and extent of the enemy’s attacks were almost totally unexpected.” One-half of the South Vietnamese army was on leave at the time of the attacks, observing a 36-hour stand-down. 

In testimony before this Committee, both General Graham and William Colby confirmed the fact of some amount of surprise. General Graham preferred to label it surprise at the enemy’s “rashness.” Mr. Colby spoke of a misjudgment of their potential “intensity, coordination and timing.” 

Even though quick corrective action was taken to salvage American equipment and protect U.S. personnel, the ultimate ramifications on political and military fronts were considerable. General Westmoreland requested a dramatic increase of 206,000 in U.S. troop strength, and additional equipment supplies. Secretary of Defense Clark Clifford began rethinking the substance of intelligence. A collection of intelligence officers finally briefed the President of the United States on the realities of the Vietnam War in mid-March, and a few days later he announced he would not seek re-election. (271)

c. The Aftermath 

The Committee received testimony that problems with intelligence in Vietnam were not confined to Tet. Up to the last days of South Vietnam’s existence, certain blinders prevented objective reporting from the field and an accurate assessment of the field situation by Washington. Tet raised the issue of whether American intelligence could effectively account for enemy strength. Later events, among them the collapse of the Saigon government, pointed to a failure to properly acknowledge weaknesses of allies. 

A real attempt to address the shortcomings of friendly forces m Vietnam was hampered by many factors. During the time of massive American presence, there was a failure to attribute at least partial South Vietnamese “success” to American air power and logistics support. Consequently, projected ARVN performance in 1975, after the U.S. pullout, was measured against the yardstick of the Easter Offensive of 1972, when American support was crucial. 

Mission restrictions curtailed necessary collection activity by professional intelligence officers, and forced reliance on officials charged with military aid responsibilities. This promoted biased interpretations. (274) The sum total of restrictions, manipulations, and censorship no doubt led to the conclusion Secretary of Defense James R. Schlesinger reached at an April, 1975, news conference. He pointed out that “the strength, resiliency and steadfastness of those forces (South Vietnamese) were more highly valued than they should have been, so that the misestimate, I think, applied largely to Saigon’s capabilities rather than Hanoi’s intentions.” 

Ultimately, the Vietnam intelligence experience is a sobering reminder of the limitations and pitfalls the United States can expect to encounter if it chooses to align itself in unconventional battle with unconventional allies. It illustrates how very different guerrilla war is from World War II, and how much more problematic an alliance with emerging and unstable Third World governments will be. 

Reviewing the American experience in Indochina, an Assistant Secretary of Defense for Intelligence wrote a note of caution to the Secretary of Defense emphasizing the following view: 

“The problems that occurred in Vietnam or Cambodia can now be occurring in our efforts to assess [an allied and an adversary Third World country’s] forces, forces in the Persian Gulf or forces in the Middle East. These problems must be addressed before the U.S. becomes involved in any future crisis in the Third World that requires objective and timely intelligence analysis.” 

Given the substantial American involvement in these areas, strong remedies and honest retrospect appear necessary, to overcome and prevent intelligence output that fails, for whatever reason, to present comprehensive and undisguised perceptions of war. 

(263) The memorandum to William Bundy is from Fred Greene of the State Department’s Bureau of Intelligence and Research and is dated Sept. 22, 1967. It notes that claims of enemy captured, enemy re­cruited, weapons lost, desertions, incidents of battalion size attacks, killed in action, vital roads opened, and the percentage of population under South Viet­namese control are not supported by the statistics. The memorandum also advises that Mr. Bundy not bring to light other figures that present a negative picture. 

After alleging that the VC was having difficulties in its recruitment, Mr. Greene goes on to point out, in a confidential comment, that “Recruitment sta­tistics should be avoided since they are based on a relatively small number of reports of dubious reliability. Moreover, any use of recruitment figures might well be used by our critics to question the reliability of our estimates on Communist order of battle, a subject which almost certainly will soon cause us considerable public relations problems.” 

(264) “It is significant that the enemy has not won a major battle in more than a year. In general, he can fight his large forces only at the edges of his sanctu­aries… His Viet Cong military units can no longer fill their ranks from the South but must depend in­creasingly on replacements from North Viet Nam. His guerrilla force is declining at a steady rate. Mo­rale problems are developing within his ranks.” He concluded by saying, “The enemy has many prob­lems: He is losing control of the scattered population under his influence. He is losing credibility with the population he still controls. He is alienating the people by his increased demands and taxes, where he can impose them. He sees the strength of his forces steadily declining. He can no longer recruit in the South to any meaningful extent; he must plug the gap with North Vietnamese. His monsoon offensives have been failures. He was dealt a mortal blow by the installation of a freely elected representative government. And he failed in his desperate effort to take the world’s headlines from the inauguration by a military victory.”
General Westmoreland, “Progress Report on the War in Viet Nam,” before the National Press Club, Washington, D.C., Nov. 21, 1967.

(266) According to George Allen, pressure was put on CIA by Walt Rostow, Assistant to the President for National Security Affairs, to prepare positive indicators of progress in the pacification program. When Mr. Allen suggested that there were few, he received the reply, “I am amazed at your unwillingness to support your President in his time of need.” Rostow then requested that the Office of Current Intelligence produce a compilation of extracts showing progress, which OCI did, while attaching a cover letter caveat. Rostow removed the cover letter and reported to the President “at last an objective appraisal from CIA.”
Staff interview with George Allen, Dec. 1, 1975. 

(271) Immediately after the Tet offensive, President Johnson began to seek independent assessments of the U.S. role in Vietnam. Turning first to Dean Acheson, the former Secretary of State, he solicited opinions from an informal study group, known as the “Wise Men.” Startled by the pessimism of these advisers from outside of the government, the President demanded an individual presentation of three briefings provided to the group, in order to discover “who poisoned the well.” George Carver from CIA opined that the President had a two-audience problem and could not very well continue to tell the Americans one thing and the Vietnamese another.
Staff interview with George Carver, Jan. 9, 1975. 

(274) Defense attaches in Vietnam held the dual responsibilities of monitoring military aid and coordinating intelligence reporting on friendly forces. The former tended to affect the latter, and attaches would use supply figures to interpret South Vietnamese capabilities toward the end of the war. 

The Ambassador in Vietnam in 1975 “personally and through his Political Section monitored very closely the intelligence reporting from Vietnam.” Reports on the political and economic conditions (including reports on corruption) were either censored or retained within the Embassy.
(See Henry A. Shockley, “Intelligence Collection in Vietnam, March 1974–March 1975” in Appendix.)

2. Czechoslovakia: Failure of Tactical Warning 

The Czechoslovakia crisis challenged our ability to monitor an attack by the Soviet Union — our prime military adversary. We “lost” the Russian army for two weeks. 

Forces of the Warsaw Pact invaded Czechoslovakia on August 20, 1968, to overthrow the Dubcek regime which, since spring, had been moving toward liberal, independent policies the Soviets could not tolerate. U.S. intelligence had understood and reported the basic issues in the developing Soviet-Czech confron­tation, and concluded that the Soviets were capable of launching an invasion at any time. 

Intelligence failed, however, to provide a warning that the Soviets had “decided to intervene with force.” Consequently, President Johnson first learned of the invasion when Soviet Ambassador Dobrynin visited the White House and told him. 

A review of U.S. intelligence performance during the Czech crisis indicates the agencies were not up to the difficult task of divining Soviet intentions. We knew Soviet capabilities, and that the tactical decision to invade might leave only hours of advance warning. The CIA, DIA, and NSA should have been prepared for lightning-quick reaction to Soviet mili­tary moves. 

Czech radio broadcasted news of the invasion at 8:50 p.m., Washington time. CIA translated and trans­mitted its reports of invasion to Washington at 9:15 p.m. By that time, President Johnson had already met his appointment with the Soviet Ambassador. 

U.S. technical intelligence learned of the Soviet invasion several hours before — but the information did not reach Washington until after the Czech radio message. The CIA later concluded that the information “might have made a difference” in our ability to provide the tactical warning. 

One alarming failure of intelligence prior to the invasion occurred during the first two weeks in August, when U.S. intelligence could not locate a Soviet combat formation, which had moved into northern Poland. Director Helms later admitted he was not “happy about those two weeks” when he could not locate the Soviet troops. 

Information from technical intelligence, which would have been helpful, was not available until days later. Clandestine reporting in the previous weeks had been so slow to arrive it proved of little value to current intelligence publications. 

Director of Central Intelligence Richard Helms reported to the President’s Foreign Intelligence Ad­visory Board in October, 1968, that the intelligence record of failing to detect the actual attack “distresses me.” The Director provided reassurances that the record would have been better “if West Germany had been the target rather than Czechoslovakia.” 

In 1971, a Presidential Commission reported to President Nixon that its review of U.S. ability to respond to sudden attack had found serious weak­nesses. The Pentagon was directed to improve its warning system. Improvement to the very best possible degree is, of course, the minimum acceptable standard. There will be no more important area for Congressional oversight committees to explore thoroughly. 

3. The Mid-East War: The System Breaks Down

The Mid-East war gave the intelligence community a real test of how it can perform when all its best technology and human skills are focused on a known world “hot spot.” It failed. 

On October 6, 1973, Egypt and Syria launched a major assault across the Suez Canal and Golan Heights against a stunned Israel. Although Israel eventually repelled the attack, at a cost of thousands of lives, the war’s consequences cannot be measured in purely military terms. 

For Americans, the subsequent U.S.-Soviet con­frontation of October 24–25, 1973, when the Soviets threatened to unilaterally intervene in the conflict, and the Arab oil embargo are reminders that war in the Middle East has a direct impact on our own national interests.

The Committee’s analysis of the U.S. intelligence performance in this crisis confirms the judgment of an intelligence community post-mortem that “the principal conclusions concerning the imminence of hostilities… were — quite simply, obviously, and starkly — wrong.” Even after the conflict had begun, we did not accurately monitor the course of events. 

The important question is what went wrong? 

The last relevant National Intelligence Estimate before the October War was published five months earlier, in May, 1973, during a particularly bad period in Arab-Israeli relations. That estimate addressed the likelihood of war “in the next few weeks.” No long-range view was presented, and the crisis soon passed. 

The only intelligence report concerned with future political-military issues was a May 31, 1973, Bureau of Intelligence and Research (INR) memorandum to Secretary of State Rogers. The authors reasoned correctly that Egypt’s President Sadat, for political reasons, would be strongly tempted to resort to arms if diplomacy proved fruitless. Accordingly, the report concluded, the “resumption of hostilities by autumn will become a better than even bet” should the diplomatic impasse continue. 

By September 30, 1975 — less than a week before the attack — INR had lost “the wisdom of the Spring.” By then, all U.S. intelligence agencies argued that the political climate in the Arab nations was not conducive to a major war. Intelligence consumers were reassured that hostilities were not likely. (292)

The next question is why this happened. 

Analytical bias was part of the problem. (293) In the summer of 1973, the Defense Intelligence Agency (DIA), CIA, and INR all flatly asserted that Egypt was not capable of a major assault across the Suez Canal. Syria, they said, was not much of a threat either, despite recent acquisitions of sophisticated Soviet… missile systems and other material. 

One reason for the analysts’ optimism can be found in a 1971 CIA handbook, in a passage reiterated and reinforced in discussions in early October, 1973. The Arab fighting man, it reported, “lacks the necessary physical and cultural qualities for performing effective military services.” The Arabs were thought to be so clearly inferior that another attack would be irrational and, thus, out of the question. 

No doubt this attitude was not far in the background when CIA advised Dr. Kissinger on September 30, 1975, that “the whole thrust of President Sadat’s activities since last spring has been in the direction of bringing moral, political, and economic force to bear on Israel in tacit acknowledgment of Arab unreadiness to make war.” 

That analysis is quite surprising, in light of information acquired during that period, which indicated that imminent war was a distinct possibility. By late September, for example, CIA had acquired vital evidence of the timing and warlike intentions of the Arabs. The source was disbelieved, for reasons still unclear. 

There were other positive indications. In late September, the National Security Agency began picking up clear signs that Egypt and Syria were preparing for a major offensive. NSA information indicated that [a major foreign nation] had become extremely sensitive to the prospect of war and concerned about their citizens and dependents in Egypt. NSA’s warning escaped the serious attention of most intelligence analysts responsible for the Middle East. (299) 

The fault may well lie in the system itself. NSA intercepts of Egyptian-Syrian war preparations in this period were so voluminous — an average of hundreds of reports each week — that few analysts had time to digest more than a small portion of them. Even fewer analysts were qualified by technical training to read raw NSA traffic. Costly intercepts had scant impact on estimates. 

These reports lacked visibility and prestige to such a degree that when, two days before the war, an NSA briefer insisted to General Daniel Graham of CIA that unusual Arab movements suggested imminent hostilities, Graham retorted that his staff had reported a “ho-hum” day in the Middle East. Later, a key military analyst claimed that if he had only seen certain NSA reports, which were so “sensitive” they had not been disseminated until after the war began, he would have forecast hostilities. (302)

There was testimony that Dr. Kissinger’s secrecy may also have thwarted effective intelligence analysis. Kissinger had been in close contact with both the Soviets and the Arabs throughout the pre-war period. He, presumably, was in a unique position to pick up indications of Arab dissatisfaction with diplomatic talks, and signs of an ever-increasing Soviet belief that war would soon break out. When the Committee was denied its request for high-level reports, it was unable to learn whether Kissinger elicited this information in any usable form. It is clear, however, that the Secretary passed no such warning to the intelligence community. (303) 

The Committee was told by high U.S. intelligence officials and policy-makers that information from high-level diplomatic contacts is of great intelligence value as an often-reliable indicator of both capabilities and intentions. Despite the obvious usefulness of this information, Dr. Kissinger has continued to deny intelligence officials access to notes of his talks with foreign leaders. 

The morning of the Arab attack, the Watch Committee — which is responsible for crisis alerts — met to assess the likelihood of major hostilities. It concluded that no major, coordinated offensive was in the offing. (305) Perhaps one of the reasons for this was that some participants were not “cleared” for all intelligence data, so the subject and its implications could not be fully discussed. 

The entire system had malfunctioned. Massive amounts of data had proven indigestible by analysts. Analysts, reluctant to raise false alarms and lulled by anti-Arab biases, ignored clear warnings. Top-level policy-makers declined to share perceptions gained from talks with key Arab and Soviet diplomats during the critical period. The fact that Israeli intelligence, to which the U.S. often deferred in this period, had been wrong was small consolation. 

Performance did not measurably improve after the war’s outbreak, when the full resources of the U.S. intelligence community were focused [there]. 

The Defense Intelligence Agency, having no military contingency plan for the area, proved unable to deal with a deluge of reports from the war zone, and quickly found itself in chaos. CIA and INR also engulfed Washington and each other with situation reports, notable for their redundancy. 

Technical intelligence-gathering was untimely, as well as indiscriminate. U.S. national technical means of overhead coverage of the Middle East, according to the post-mortem, was “of no practical value” because of time problems. Two overflight reconnaissance missions, on October 13 and 25, “straddled the most critical phase of the war and were, therefore, of little use.” (310) 

The U.S. failure to accurately track war developments may have contributed to a U.S.-Soviet confrontation and troop alert called by President Nixon on October 24, 1973. (311) 

A second intelligence community post-mortem, the existence of which was not disclosed to the Committee until after its hearing, (312) reported that CIA and DIA almost unquestionably relied on overly optimistic Israeli battle reports. Thus misled, the U.S. clashed with the better-informed Soviets on the latter’s strong reaction to Israeli cease-fire violations. Soviet threats to intervene militarily were met with a worldwide U.S. troop alert. Poor intelligence had brought America to the brink of war. 

Administration witnesses assured the Committee that analysts who had performed poorly during the crisis had been replaced. (313) The broader record suggests, however, that the intelligence system faults have survived largely intact. New analysts will continue to find themselves harassed and deluged with largely equivocal, unreadable, or unusable data from CIA, DIA, INR, and the collection-conscious NSA. At the same time, they can expect to be cut off, by top-level policy-makers, from some of the best indicators of hostile intentions.

(292) “If analysts did not provide forewarning, what did they offer in its stead? Instead of warnings, the Community’s analytical effort in effect produced reassurances. That is to say, the analysts, in reacting to indicators which could be interpreted in themselves as portents of hostile Arab actions against Israel, sought in effect to reassure their audience that the Arabs would not resort to war, at least not deliberately.” (Emphasis in original.) CIA’s Post-Mortem, page 3. 

(293) CIA-DIA-INR Arab-Israeli Handbook, July 1973. The CIA’s Post-Mortem at 13 characterizes this Handbook and analytic preconceptions: “No preconceptions seem to have had a greater impact on analytical attitudes than those concerning relative Arab and Israeli military prowess. The June War was frequently invoked by analysts as proof of fundamental and perhaps permanent weaknesses in the Arab forces and, inferentially, of Israeli invincibility. The Arabs, despite the continuing acquisition of modern weapons from the Russians, remained about as far behind the Israelis as ever.” At page 14 the Post-Mortem concludes: “There was, in addition, a fairly widespread notion based largely (though perhaps not entirely) on past performances that many Arabs, as Arabs, simply weren’t up to the demands of modern warfare and that they lacked understanding, motivation, and probably in some cases courage as well. These judgments were often alluded to in conversations between analysts…” 

(299) The draft CIA Post-Mortem states that NSA SIGINT Summaries probably did not convey the full significance of these technical indicators to the reader. The conclusion of all intelligence officials interviewed by the Committee staff was unanimous: the National Security Agency products — particularly raw products — are difficult to understand. The CIA’s Post-Mortem, page 9, states the problem with NSA products as seen by Middle East intelligence analysts: “Two particular problems associated with SIGINT should be mentioned here: (1) Certain highly classified and specially handled categories of COMINT reached their consumers only several days after intercept, a circumstance which perhaps had unfortunate effects; (2) SIGINT reporting is very voluminous: in a typical non-crisis week, hundreds of SIGINT reports on the Middle East cross the desk of the area specialist in a production office. Moreover, partly because of the requirements levied on it by a wide variety of consumers, NSA issues most SIGINT reports (not merely ELINT) in very technical language. SIGINT can thus challenge the ingenuity of even the most experienced, all-source analyst searching for meaning and patterns in a mountain of material.”… 

(302) From the Draft CIA Post-Mortem: “If the information contained in the NSA messages had been available prior to the time of the outbreak of hostilities, we could have clearly predicted that [a foreign nation] knew in advance that renewed hostilities were imminent in the Middle East.” This particular type of NSA-acquired intelligence was delayed “a minimum of ten days.” 

(303) Among such reports on Soviet and Arab attitudes were “The Secretary Afternoon Summary,” Sept. 27, 1973, which reported an intelligence finding that a high Arab official “has said that Kissinger’s statement before the Senate Foreign Relations Committee, that U.S. policy in the Middle East remains the same, destroyed the recent Egyptian hope aroused by President Nixon’s comment that the U.S. is partial neither to the Arabs or to Israel.”…

(305) “The Watch Committee met in special session at 0900 on 6 October 1973 to consider the outbreak of Israeli-Arab hostilities and Soviet actions with respect to the situation. 

“We can find no hard evidence of a major, coordinated Egyptian/Syrian offensive across the Canal and in the Golan Heights area. Rather, the weight of evidence indicates an action-reaction situation where a series of responses by each side to preconceived threats created an increasingly dangerous potential for confrontation. The current hostilities are apparently a result of that situation, although we are in a position to clarify the sequence of events. It is possible that the Egyptians or Syrians, particularly the latter, may have been preparing a raid or other small-scale action.”
Special Meeting of the Watch Committee, Oct. 7, 1973. 

(311) “We do not know whether, in fact, these differing appreciations contributed to the development of a confrontation between the U.S. and U.S.S.R. during the final three days of the crisis (24–26 October). But this seems to be a real possibility. And it is clear in any event that in certain crises and under certain circumstances an accurate view of the tactical military situation can be of critical importance to decision-makers.” Also: “If U.S. decision-makers had had a more accurate view of the tactical situation around Suez between 21 and 25 October, they might have had better insight into why the Soviets reacted as they did to the Israeli violations.” Ibid.…

(312) The second post-mortem… was not given to any Congressional Committee, even those who were told of the first post-mortem. 

(313) Three DIA officials were removed from then positions; there were no changes at the CIA, INR, or NSA. Community analysts interviewed by Committee staff all agreed the reassignments involved internal DIA controversies more than any effort to revamp the agency after the Middle East War.

4. Portugal: The U.S. Caught Napping 

Do our intelligence services know what is going on beneath the surface in allied nations that are not making headlines? Quiet Portugal exploded in 1974, leaving serious questions in its aftermath. 

When a group of left-leaning Portuguese junior military officers ousted the Caetano regime on April 25, 1974, State Department officials represented to the New York Times that Washington knew those who were behind the coup well. State indicated that we were not surprised by the coup, and that no significant changes in Portugal’s NATO membership were expected. Nothing could have been further from the truth. 

The Committee has reviewed documents which show that the U.S. intelligence community had not even been asked to probe deeply into Portugal in the waning months of the Caetano dictatorship. (315) As a result, policy makers were given no real warning of the timing and probable ideological consequences of the coup, despite clear and public indications that a political upheaval was at hand. (316)

The State Department’s Bureau of Intelligence and Research had not analyzed events in Portugal in the month before the April coup. In retrospect, four warning signals, beginning in late February and continuing through mid-March, 1974, should have sparked “speculation at that time that a crisis of major proportions was brewing,” according to the Director of Intelligence and Research, William Hyland. All four events were reported in the American press: 

  1. The publication in February 1974, of General Antonio de Spinola’s controversial book criticizing Portugal’s African colonial wars, which unleashed an unprecedented public storm. 
  2. The refusal of General Spinola and the Armed Forces Chief of Staff, Francisco Costa Gomes, to participate in a demonstration of military unity and support for the Caetano dictatorship. 
  3. An abortive coup, in mid-March, when an infantry regiment attempted to march upon Lisbon. This was followed by the subsequent dismissal of Spinola and Costa Gomes from their commands. 
  4. A period of rising tensions, the arrests of leftists, and a purge of military officers following the first three developments. 

The intelligence community, however, was too preoccupied to closely examine the Portuguese situation. Those responsible for writing current intelligence publications had deadlines to meet, meetings to attend, and relatively little time to speculate on developments in the previously sleepy Caetano dictatorship. (318) 

The Committee’s investigation indicates there were other, earlier warning signs which might have sparked some intelligence interest. Again, these indications of deeper unrest were not subjected to close analysis. 

On October 26, 1973, the Defense Attache in Lisbon reported to DIA headquarters in the Pentagon rumors of a “coup plot,” and serious discontent among Portuguese officers.

On November 8, 1973, the attache reported that 860 Portuguese Army Captains had signed a petition protesting conditions. (320) The attache quickly concluded these dissidents had no intentions of revolution. Nevertheless, the fact that over 800 military officers felt deeply enough to risk retribution was a good indication of the profound social revolution which Portugal faced.

The record does not suggest that the attache attempted to get to know these junior officers, understand their views, or even record their names. Nor had anyone in Washington assigned him the task of searching for signs of social and political unrest in the Portuguese military. One reason for this was that the Director of Attache Affairs was not allowed to assign duties to attaches. Assignments were done elsewhere, in an unbelievable demonstration of confusing and inefficient administration. (321)

Also in November 1973, the attache attended a social gathering at the home of a retired American officer where he heard discussion of right-wing Spanish and Portuguese countercoup plans, should “extremists” overthrow the Caetano government. Neither the identities of the counter-plotters nor of the “extremists” were reported by the attache. No further reference to this report was found in a review of subsequent attache activities prior to the April coup. 

In February 1974, the attache forwarded information from December 1973, on the Portuguese government response to a petition of complaints signed by over 1,500 junior military officers. (323) There was no effort to identify the leaders of the petition campaign or to contact any of the signers. After the coup, high CIA officials would complain of the lack of in-depth biographic reporting from the attache office. 

A review of all Defense Attache reports in the months prior to the coup indicated substantial delays in forwarding reports to Washington. It even took a month for the attache to send Washington the Spinola book which unleashed the public storm when it was published in February. 

Twice, Defense Intelligence Agency headquarters in Washington wrote the attache office in Lisbon urging the six officers there to be more aggressive, to travel more, and frequent the diplomatic party circuit less. Only the most junior attache, a Navy lieutenant, made an attempt to probe beyond the obvious. 

The Committee was also told that a serious problem in DIA is a tendency to reward senior officers, nearing the ends of their careers, by assigning them to attache posts. Not only were these officers often untrained and unmotivated for intelligence duties, but the Director of Attache Affairs testified that he was powerless to assign substantive duties to the attaches in any case. 

The Committee did not have the opportunity to review raw CIA reports during the six months prior to the coup. CIA officials who relied on these reports told this Committee that the CIA Station in Lisbon was so small, and so dependent upon the official Portuguese security service for information, that very little was picked up. In fact, attaches were in a better position than CIA to get to know the Portuguese military. There is no indication that attaches and the Chief of Station attempted to pool their resources and combine CIA’s knowledge of the Portuguese Community movement with attaches’ supposed military contacts. 

The National Intelligence Officer (NIO) for Western Europe did attempt an analysis. A draft memorandum on trends in Portugal, titled, “Cracks in the Facade,” had been in preparation for nearly a month, and was almost complete when the April coup erupted. It had to be re-titled. The document itself, despite its titles, was not attuned to the real causes of intense discontent which produced a leftist-military revolt. 

That same National Intelligence Officer testified that he had some twenty-five European countries to monitor, with the help of only one staff assistant. NIO’s do not have command authority over CIA’s intelligence or operations directorates. They cannot order that papers be written, that staffers be detached from the current intelligence office to work on an in-depth estimate. They cannot instruct clandestine operations to collect certain types of information. Nor will the NIO always be informed of covert actions that may be underway in one of his countries. 

The most disturbing testimony before this Committee was official satisfaction with intelligence prior to the Portuguese coup. The Director of Attache Affairs told the Committee that intelligence performance had been “generally satisfactory and responsive to requirements.” The National Intelligence Officer for Western Europe said intelligence reports had described “a situation clearly in process of change, an old order coming apart at the seams.” (331) 

However, both officials quickly admitted under questioning that the attaches had not, in fact, been very aggressive. Nor had any intelligence document warned when and how the old order was “coming apart at the seams.” Without access to intelligence reports, this Committee might have believed official claims that the system was functioning well.

(315) Interview with Dennis Clift, Senior Staff Member, National Security Council, by G. Rushfort, Oct. 3, 1975, copy on file with Sel. Comm. on Intell. Mr. Clift stated there was no National Security Council effort to levy requirements on the intelligence community, nor was there any National Security Council study memorandum addressed to Portugal. 

(316) Testimony of William Hyland before the Committee: “Even a cursory review of the intelligence record indicates there was no specific warning of the coup of April 25, 1974, in Portugal. As far as the Bureau of Intelligence and Research was concerned, our last analytical reporting was in late March and we drew no conclusions that pointed to more than a continuing struggle for power but short of a military revolt.”
Comm. Hearings… October 7, 1975. 

(320) Defense Attache report from Lisbon to the Defense Intelligence Agency: “These younger officers are not disloyal and desire to serve Portugal as military officers and have no intention of revolution. They are patriots who want to make changes for the improvement of the P.A. [Portuguese Army — editor’s note] and Portugal.” 

(323) Defense Attache report also commented on the Spinola appointment as Deputy Chief of Staff, Armed Forces: “Although there are some political reasons in back of this appointment, it is reported that he will concern himself mainly with personnel and logistics in the Metropole.” Defense Attache report, Feb. 6. 1974 

(331) Testimony of Keith Clark and Samuel V. Wilson. Only William Hyland, Director of INR, testified without prodding that the system had not functioned well in the Portugal crisis.

5. India: Priorities Lost 

How well does U.S. intelligence keep track of non-military events that affect our foreign policy interests? Not very well, if the first nuclear test in the Third World is any indication. 

The intelligence community estimated, in 1965, that India was capable of conducting a nuclear test, and probably would produce a nuclear device within the next few years. In 1972, a special estimate said the “chances are roughly even that India will conduct a [nuclear] test at some time in the next several years and label it a peaceful explosion.” 

DIA, in reports distributed only within the Joint Chiefs of Staff, had stated since 1971 that India might already have a nuclear device. However, when India did explode a nuclear device on May 18, 1974, U.S. intelligence was caught off-guard. As the CIA’s post-mortem says of the community’s surprise: “This failure denied the U.S. Government the option of considering diplomatic or other initiatives to try to prevent this significant step in nuclear proliferation.” 

Only one current intelligence article was published in the six months before the May explosion. That article, by DIA, stated for the first time that India might already possess such a device. Perhaps one reason the article did not provoke more debate and initiative was the title: “India: A nuclear weapons program will not likely be pursued in the near term.” 

In 1972, U.S. intelligence had picked up 26 reports that India would soon test a device, or that she was capable of doing so if the government made the decision to proceed. There were only two reports on the subject from August 1972 to May 1974, when the device was exploded. Neither was pursued with what the CIA can claim was a “real follow-up.” 

An April 17, 1974, report indicated that India might have already conducted an unsuccessful nuclear test in the Rajasthan Desert. The CIA did not disseminate this report to other agencies, nor did CIA officials pursue the subject. 

The Director of Central Intelligence had established the bureaucratic device of “Key Intelligence Questions” in 1974. Although nuclear proliferation was on the list, few officials outside the upper reaches of the bureaucracy expressed much interest. The CIA’s general nuclear developments priority list did not address India, and the military attaches received no clear instructions on nuclear matters. Nevertheless, previous estimates on India had identified “gaps” in our information. 

After India exploded the nuclear device in May 1974, Director Colby wrote Dr. Kissinger to say he intended to mount a more aggressive effort on the nuclear proliferation problem. 

One of several justifications for national technical means of overhead coverage over India in the two years prior to May 1974, was the nuclear test issue. However, the Intelligence Community technical analysts were never asked to interpret the data. The CIA’s post-mortem stated, in effect, the system had been tasked to obtain data, but the analysts had not been asked to examine such data. After the explosion, the analysts were able to identify the test location, from pre-test data. 

Following the failure to anticipate India’s test, the United States Intelligence Board agreed to hold one committee meeting a year on nuclear proliferation. Interagency “coordinating” mechanisms were established. Teams of experts traveled to various countries to impress on American embassy personnel the importance of the proliferation threat. Analysts once again were encouraged to talk to each other more. 

The missing element, as the bureaucracy reshuffled its priorities after the Indian failure, is quite simple: the system itself must be reformed to promote anticipation of, rather than reaction to, important world events. 

6. Cyprus: Failure of Intelligence Policy 

Cyprus presented a complex mix of politics, personalities, and NATO allies. Unfortunately, a crisis turned to war, while intelligence tried to unravel events — and America offended all participants. 

On the morning of July 15, 1974, Greek strongman General Dimitrios loannides and his military forces on Cyprus overthrew the elected government of Archbishop Makarios. Five days later, Turkey invaded the island, ostensibly to protect the Turkish minority there and to prevent the Greek annexation long promoted by the new Cyprus leadership. Unsatisfied with its initial military success, Turkey renewed its offensive on August 14, 1974. 

The failure of U.S. intelligence to forecast the coup, despite strong strategic and tactical signs, may be attributed to several factors: poor reporting from the U.S. Embassy in Athens, in part due to CIA’s exclusive access to Ioannides; the general analytical assumption of rational behavior; and analysts’ reluctance to raise false claims of an impending crisis. (346) 

The failure to predict the coup is puzzling in view of the abundance of strategic warnings. When Ioannides wrested power from George Papadopoulos in November, 1974, analysts concluded that relations between Greece and Makarios were destined to worsen. Ioannides’ hatred of Makarios, whom he considered pro-Communist or worse, has been described as having “bordered on the pathological.” Moreover, Makarios was seen as a stumbling block to Ioannides’ hopes for onosis. Observers agreed that a serious confrontation was only a matter of time. 

By spring of 1974, that confrontation would at times appear imminent, with intervening lulls. Each trip to the brink elicited dire warnings to policy officials from Near East desks in the State Department. However, the nuances of these events, indicating a gathering of storm clouds, were largely lost on analysts as their attention remained focused on the Greek-Turkish clash over mineral rights in the Aegean. Cyprus remained a side issue despite growing evidence that the Ioannides-Makarios relationship was reaching a critical stage. 

There would soon be several tactical indications that a coup was in the works. On June 7, 1974, the National Intelligence Daily warned that Ioannides was actively considering the ouster of Makarios if the Archbishop made an “extremely provocative move.” (350) On June 29, intelligence officials reported that Ioannides had again told his CIA contact nine days before, that if Makarios continued his provocation, the Greek would have only two options: to write-off Cyprus, with its sizeable Greek majority, or eliminate the Archbishop as a factor. 

On July 5, 1974, Makarios made that “extremely provocative move,” by demanding the immediate withdrawal of a Greek National Guard contingent on Cyprus. The ultimatum was delivered in an extraordinary open-letter to the Greek government, accusing Ioannides’ associates of attempting his physical as well as political liquidation. (352) 

On June 29, 1974, Secretary Kissinger, responding to alarms sounded by State Department desk officers, approved a cable to U.S. Ambassador Henry J. Tasca in Athens, instructing that he personally tell Ioannides of U.S. opposition to any adventure on Cyprus. (353) The instruction was only partially heeded. 

Tasca, assured by the CIA station chief that Ioannides would continue to deal only with CIA, and not sharing the State Department desk officer’s alarm, was content to pass a message to the Greek leader indirectly. 

Tasca’s colleagues subsequently persuaded secretary Kissinger’s top aide, Joseph Sisco, that a general message passed through regular government channels would have sufficient impact. The Ambassador told Committee staff that Sisco agreed it was unnecessary for Tasca himself to approach Ioannides, who had no official government position. That interpretation has been vigorously disputed. It is clear, however, that the Embassy took no steps to underscore for Ioannides the depth of U.S. concern over a possible Cyprus coup attempt. 

This episode, the exclusive CIA access to Ioannides, Tasca’s indications that he may not have seen all important messages to and from the CIA Station, Ioannides’ suggestions of U.S. acquiescence, and Washington’s well-known coolness to Makarios, have led to public speculation that either U.S. officials were inattentive to the reports of the developing crisis or simply allowed it to happen, by not strongly, directly, and unequivocally warning Ioannides against it. (358)

Due to State Department access policies, the Committee was unsuccessful in obtaining closely-held cables to and from the Secretary of State during this period including a message the Secretary sent to Ioannides through the CIA the day after the coup. Accordingly, it is impossible to reach a definitive conclusion. 

On July 3, 1974, a CIA report stated that an individual, later described as “an untested source,” had passed the word that despite new aggressiveness on Makarios’ part, Ioannides had changed his mind: there would be no coup after all. For reasons still unclear, this CIA report was embraced and heeded until July 15, the day of the coup. The Intelligence Community post-mortem, appears to have concluded that the “tip” was probably a ruse. 

Ioannides’ dubious change of heart went virtually unquestioned despite Makarios’ open letter, despite further ultimatums from the Archbishop to remove the Greek officers, and despite the en masse resignations of three high-level Greek Foreign Ministry officials known to be soft-liners on Cyprus. In this setting, the grotesquely erroneous National Intelligence Bulletin of July 15, 1974, is not surprising, nor are Ambassador Tasca’s protestations that he saw no coup on the horizon. 

Almost at the moment Ioannides unleashed his forces, a National Intelligence Bulletin was reassuring intelligence consumers with the headline: “Ioannides is taking a moderate line while he plays for time in his dispute with Archbishop Makarios.” 

Results of the events triggered by the coup included: thousands of Cypriot casualties and refugees, a narrowly-averted war between NATO allies Greece and Turkey, a tragic worsening of U.S. relations with all three nations, and the death of an American Ambassador. U.S. intelligence must be accorded a share of the responsibility. 

The intelligence community somewhat generously termed its performance during the Cyprus crisis as “a mixture of strengths and weaknesses.” The Committee’s conclusion, after an analysis of the record, is less sanguine. Intelligence clearly failed to provide adequate warning of the coup, and it performed indifferently once the crisis had begun. 

The analytical failure in the Cyprus crisis brings to mind several parallels with the 1975 Middle East debacle. In both cases, analysts and policymakers were afflicted both with a past history of false alarms, and with the rigid notion, unsupported in fact, that foreign leaders invariably act “rationally.” In the Cyprus crisis, as in the Mid-East, analysts were deluged with unreadable and redundant data subsequent to the initial intelligence failure. (363) Still, given the ample indications that Makarios had sufficiently aroused Ioannides’ ire, these analytical quirks should not have prevented a correct interpretation of events. 

There appear to have been collection failures in this period, although additional evidence could probably not have overcome the analytical deficiencies that caused erroneous conclusions. For example, CIA personnel had been instructed by the U.S. Ambassador not to establish contacts within the Turkish minority, and to obviate any allegations of collusion with the anti-Makarios EOKA-B movement. They were told to seek intelligence on EOKA-B by indirect means, rather than through direct contact with members of that organization. Finally, signals intelligence in the area was focused elsewhere and even after the coup was not a significant factor. (366) 

Since the coup inevitably led to the two Turkish invasions and the Greek-Turkish confrontation, the performance of intelligence in predicting military hostilities after the coup is both less important and unremarkable in its successes. 

Along with most newspaper articles of the time, U.S. intelligence concluded that Ioannides’ installation of Nicos Sampson, notoriously anti-Turk, as Cypriot President insured a Turkish invasion of the island. Despite prominent stories in Turkish newspapers and undisguised troop movements at the coast, DIA did not predict the invasion until literally hours before Turkish forces hit the beaches on July 20, 1974. A National Intelligence Officer’s report had picked July 20 as a likely invasion date, but was never disseminated to the intelligence community. (368)

Perhaps flushed by its “success” in calling the first Turkish invasion just after the Turkish press did, U.S. intelligence appeared to lose interest, in the belief that the crisis was over. Thus, there was no real forewarning that the Turkish forces would launch an even more ambitious invasion on August 14, resulting in the capture of fully one-third of the island. 

In terms of both its immediate (370) and long-range consequences, the sum total of U.S. intelligence failure during the Cyprus crisis may have been the most damaging intelligence performance in recent years. 

(346) Former intelligence officials have described to this Committee the difficulties encountered by those who must report from an area which has frequent and intense crises. “After a while, Washington officials get tired of hearing about impending crises from your area and it actually gets embarrassing to report them.” That observation gained credence when witnesses from the Department of State jokingly referred to the number of times Cypriot Desk officers had predicted coups.
Interview with intelligence official, by F. Kirschstein. Sept. 29, 1975, copy on file with Sel. Comm. on Intell. 

(350) The June 7 National Intelligence Daily was based on a June 3 Field Intelligence Report which stated that “Ioannides claimed that Greece is capable of removing Makarios and his key supporters from power in twenty-four hours with little if any blood being shed and without EOKA assistance. The Turks would quietly acquiesce to the removal of Makarios, a key enemy… Ioannides prayed for some unexpected favorable gift from heaven, Ioannides stated that if Makarios decides on some type of extreme provocation against Greece to obtain a tactical advantage, he (Ioannides) is not sure whether he should merely pull the Greek troops out of Cyprift and let Makarios fend for himself, or remove Makarios once and for all and have Greece deal directly with Turkey over Cyprus’ future.” That report has been confirmed by former CIA Athens officials interviewed by staff. Interview with CIA operations officials, by J. Boos and G. Rushford… copy on file with Sel. Comm. on Intell. 

(352) The letter reads in part: “I have many times asked myself why an unlawful and nationally harmful organization … is supported by Greek officers… The Greek officers’ support for EOKA-B constitutes an undeniable reality… I am sorry to say, Mr. President, that the root of evil is very deep, reaching as far as Athens. It is from there that the tree of evil, the bitter fruits of which the Greek Cypriot people are tasting today, is being fed and maintained and helped to grow and spread. In order to be absolutely clear, I say that cadres of the military regime of Greece support and direct the activity of the EOKA-B terrorist organization. This also explains the involvement of Greek officers of the National Guard in illegal activities, conspiracy and other inadmissible situations… You realize, Mr. President, the sad thoughts which have been preoccupying and tormenting me following the ascertainment that men of the Government of Greece are incessantly preparing conspiracies against me and, what is worse, are dividing the Greek Cypriot people and pushing them to catastrophe through civil strife. I have more than once so far felt, and some cases I have almost touched, a hand invisibly extending from Athens and seeking to liquidate my human existence…” Makarios went on to ask for the immediate withdrawal of all Greek officers in the Cypriot National Guard. 

(353) The State cable, drafted by John Day, of the Greek desk, was dispatched to the Embassy in Athens under Undersecretary Joseph Sisco’s signature. It stated in part: “We share concerns of Athens and Nicosia regarding gravity of relationship between Government of Greece and Government of Cyprus. From various reports, it is evident that Ioannides is seriously considering way to topple Makarios from power…. In our view effort to remove Makarios by force contains unacceptable risks of generating chaos eventually causing Greco-Turk confrontation; involving Soviets in Cyprus situation; and complicating developing U.S.-Soviet detente. 

“We know that Ioannides has long been obsessed with issue of communism both in Greece and in Cyprus and that his dislike for Makarios has bordered on the pathological. Until recently, our impression has been that he preferred to play for time on Cyprus problem until he had consolidated his position in the internal Greek context. Now, however, he apparently feels that Makarios is seeking to take advantage of Greek-Turkish tensions and the Greek regime’s domestic difficulties to reduce Greek influence on the island and that this effort is a personal challenge which he cannot ignore.” The cable went on to instruct Ambassador Tasca to personally tell Ioannides that the U.S. opposed any adventure on Cyprus. Department of State cable to Athens Embassy, June 29, 1974. 

(358) “It is reasonable to ask whether this U.S. action was perceived in Athens as a reflection of the depth of Washington’s concern about Ioannides’ scheme to oust Makarios. Clearly General General Ioannides had much ground to believe that in light of the direct contact he enjoyed with the CIA station, he would have received a stronger, more categoric warning if the U.S. were genuinely exercised about protecting Makarios, whom he regarded as a communist sympathizer. 

“All this leads to one basic conclusion: I believe that strong U.S. representations to Ioannides would have prevented the crisis. This judgment is shared by the rest of the Greek language/area specialists in SE.” “Criticisms of United States Policy in the Cyprus Crisis.” Internal Department of State memorandum. 

(363) As in the previous Mid-East crisis, many NSA SIGINT reports were too technical to be understood by lay analysts. The Post-Mortem added: “As in past crises, most of the Customers interviewed complained of the volume of… reporting, as well as its frequent redundancy. Many also complained of too little analysis of the facts, too few assessments of the significance of reported developments.” 

(366) Intelligence officials have told our staff that U.S. SIGINT resources were not focused on targets which would have the most relevance to an Athens-Nicosia crisis, i.e., Greek National Guard communications. Emergency reaction SIGINT teams were rushed into the area after the coup and later contributed to some successful intelligence. Interview with Intelligence officials, by F. Kirschstein, Dec. 2, 1975, copy on file with Sel. Comm. on Intell.

(368) The NIO responsible for the report which predicted July 20 as the invasion date was preoccupied with the production of a National Intelligence Estimate on Italy which was to be presented at a USIB meeting on the 18th of July. It should also be noted that Cypriot experts within State and CIA were in the process of being shuffled around in a bureaucratic reorganization of area responsibilities. In addition. State Department Washington experts on all three countries concerned, as well as the U.S. Ambassador to Greece, were removed from their posts at one time or another during the crisis. 

(370) Some days later, Roger Davies, the U.S. Ambassador to Cyprus, was fatally wounded during an anti-American demonstration at the Embassy in Nicosia. Contemporary accounts concluded that Davies was simply struck by a stray bullet. Information made available to the Committee suggests that Davies may have been the victim of an assassin. 

Ambassador Tasca disclosed to staff a report that EOKA-B had decided to kill either Davies or himself. U.S.. intelligence officers have asserted not only that Davies may have been intentionally shot, but also that the identities of individuals firing at the Embassy are also known. The intelligence sources have alleged that the individuals may be officials of the Nicosia police. Despite repeated private U.S. protests, the Cypriot government is said to have declined to remove these individuals from their jobs. 

Interview with Henry J. Tasca, by J. Boos, Sept. 26-27, 1975, copy on file with Sel. Comm. on Intell. Interview with CIA officials by G. Rushford and F. Kirschstein, Oct. 22, 1975, copy on file with Sel. Comm. on Intell.

  1. Domestic Internal Security and Counterintelligence 

The Intelligence Division of the FBI is divided into two sections: Internal Security and Counterintelligence. The Internal Security Division investigates domestic subversive or extremist groups with the goal of ascertaining whether individuals are violating federal laws. 

These investigations are costly, in monetary terms and in terms of personal privacy. Are they effectively and dispassionately controlled, in keeping with criminal priorities? Are they efficiently terminated when clearly unproductive? Thirty-four years of investigating the Socialist Workers Party and over five years spying on the Institute for Policy Studies provide some examples of disturbing answers.

a. Institute for Policy Studies 

The FBI Manual of Instructions allows preliminary investigations to be opened on groups espousing extremist philosophies. If these investigations do not demonstrate reasonable likelihood of uncovering criminal violations, the Manual states that they should be terminated within 90 days. 

In 1968, the FBI saw sufficient connection between the Institute for Policy Studies (IPS) and the Students for a Democratic Society (SDS) to open a preliminary investigation of IPS. 

The investigation was not terminated after an initial 90-day period, even though it had turned up no evidence that IPS members or their associates were violating federal laws. Six months later, at the end of a vigorous nine-month investigation of IPS, the Washington field office reported the results as “negative.” 

The IPS investigation was destined to continue for five more years. 

The investigation had been based on an SDS connection. During the investigation, however, FBI had received information from a source, advising “that, in general, the IPS is not well thought of by the hardcore SDS leaders because members of the IPS are not activists,” except for one IPS leader considered sympathetic with SDS objectives. The FBI was not discouraged by the loss of its investigative base, and went ahead reporting unrelated matters. One report, for example, described IPS as “a non-profit, non-taxable institute which studies programs to present policies.” The same report noted the fact that “IPS educational curriculum centers on topics which are critical of the present U.S. system…” 

In January, 1971, the Bureau continued reporting non-criminal matters, such as the fact that the Institute “though small… exerts considerable influence through contacts with educators, Congress and labor.” It is important to remember that the whole probe began with an investigation of alleged contacts between one IPS staffer and an SDS leader. The FBI had effectively reversed the traditional concept of “guilt by association.” Instead of a suspect group tainting an individual, the individual had tainted the group. (377)

An October 1971 Bureau report said of the Institute: 

The popular impression of IPS as the “think tank” of radical United States politics is justified. It has taken and continues to take a major role in the antiwar movement and calls for disarmament. While IPS people see themselves as leaders of radical thought, they would appear to be leaders without a popular constituency. 

The same report concentrated on IPS suspicions of FBI surveillance. It stated that “they suspect that they are being watched from the building across the street and from adjacent buildings.” The same report went on to say that two members of the Institute had been “observed by a representative of the FBI… walking slowly around the block of IPS, sometimes several times, conversing with each other… they appear to be conversing in low tones and in a guarded manner.” 

In August 1972, an alert Bureau agent collected some IPS garbage. (380

The trash revealed no evidence of criminal conduct. However, eight used typewriter ribbons were found. Even though there were no signs of crimes, and despite the fact that IPS itself was not suspected of crimes, FBI devoted time and money to the expensive process of reconstructing the documents that had been typed by the ribbon. 

Part of the yield was intimate sexual gossip. 

FBI officials told Committee staff, under oath, that personal information, such as sexual activities, is discarded if it does not bear on a crime. That was not true. Information from the trash retrieval, including the sexual gossip, was incorporated into a number of reports. In each report, the information was attributed to “a source who has supplied reliable information in the past.” 

In 1975, the Washington Field Office reported that “the organization [IPS] is fragmented into a wide variety of studies and interests, the vast majority of which appear to be within legal limits.” In May 1974, the Washington Field Office concluded that a “paucity of information exists that would support the likelihood of IPS or its leaders to be functioning in violation of federal law.” Only then, after five years and no evidence of law-breaking, did the investigation become inactive. 

b. Socialist Workers Party 

The second example involved the Socialist Workers Party (SWP). The SWP adopted a Declaration of Principles and a Constitution at their founding convention in January 1958. The Declaration of Principles was replete with revolutionary rhetoric of the Marxist Left. The fledgling Socialist Workers Party also swore allegiance to the world-wide organization of Trotsky — the Fourth International. 

Nevertheless, the SWP dissolved their allegiance with the Fourth International and retracted this Declaration of Principles on December 21, 1940, in order to comply with the Voorhis Act. The FBI maintained that this disassociation with the Fourth International was merely cosmetic. However, the FBI has been unable to prove any illegal relationship between the SWP and the Fourth International. 

FBI’s failure to uncover illegal activity by this political party is not from lack of effort. SWP has been subjected to 54 years of intensive investigation. 

On November 5, 1975, FBI officials testified that the Fourth International itself was a body made up of Marxist elements around the world and enjoyed no structural power base in the Soviet Union. Significantly, these officials demonstrated no detailed knowledge about the Fourth International. FBI officials did not mention the fact that the Socialist Workers are a legitimate American political party, that even runs a candidate for President. Equally as important, the FBI has found no evidence to support a federal prosecution of an SWP member, with the exception of several Smith Act violations in 1941. Since that time, not only have there been no further prosecutions against the SWP for any Federal offense, but the portions of the Smith Act under which these earlier convictions had been obtained have been declared unconstitutional. 

The investigation, which FBI officials tacitly admit has been conducted partially under the aegis of an unprosecutable statue, has revealed that the SWP is a highly law-abiding group. The SWP has even avoided illegal and potentially violent confrontations with the authorities during any sort of civil protest. Nevertheless, this had no apparent impact on 34 years of unproductive spying. 

According to the Presidential candidate of the SWP, Peter Camejo, party members are even forbidden by the SWP to smoke marijuana. The Bureau apparently formulated a philosophy, in this case, to justify their investigation. 

Considerable resources have been allocated to compound the error of a continuing unproductive investigation and to back-stop the preconceptions of FBI personnel. 

For example, FBI Internal Security investigators committed a massive manpower allocation to interviewing landlords, employers, fellow employees, and family relations of SWP members. The FBI also maintained intensive surveillance of most, if not all, of the SWP’s 2500 members. 

Americans are often concerned about privacy invasions of domestic security investigations. One-fifth of all investigations initiated by the FBI during the last decade dealt with security matters. The important issue is whether citizens receive a valuable product in the form of anticipatory intelligence which would serve as a deterrent to, and a prevention of crime. While it is impossible to accurately gauge the deterrent effect of FBI efforts, it is obvious that the FBI failed to anticipate groups dedicated to the overthrow of the existing government and fully committed to violence. (400

The FBI has likewise had a dismal record in the prompt apprehension of fugitives from the New Left underground. (401) Domestic intelligence appears to be suffering from a misallocation of resources and effort. 

(377) One group may taint another group. The FBI initiated investigation of the Vietnam Veterans Against the War because the VVAW had the misfortune of being mentioned favorably by the Communist Party.… 

(380) “Institute for Policy Studies (IPS) is DASH, RA. On August two three last, [a Special Agent] observed a private trash truck picking up trash from IPS. The truck proceeded to a burning dump, where the trash was abandoned. [The Special Agent] obtained the IPS trash, and information obtained from this source is being assigned symbol number [deleted] .” NITEL Cable to Acting Director, FBI from SAC, WFO, Aug. 8, 1972. 

(400) The S.L.A. is an example. The FBI provided staff attorneys with a detailed after-the-fact history of the S.L.A. However, the FBI was apparently unable to anticipate the formation of the group or thwart its initial criminal activities. FBI briefing on Intelligence by [W. Raymond] Wannall, et al., attended by J.B.F. Oliphant and R. Vermeire. 

(401) Mark Rudd, Abbie Hoffman, et al. 

  1. President’s Foreign Intelligence Advisory Board 

In addition to day-to-day bureaucratic efforts to monitor and to improve intelligence, the executive branch oversees performance through mechanisms like the quasi-public President’s Foreign Intelligence Advisory Board (PFIAB). The issue is whether such a mechanism is viable and effective. 

Staff investigation suggests that reliance on PFIAB for oversight responsibility is totally without merit. The Board, admittedly part-time, meets for one- or two-day sessions about six times a year. The Chairman spends about half his time on PFIAB affairs. Only two professional staff members support the Board, and both are detailees from the very intelligence agencies they are supposed to oversee. 

The meeting and staffing arrangements do not lend themselves to a responsible analysis and review of massive and complex intelligence programs. It is said that, from time to time, PFIAB submits to the President useful documents on covert action and technical collection programs. However, the Committee, denied access to these and other periodic PFIAB reports, is unable to determine whether the Board has been functioning meaningfully. (405

Two important and limiting factors shed light on the role and performance of the Board. The Board cannot establish or even oversee policy, but is limited to advising the President with respect to objectives and conduct of the foreign intelligence and related activities. The Board’s effectiveness also is limited by the interest and confidence of the President, and this has varied considerably throughout the five Administrations of the Board’s existence. 

The problems do not end there. Board members are chosen for distinguished careers in government, academia, and the business world. Not surprisingly, members of PFIAB, whose principal functions include advice on research and development goals, are typically affiliated with firms holding lucrative intelligence and defense contracts. (408

There are no indications that a PFIAB member has ever improperly profited from his Board service. However, after searching Board records at the request of Committee staff, a PFIAB spokesman stipulated that there are no conflict-of-interest regulations applicable to its members. Likewise, there were no regulations covering the expense and confidential contracts they assess and review. Instead, members are provided, on their appointment, with the “Standards of Conduct for the White House Staff.” 

There are obviously difficult policy problems in gathering a group of distinguished and knowledgeable citizens and, at the same time, insuring that the Board’s activities and judgments are entirely beyond reproach. 

The part-time nature of PFIAB, if its work is recognized as being cursory, is not necessarily undesirable. Members can bring a fresh perspective from their other pursuits, and they are less compromised by the secrecy and insular views of intelligence agencies. On the other hand, heavy reliance on this Board for oversight, without more outside professional staff and greater Presidential commitment, is an illusion. 

(405) The Committee felt that access to materials relied on and prepared by the Board was the only equitable method of assessing the Board’s past performance and role within the structure of the intelligence community. The Committee, without reliance on subpoena, attempted in vain to gain access to materials used by and prepared by the Board. After several months of negotiation, the Committee was granted access to a classified Board history, which outlined, but did not specifically enunciate, the kinds of recommendations the Board has made since its inception, and the agendas of the Board’s meetings from January 1961 to the present. 

(408) For example, present members of the Board whose corporations hold such contracts include William O. Baker, President, Bell Telephone Laboratories: John S. Foster, Jr., Vice-President for Energy Research and Development, TRW; Robert W. Galvin, Chairman and Chief Executive Officer of Motorola, Inc.; Edwin H. Land, Board Chairman, Polaroid Corporation; and Edward Teller, Associate Director of Lawrence Livermore Laboratory. In addition, three of the remaining four members have formidable military credentials and affiliations: George W. Anderson, Jr., former Chief of Naval Operations: Leo Cheme, member of the Board of Advisors of the Industrial College of the Armed Forces; and Gordon Gray, former Secretary of the Army and Director of the Office of Defense Mobilization.

  1. National Security Council Intelligence Committee 

…The National Security Intelligence Committee has met only twice in four years. [Membership consists of the Assistant to the President for National Security Affairs as Chairman, DCI, Deputy Secretary of State, Deputy Secretary of Defense, Chairman of the Joint Chiefs of Staff and Under Secretary of the Treasury for Monetary Affairs — editor’s note.] It met once in December 1971, to organize, and once in August, 1974, to re-organize. It has no permanent staff, other than the NSC Director for Intelligence Coordination, Richard Ober, a CIA detailee and architect of the controversial CHAOS program. There is no indication that the Committee has been effective. 

A Working Group is composed of the next lower-level of consumers. Although in existence from 1971 to 1974, it apparently did not perform any useful function. This group was revived following the 1974 Intelligence Committee meeting and met seven times thereafter. While Working Group principals assert a need for intelligence consumers to somehow institutionally convey their problems to collectors, there appears to be a general low level of interest on the part of several members and misgivings as to the effectiveness of the panel as presently constituted. 

The Economic Intelligence Subcommittee’s performance to date can be easily evaluated. While its purpose — to provide consumers of economic intelligence a forum to convey their needs — appears worthwhile on paper, it has produced no results. One meeting was held in May 1975, at the behest of the DCI. 

The Chairman, Assistant Secretary of the Treasury for International Affairs, told Committee staff that as a consumer he was generally satisfied with intelligence input, that the group was a waste of time, and that he intended to hold as few meetings as possible. Displaying an attitude rare among government officials, the Chairman disdained formal high-level committees and called for informal communication at the working level. He has since left his post and may well be replaced by a proponent of bureaucratic committees. Nonetheless, the record strongly calls for an abolition of the Subcommittee, as presently operated and tasked. 

  1. The Management and Production of Defense Intelligence 

The Deputy Secretary of Defense recently expressed frustration at the apparent inability of a multi-billion dollar U.S. intelligence establishment to produce timely and useful information. He reportedly complained that “In a mechanical sense the system produces the information, but it’s so damn big and cumbersome and uncoordinated, that you can’t get the information properly assessed and to the right people.” (417

Mismanaged and uncoordinated intelligence operations result in more than resource wastage. 

During the Mideast war and Cyprus crisis, for example, uncoordinated and duplicative reports compounded the problem of interpreting events. (418

There is a clear need to challenge organizational proliferation, duplication of activity and product, and overlapping of management layers that have plagued defense intelligence for years. The significance of these problems is contained in the fact that the Department of Defense controls nearly 80 percent of the intelligence community’s resources and employs nearly 90 percent of its personnel. 

Particular attention must be directed toward the Defense Intelligence Agency (DIA), an organization established in the early 1960s to integrate and align defense intelligence activities, and a major production unit in its own right. 

As chartered, DIA was to function as both a supervisor and coordinator, and as centralized producer of intelligence. 

Over the years, however, it became increasingly apparent that DIA could not accomplish the ambitious management and production goals envisioned at the time of its formation. A string of overviews, including the 1969 Froehlke report, the 1970 Blue Ribbon Defense Panel, the 1971 Schlesinger study for the Office of Management and Budget, the 1974 Management Review, and the 1975 Defense Panel on Intelligence all found that organizational impediments and product imperfection have continued to persist after years of DIA operation. Each in turn recommended reorganization and substantive improvements. None solved the problems. 

DIA lacks comprehensive authority to direct and control resources throughout the Defense Department, as initially envisioned. For example, the vast cryptologic resources in the armed services and the National Security Agency are not responsible to DIA. DIA’s resources management functions were taken over in 1972 by an Assistant Secretary of Defense for Intelligence with a broader mandate to coordinate budgeting. 

The central problem is bureaucratic politics. The three individual branches of the military resist any organization which might curb their authority to direct programs and allocate resources. They undermine the concept on which DIA was founded, by avoiding its authority and preventing it from obtaining qualified manpower. 

President Nixon recognized that DIA had not achieved its purpose and issued a directive on Nov. 5, 1971, charging the DCI with responsibility for intelligence budget preparation, including the budget for tactical military intelligence. This too failed, since the DCI lacked authority for over 80 percent of the community’s budget, which remained in the Department of Defense. (421)

The only noticeable effect of these reforms has been an added layer of bureaucracy and a confused sharing of responsibilities. 

The output side of DIA’s operation has been criticized from a number of directions. Over the years, neither the Secretary of Defense nor the armed services have been completely satisfied with DIA product. Secretary of Defense McNamara reportedly preferred CIA’s product; the services prefer their own analysis. (423) Their criticisms focus on DIA’s current intelligence and its estimates. They raise questions as to DIA’s capability to produce unique and quality intelligence to meet tactical and national demands. 

An internal Defense Department memorandum to the Deputy Secretary of Defense in January 1974, indicated the scope of DIA inadequacy in light of the Mid-East war failures. The memorandum concluded: “What has been stated briefly are only the symptoms of the disease. The causes lie deeper…”

While noting the failure of DIA analysts to predict the war, the memo stated, “The blame is not theirs alone. It is a corporate failure, a chronic unsoundness of the entire DIA mechanism. Unless we make the required changes in organization, procedures, and personnel, we are going to reap another intelligence failure — and the next one could be a disaster involving U.S. Forces.” 

While several of the root causes of poor performance provide an argument for piecemeal reform, in general the problems are too permanent to allow for anything less than across-the-board changes. 

A major obstacle to strong analytic capability within DIA results from the civilian-military nature of DIA, in a setting of independent military establishments. As long as the service branches retain viable intelligence units, DIA remains an unattractive assignment and will not attract qualified officers. In addition, manpower reductions have spread available personnel too thin for effective reporting. 

Civilians in DIA are confronted with two disincentives. DIA cannot compete with CIA and NSA in appointments and promotions, and persistent military control of higher grade management positions limits mobility. (428)

Officials within DIA are ready to admit they cannot match CIA. They justify their contribution as that of “devil’s advocates,” or “honest brokers.” Even in military intelligence, the Committee was told, “they (CIA) are at least our equals,” meaning that DIA was no real improvement over CIA intelligence.

In summary, finished intelligence generated by DIA has repeatedly failed to meet consumer needs. The evidence suggests that DIA does not fulfill the ambitious expectations of the early 1960s. It is duplicative, expensive, unattractive, and its production capabilities are handicapped by the consistent weaknesses of its own organization. 

(417) Quoted by William Beecher, Acting Assistant Secretary of Defense for Public Affairs, in Report of the Defense Panel on Intelligence, January, 1975, p. 7 of his statement. 

(418) See, for example, the IC Staff Preliminary Post-Mortem report on the October War which concludes, “The coordination procedures which are followed by the Community during normal times are frequently abandoned during times of crisis — because the press of time may simply not allow regular processes to continue. It thus has been said that the Community is pretty good about coordinating, except when the intelligence becomes important. And, in a way, this did indeed happen immediately before and during the October War in the Middle East. Coordination of the Central Intelligence Bulletin, for example, was suspended for a time, and the wartime Situation Reports and Spot Reports prepared by CIA, DIA and INR were unilateral and often duplicative issuances. This, if not a major problem for the analysts themselves, was certainly one for the consumers.…” (IC Stall., The Performance of the Intelligence Community Before the Arab-Israeli War of October 1973: A preliminary Post-Mortem Report, December, 1973, p. 19, emphasis added.)…. 

(421) The President on November 5, 1971, citing the “need for improved intelligence product and for greater efficiency in the use of resources allocated to intelligence” charged the DCI with greater responsibility for coordinating the community intelligence effort. His Memorandum stated that the President would “look to him (DCI) to improve the performance of the community, to provide his judgments on the efficiency and effectiveness of all intelligence programs and activities (including tactical intelligence), and to recommend the appropriate allocation of resources to be devoted to intelligence,” (emphasis added). More specifically, he directed “the Director of Central Intelligence to prepare and submit each year, through OMB, a consolidated intelligence program budget, including tactical intelligence,” (emphasis added). These sentiments are reiterated in an October 9, 1974, Presidential Memorandum.… 

(423) General Graham has written the committee: “I believe that much of this criticism stems from the early growing pains of the DIA, when its consumers, particularly those on Mr. McNamara’s staff, turned elsewhere for intelligence analysis, when the DIA product did not satisfy them.” The 1975 Defense Panel on intelligence indicated dissatisfaction with DIA by Secretary of Defense Schlesinger and the Assistant Secretary of Defense for International Security Affairs, both important consumers. Vice Admiral David Richardson, in the same report, offered his experience as a commander of deployed forces to point out “the institutional inability of the Agency to provide other than intelligence for background and database purposes.” 

(428) The most recent density ratios (supergrades compared to total force) show that possibility of advancement for civilians is vastly better in CIA than in DIA. The Civil Service Commission has refused DIA exemption from the General Schedule that CIA maintains. A deputy director of DIA informed Committee staff that civilians are still “second class citizens” there. Staff interview with James Agersborg, DDI/DIA, Nov. 10, 1975. Statistics provided by ASDI.


The American taxpayer clearly does not receive full value for his intelligence dollar. The costs of intelligence should not, however, be measured in dollars alone. Many day-to-day activities inevitably pose real risks. 

The Committee has found that when results are measured against hazards alone, certain intelligence programs may be wholly unacceptable; other projects may too easily stray from wise and worthwhile courses, without detection. 

It is disturbing that the consequences of intelligence activities are sometimes apparently given scant consideration by policy-makers. Even more troubling are indications that this insensitivity continues when dangers reveal themselves. 

  1. Covert Action 

The Committee has examined CIA covert action operations and has considerable evidence that they are irregularly approved, sloppily implemented, and at times have been forced on a reluctant CIA by the President and his National Security Advisor. 

“Covert action” may be defined as clandestine activity other than purely information-gathering, which is directed at producing a particular political, economic, or military result. 

Successive administrations have cited Section 102 of the National Security Act of 1947 as the legal justification for covert action. (431) During the course of this investigation, the Special Counsel to the Director of Central Intelligence has argued that the President, in his conduct of foreign relations, has an inherent Constitutional mandate to authorize these activities. (432

On the other hand, in recent years, commentators have maintained that in establishing the CIA, Congress had no specific intention that covert operations apart from intelligence-gathering missions be conducted. Witnesses before the Committee likewise disputed any inherent Constitutional power to conduct covert actions. In any event, Congress has implicitly acquiesced in covert action through the oversight process. 

It may be argued that there has been explicit approval as well. Just as the War Powers Act acknowledges the authority of the President to conduct overt military hostilities, albeit for a limited period, without a Congressional declaration of war, the Ryan-Hughes Amendment to the Foreign Assistance Act of 1974 (434) formally acknowledges the existence and legality of covert action. 

The Committee has surveyed all Forty Committee approvals since 1965, and has delved deeply into three recent covert action projects. It is believed that the Committee’s review of ten years of covert action is without precedent in the Congress or the executive branch. 

a. Ten Year Survey 

Our primary purpose was to determine whether the Forty Committee and its predecessors had been exercising their oversight and control responsibilities from 1965 to date. (435) To do this, it was necessary to trace the process from proposal to final approval. 

Like other aspects of covert action, fixing responsibility for the initiation of various covert action projects was a difficult task. As recorded in Forty Committee records, the vast majority of projects was submitted by the CIA, 88 percent of the total projects since 1965. The high number of covert action proposals represents a general activism within the foreign affairs bureaucracy, especially within CIA. 

The overall picture, however, does not support the contention that covert action has been used in furtherance of any particular principle, form of government, or identifiable national interest. Instead, the record indicates a general lack of a long-term direction in U.S. foreign policy. Covert actions, as the means for implementing a policy, reflected this band-aid approach, substituting short-term remedies for problems which required long-term cures. 

Covert action proposals came from a variety of interest areas: a foreign head of state, the Department of Defense, the Department of State, an Ambassador. CIA. the Assistant to the President for National Security Affairs, a cabinet member, or the President himself. 

Proposals involving a large expenditure of funds or classified as “politically sensitive,” required review and approval of the Forty Committee. Unfortunately, the executive branch does not have a clear definition of what constitutes a large or politically sensitive operation. Projects of less sensitivity are approved within the CIA, usually at the level of the Deputy Director for Operations, with the determination of “political sensitivity” being left to the Director of Central Intelligence. 

The Forty Committee is chaired by the Assistant to the President for National Security Affairs and includes the Deputy Secretary of Defense, the Undersecretary of State for Political Affairs, the Chairman of the Joint Chiefs of Staff, and the Director of Central Intelligence. Theoretically, a detailed proposal is presented to this group. The members are then afforded an opportunity for a full discussion of the merits and a reporting of their views to the President. In practice, the Forty Committee has often been little more than a rubber stamp. 

The procedures for approval of covert action have changed with administrations, political conditions and personalities. At various times, the approval process has been relatively informal, extraordinarily secretive, and pro-forma. 

While on occasion some projects have been, considered in depth, at Committee meetings which included the approval or disapproval by formal votes, several informal procedures have frequently been used. These informal procedures, such as telephonic votes, do not allow each member to benefit from the views of his colleagues. At times, members have been given only the barest of details, and instead of formal votes have simply been allowed the opportunity to acknowledge the project’s existence. 

The Forty Committee has only one full-time professional staff member. Because of the high degree of compartmentation attending these projects, committee members — who are among the busiest officials in government — are frequently in the position of evaluating a complex proposal without adequate staff support. The Assistant to the President for National Security Affairs and the Director of Central Intelligence, having the incentive and the resources to cope with Forty Committee business, clearly dominate the process. 

The origin of many covert action projects is murky at best. 

The CIA, as the prospective implementation arm, is often directed to produce proposals for covert action and is, therefore, incorrectly seen as a plan’s original proponent. It is clear that on several occasions’ involving highly sensitive projects, CIA was summarily ordered by the President or his National Security advisor to carry out a covert action program. It is further clear that CIA has been ordered to engage in covert action over the Agency’s strong prior objections. 

All evidence in hand suggests that the CIA, far from being out of control, has been utterly responsive to the instructions of the President and the Assistant to the President for National Security Affairs. It must be remembered, however, that the CIA Director determines which CIA-initiated covert action projects are sufficiently “politically sensitive” to require Presidential attention. 

From 1965 to 1972, a majority of approvals occurred subsequent to a formal committee meeting; although many telephonic approvals also took place during this period. In 1972, the process became quite informal, often involving mere notification to members that an operation had already been set in motion by the President. The Forty Committee, as the review and approval mechanism for covert action, fell into virtual disuse, with telephonic approvals being the rule and formal meetings the exception. One formal meeting was held in 1972, none in 1975 and 1974. This process did not begin to reverse itself until 1975. 

b. Election Support 

From 1965 to date, 32 percent of Forty Committee approved covert action projects were for providing some form of financial election support to foreign parties and individuals. Such support could be negative as well as positive. This is the largest covert action category, and its funding has occurred in large part in the developing countries. With few exceptions, financial support has been given to incumbent moderate party leaders and heads of State. 

Certain projects have had a long life. One Third World leader received some $960,000 over a 14-year period. Others were financially supported for over a decade. 

c. Media and Propaganda 

Some 29 percent of Forty Committee–approved covert actions were for media and propaganda projects. This number is probably not representative. Staff has determined the existence of a large number of CIA internally-approved operations of this type, apparently deemed not politically sensitive. It is believed that if the correct number of all media and propaganda projects could be determined, it would exceed Election Support as the largest single category of covert action projects undertaken by the CIA. 

Activities have included support of friendly media, major propaganda efforts, insertion of articles into the local press, and distribution of books and leaflets. By far the largest single recipient has been a European publishing house funded since 1951. There are a number of similar operations in the region. About 25 percent of the program has been directed at the Soviet Bloc, in the publication and clandestine import and export of Western and Soviet dissident literature. 

d. Paramilitary/Arms Transfers 

The 23 percent approvals in this category from 1965 to 1975 have taken one of essentially four forms: secret armies; financial support to groups engaged in hostilities; paramilitary training and advisers; and shipment of arms, ammunition and other military equipment. Military ordnance is typically supplied by CIA out of its large inventory of U.S. weaponry and captured foreign weapons. 

The Committee scrutinized these projects carefully, since this category is the most expensive and represents the greatest potential for escalating hostilities and deepening American involvement. By far the most interesting, and important, fact to emerge was the recognition that the great majority of these covert action projects were proposed by parties outside CIA. Many of these programs were summarily ordered, over CIA objections. CIA misgivings, however, were at times weakly expressed, as CIA is afflicted with a “can do” attitude. 

At times, CIA has been used as a conduit for arms transfers in order to bypass Congressional scrutiny. A State Department–proposed project which could have been accomplished under the Military Assistance Program was tasked on CIA because the Department of Defense did not desire to return to Congress for additional funds and approval. 

e. Organizational Support 

A plethora of foreign, civic, religious, professional, and labor organizations have received CIA funding. There has been no real geographical concentration, although the Third World was again well represented. For example, one labor confederation in a developing country received an annual subsidy of $30,000 in three successive years. 

f. Trends 

Since 1965, there has been a general decline in the number of covert action projects approved by the Forty Committee. There are indications that the low figure represents the Director of Central Intelligence’s determination that not as many projects should be considered “politically sensitive” and taken to the Forty Committee for approval. This, in turn, may reflect his recognition that the Forty Committee had fallen into disuse and their approvals pro-forma. 

There is no indication that the passage of the Ryan-Hughes Amendment to the Foreign Assistance Act of 1974, requiring Presidential certification and briefings of Congressional oversight committees, has had a significant impact on the national covert action program. As the events of 1975 have shown, those who had warned that the Amendment and the Congressional probes into the U.S. intelligence community would make covert action impossible, have not seen their fears realized. 

g. Three Projects 

The three projects examined in depth were selected from major recent operations, apart from the American experience in Indochina, and involved different types of covert activity. One was election funding of pro-U.S. elements in an allied country. The second was Presidentially-directed arms support of an insurgency movement at the behest of the foreign head of a third country. The last involved a mix of political action, military training, and assistance to pro-Western forces in Angola. The last project was also initiated in part at the request of a third party. 

The Committee became aware of each of these operations through other parts of its investigation and through information provided to staff by sources outside the intelligence community. For example, a study of CIA arms inventories and shipments led to the major Agency paramilitary support operations. 

The case studies are not representative of all covert action since 1965. The Committee does believe that they are not atypical of most major programs of this type. CIA has indicated its agreement with the completeness and factual accuracy of the staff’s analysis, though not necessarily with the conclusions. 

Case 1: Election Support

The U.S., perhaps needlessly, expended some $10 million in contributions to political parties, affiliated organizations, and 21 individual candidates in a recent parliamentary election [1972 — editor’s note] held in an allied country (447) [Italy — editor’s note]. 

The program was initiated by our Ambassador [Graham Martin — editor’s note], who later persuaded the Assistant to the President for National Security Affairs [Henry Kissinger — editor’s note] to authorize him, rather than CIA, to select funding recipients and otherwise control the program’s implementation. The results of the aid were mixed, and short-lived. 

With national assembly elections less than two years away, the U. S. country team concluded from a CIA-contracted survey that the pro-U.S. elements, which had governed the country since the post-war period, were being seriously challenged by the Communists. The opposition, apparently heavily financed by Moscow, had scored gains in regional elections and trailed the incumbents by only a few points in the opinion polls. 

Pro-West parties and affiliates had received substantial funding in the past. CIA reports total U.S. election financing over a previous 20-year period at some $65 million. (448) Despite this massive aid, the beneficiaries had suffered repeated electoral setbacks. American observers apparently concluded that another “quick fix” was necessary to see our clients through the next vote. 

Anxious to gain control of the covert program, and fearing that inter-agency consideration would be inhibiting, the Ambassador has originally sought the President’s personal approval of this proposed political action. (449

This course would avoid the Forty Committee and, with it, the inevitable role of CIA in implementing the program. The Ambassador was rebuffed. Ironically, the Assistant to the President then requested that CIA draft a proposal without the knowledge of the Ambassador or the Department of State. (450

It is known that during this period the President was indirectly approached by prominent international businessmen, who were former nationals of the allied country. Their communications to the President were not available to the Committee. (451

The Forty Committee subsequently approved the CIA proposal, but with unusual implementation. Despite the usual near-automatic control of covert action by CIA, the Ambassador, by all accounts a man of unusual force, successfully extracted from the Assistant to the President the commitment that he would have total control of the “mix and implementation” of the project. (452) Thus, the Ambassador, who had been in the country less than two years and did not speak the language, would determine which individuals and organizations would receive U.S. funds. The CIA station would be reduced to couriers. The Agency expressed concern that a high profile by the Ambassador would needlessly compromise the program; their complaints fell on deaf ears, despite the agreement of all that exposure would bring down the pro-West government. 

A major political party received $3.4 million; a political organization created and supported by CIA, $3.4 million; other organizations and parties, a total of $1.3 million. Substantial funds were provided to several incumbents whose seats did not appear in jeopardy. Of a total of $11.8 million approved by the Forty Committee, only $9.9 million was actually spent. The reserve was held to be spent in the following year. 

CIA concurred in most of the recipients chosen by the Ambassador, although differences were expressed on precise amounts. There were serious disagreements over some recipients. One of these was a high local intelligence official to whom the Ambassador wanted to give over $800,000, to conduct a propaganda effort. The Ambassador was unmoved by CIA warnings that the man was clearly linked to anti-democratic elements of the right, and went ahead with the funding. (456

Embassy control of the funds was poor. Participants in the program testified before the Committee that little effort was made to earmark grants or, failing that, at least seek assurances that the money was spent as intended by the Forty Committee. The Ambassador resisted most CIA control suggestions, insisting that such monitoring would insult the recipients. Thus, there was almost no accounting or control of the expenditures. (457) There is no indication that the Ambassador began to encounter interference from Washington at this point. 

The fruits of this U.S. investment are difficult to assess. The pro-U.S. elements retained control of the government by a small plurality, and most of the incumbents supported were returned to office. On the other hand, the ruling coalition quickly lost public support and suffered severe reverses in subsequent local elections. 

Case 2: Arms Support 

[At this point in the committee report one manuscript page was missing. It is clear from the context that the missing material opened a discussion of a U.S. scheme, involving the Shah of Iran, to channel secret aid to the Kurds in their rebellion against the government of Iraq.] (459)

The program, ultimately to involve some $16 million, was apparently endorsed by the President after a private meeting with the foreign head of state and Dr. Kissinger. 

There was no Forty Committee meeting at which cons could be discussed and voted on. Instead, members were simply directed to acknowledge receipt of a sparse, one-paragraph description of the operation. In a setting of almost unprecedented secrecy within the U.S. government, John B. Connally, the former Treasury Secretary, about to assume a major role in the President’s re-election campaign, personally advised the head of state that the U.S. would cooperate. (461) 

The recipients of U.S. arms and. cash were an insurgent ethnic group fighting for autonomy in a country bordering our ally. The bordering country and our ally had long been bitter enemies. They differed substantially in ideological orientation and in their relations with the U.S. 

Evidence collected by the Committee suggests that the project was initiated primarily as a favor to our ally, who had cooperated with U.S. intelligence agencies. and who had come to feel menaced by his neighbor. 

As our ally’s aid dwarfed the U.S. aid package, our assistance can be seen as largely symbolic. Documents made available to the Committee indicate that the U.S. acted in effect as a guarantor that the insurgent group would not be summarily dropped by the foreign head of state. (462) Notwithstanding these implicit assurances, the insurgents were abruptly cut off by our ally, three years, thousands of deaths, and 16 million U.S. dollars later. (463)

It appears that, had the U.S. not reinforced our ally’s prodding, the insurgents may have reached an accommodation with the central government, thus gaining at least a measure of autonomy while avoiding further bloodshed. Instead, our clients fought on, sustaining thousands of casualties and 200,000 refugees. 

There is little doubt that the highly unusual security precautions and the circumvention of the Forty Committee were the product of fears by the President and Dr. Kissinger that details of the project would otherwise leak — a result which by all accounts would have mightily displeased our ally. It is also clear that the secrecy was motivated by a desire that the Department of State, which had consistently opposed such ventures in the region, be kept in the dark. (464)

Perhaps more than the President’s disregard of the Forty Committee, the apparent “no win” policy of the U.S. and its ally deeply disturbed this Committee. Documents in the Committee’s possession clearly show that the President, Dr. Kissinger and the foreign head of state hoped that our clients would not prevail. (465) They preferred instead that the insurgents simply continue a level of hostilities sufficient to sap the resources of our ally’s neighboring country. (466) This policy was not imparted to our clients, who were encouraged to continue fighting. Even in the context of covert action, ours was a cynical enterprise. 

It is particularly ironic that, despite President Nixon’s and Dr. Kissinger’s encouragement of hostilities to keep the target country off-balance, the United States personally restrained the insurgents from an all-out offensive on one occasion when such an attack might have been successful because other events were occupying the neighboring country. (467) 

All U.S. aid was channeled through our collaborator, without whose logistical help direct assistance would have been impossible. Our national interest had thus become effectively meshed with his. Accordingly, when our ally reached an agreement with the target country and abruptly ended his own aid to the insurgents, the U.S. had no choice but to acquiesce. The extent of our ally’s leverage over U.S. policy was such that he apparently made no effort to notify his junior American partners that the program’s end was near. 

The insurgents were clearly taken by surprise as well. Their adversaries, knowing of the impending aid cut-off, launched an all-out search-and-destroy campaign the day after the agreement was signed. (469) The autonomy movement was over and our former clients scattered before the central government’s superior forces. (470) 

The cynicism of the U.S. and its ally had not yet completely run its course, however. Despite direct pleas from the insurgent leader and the CIA station chief in the area to the President and Dr. Kissinger, the U.S. refused to extend humanitarian assistance to the thousands of refugees created by the abrupt termination of military aid. As the Committee staff was reminded by a high U.S. official, “covert action should not be confused with missionary work.” (471)

Case 5: Angola 

For reasons not altogether clear, and despite the opposition of senior government officials, the U.S. has been heavily involved in the current civil war in Angola. 

The CIA has informed the Committee that since January 1975, it had expended over $31 million in military hardware, transportation costs and cash payments by the end of 1975. The Committee has reason to believe that the actual U.S. investment is much higher. Information supplied to the Committee also suggests that the military intervention of the Soviet Union and Cuba is in large part a reaction to U.S. efforts to break a political stalemate, in favor of its clients. 

The beneficiaries of U.S. aid are two of the three contesting factions: the National Front for the Independence of Angola (FNLA) and the National Union for the Total Independence of Angola (UNITA). The third faction contesting for control of the government, following independence on November 11, 1975, is the Soviet-backed Popular Movement for the Liberation of Angola (MPLA). CIA estimates that the fighting had claimed several thousand casualties by the end of 1975. 

The main U.S. client is the National Front, headed by Holden Roberto, a longtime associate and relative of President Mobutu Sese Seko of neighboring Zaire. Subsequent to President Mobutu’s request last winter to Dr. Kissinger, as independence for Angola became a certainty and liberation groups began to jockey for position, the Forty Committee approved furnishing Roberto $300,000 for various political action activities, (474) restricted to non-military objectives. 

Later events have suggested that this infusion of U.S. aid, unprecedented (475) and massive in the underdeveloped colony, may have panicked the Soviets into arming their MPLA clients, whom they had backed for over a decade and who were now in danger of being eclipsed by the National Front. Events in Angola took a bellicose turn as the U.S. was requested by President Mobutu to make a serious military investment. 

In early June. 1975, CIA prepared a proposal paper for military aid to pro-U.S. elements in Angola, the cost of which was set at $6 million. A revised program, costing $14 million, was approved by the Forty Committee and by President Ford in July. This was increased to $25 million in August, and to about $32 million in November. By mid-summer, it was decided that U.S. aid should not be given solely to Roberto, but instead, divided between him and UNITA’s Jonas Savimbi. 

The Committee has learned that a task force composed of high U.S. experts on Africa (477) strongly opposed military intervention; instead, last April they called for diplomatic efforts to encourage a political settlement among the three factions to avert bloodshed. Apparently at the direction of National Security Council aides, the task force recommendation was removed from the report and presented to NSC members as merely one policy option. The other two alternatives were a hands-off policy or substantial military intervention. 

Of CIA’s $31 million figure, said to represent expenditures to the end of 1975, about half is attributed to supply of light arms, mortars, ammunition, vehicles, boats, and communication equipment. The balance includes shipping expenses and cash payments. The Committee has reason to question the accuracy of CIA’s valuation of military equipment sent to Angola. 

A staff accountant on loan from the General Accounting Office has determined that CIA “costing” procedures and the use of surplus equipment have resulted in a substantial understatement of the value of U.S. aid. Examples include .45 caliber automatic weapons “valued” by CIA at $5.00 each and .30 caliber semi-automatic carbines at $7.55. Based on a sampling of ordnance cost figures and a comparison with Department of Defense procedures, staff advises that the CIA’s ordnance figure should at least be doubled. 

Dr. Kissinger has indicated that U.S. military intervention in Angola is based on three factors: Soviet support of the MPLA and the USSR’s increased presence in Africa, U.S. policy to encourage moderate independence groups in southern Africa, and the U.S. interest in promoting the stability of Mobutu and other leadership figures in the area. Past support to Mobutu, along with his responsiveness to some of the United States recent diplomatic needs for Third World support, make it equally likely that the paramount factor in the U.S. involvement is Dr. Kissinger’s desire to reward and protect African leaders in the area. The U.S.’s expressed opposition to the MPLA is puzzling in view of Director’s Colby’s statement to the Committee that there are scant ideological differences among the three factions, all of whom are nationalists above all else. (481

Control of resources may be a factor. Angola has significant oil deposits and two American multinationals, Gulf and Texaco, operate in the off-shore area. Gulf had deposited some $100 million in concession fees in a national bank now under MPLA control. At the suggestion of the U.S. government, the company suspended further payments. 

Until recently, the U.S.-backed National Front was supported by the People’s Republic of China, which had provided about 100 military advisers. Moboutu has provided a staging area for U.S. arms shipments and has periodically sent Zairois troops, trained by the Republic of North Korea, into Angola to support Roberto’s operations. Small numbers of South African forces have been in the country and are known to have been in contact with Savimbi’s UNITA troops. 

Pursuant to Section 662 of the Foreign Assistance Act of 1974. the President has found that the Angola action program is “important to the national security.” As directed by the Act. CIA has briefed the Congressional oversight committees as to the Forty Committee approvals of increased amounts of military aid. 

CIA officials have testified to the Committee that there appears to be little hope of an outright MPLA military defeat. Instead, U.S. efforts are now aimed at promoting a stalemate, and in turn, the ceasefire and the coalition government urged by the long-forgotten NSC task force. 

(431) Section 102 (d) (5) calls on CIA, under National Security Council direction, “to perform such other functions and duties related to intelligence affecting the national security as the National Security Council may from time to time direct.” 

(432) Mitchell Rogovin, Counsel to the DCI, argued that “before there was a 1947 Act there was a United States and a United States with a President with the authority to conduct foreign affairs and he conducted such affairs over the history of the nation which involved activity which we now know as covert activity. Now the 1947 Act did not give the President a power he did not have before. The 1947 Act merely came upon the scene as it was and it set up the National Security Council. The Council itself subsequently took its authority and devised a 40 Committee as an implementing system for getting information with respect to covert activity. So that the activity in 1972 grew from two separate legal authorities for the President to pursue.” 

(434) Section 32 of Public Law 93-559 (The Foreign Assistance Act Amendments of 1974) states in part: “No funds appropriated under the authority of this or any other Act may be expended by or on behalf of the Central Intelligence Agency for operations in foreign countries, other than activities intended solely for obtaining necessary intelligence, unless and until the President of the United States finds that each such operation is important to the national security of the United States and reports, in a timely fashion, a description and scope of such operation to the appropriate committees of the Congress, including the Committee on Foreign Relations of the United States Senate and the Committee on Foreign Affairs of the United States House of Representatives.” The remaining four committees are the Armed Services and Appropriations Committees of the House of Representatives and the Senate. 

(435) Subsequent to a subpoena issued by the Committee on Nov. 6, 1975, two staff members reviewed all records of the Forty Committee reflecting approvals for Covert Action from 1965 to 1975. All information and statistics used in the section entitled “Ten Year Survey” are drawn from the staff review of those documents. The staff presented their findings to the full Committee in Executive Session testimony on Dec. 9, 1975. During that session, Mr. Colby had an opportunity to express his views on the staff report and while he had reservations about the conclusions, he raised no substantial disagreement with the facts. 

(447) It appears clear that this expenditure was made despite the fact that money was “not the problem.”
Cable from Chief of Station t
o Headquarters in Washington, 3 March:
“Ambassador continues to cogitate on nature, amount and channel for financial assistance and telling Station very little. He is aware of Station view that money is not the problem, [deleted] has plenty and any amount we contribute to [deleted] will have insignificant effect on, electoral showing. If could reduce the pernicious effect of interparty squabbling and get party to pull, in unison this would be worth financial support. We do not exclude possibility Ambassador [deleted] will want to give some money strictly as a demonstration of ‘solidarity,’ and a case might be made for this, but not two million dollars worth.” (Emphasis supplied) 

MEMORANDUM FOR: Director of Central Intelli[gence]
VIA: Deputy Director of Plans
SUBJECT: Forty Committee Approval For Political Action Program, 18 February
This program will cost $1,050, 000 the first year and $2,465,000 the second…” 

MEMORANDUM FOR: Director of Central Intelligence
SUBJECT: Ambassador [deleted] Proposed [deleted] Election Program, 7 March
Of the $10,000,000, the $1,790,000 for the [deleted] is to come from the budget approved on March 10 by the 40 Committee… $8,300,000 in new funds will be required.” 

(448) MEMORANDUM FOR: The Forty Committee
SUBJECT: Political Action Program for [deleted] to Arrest the Growing Power of the Communists, 10 March
“1. History of CIA Supported Political Action in [deleted]. The United States government was concerned in 1948 that the Communists would emerge from the national elections sufficiently strong to enter the government as a major if not dominant force. As a counter, it was decided that CIA should give $1,000,000 to the center parties for this election with the bulk going to [deleted].
“Between 1948 and 1964 funds provided to [deleted] totaled approximately $5,450,000. Between 1948 and 1963 additional support to [deleted] in eight national and regional elections amounted to $11,800,000. Between 1958 and 1968, the [deleted] received about $26,000,000 to support its opposition to the Communist dominated labor confederation, [deleted] received some $11,350,000 during this period.”
“Between 1948 and 1968 other organizations received about $10,550,000 of CIA assistance. This support was given to the following political parties associated with center or center-left governments…
“In sum, excluding the initial $1,000,000 spent in the 1948 campaign, CIA gave [deleted] and its related organizations $54,600,000 as well as $10,550,000 to the other non-Communist parties and affiliates for a grand total of $65,150,000 over approximately twenty years, starting in 1948…” 

(449) The Ambassador had decided during the first months of the project that he would go directly to the President for his approval, and that he would exclude the CIA from whatever plans he would propose.

Cable from Chief of Station to Headquarters, 13 March
“Ambassador [deleted] case (which he hopes present to President [deleted] and [National Security Advisor]), and not to State Department or 40 Committee… Imperative keep these observations as privileged within CIA owing Ambassador [deleted] explicit admonitions to Chief of Station to effect he does not repeat not wish inform anyone in Washington his views until he personally sees President [deleted].” 

Cable from Chief of Station to Headquarters, 14 October
“Concur that Ambassador [deleted] will raise the need for political action in [deleted] in the future… A key to his thinking is his strong conviction that any political action program in [deleted] which requires ‘interagency approval’ is not likely to get off the ground.” 

Cable from Headquarters to Chief of Station, 15 October
Keep in mind that Ambassador [deleted] previous proposal re support of [projects in other countries]… floundered in large measure because it was not submitted through proper channels and thus was not injected into interagency mechanism until too late.” Nonetheless, the Ambassador stated to the Committee that he had not really attempted to bypass the Forty Committee. 

Comm. Hearings
“CHAIRMAN PIKE. But was not an effort made to have your plan approved by the President without going through the Forty Committee route?
AMBASSADOR [deleted]. No sir, it would never have occurred to me that this was even possible.” 

(450) The initial Forty Committee approval paper which was drafted by the CIA stated,
“4. Coordination.
“At the request of [National Security Advisor], this program has not yet been coordinated with Ambassador or with the Bureau of [deleted] of the Department of State.”
The CIA, while waiting for the President to respond to the Ambassador’s proposal, did not believe that the CIA could wait indefinitely for that answer. 

Cable from Headquarters to CIA Chief of Station, 7 January
“At this juncture. Ambassador [deleted] should not repeat not be apprised of this draft paper’s preparation. CIA is preparing this draft paper… for internal purposes and it will not repeat not be discussed with State at this time.” 

(451) The CIA alluded to other approaches to the President by private individuals. 

Cable from Chief of Station to Headquarters, 10 February
“2. An important factor in Ambassador [deleted] desire to present an action program is his problem of how to cope with the many American and [deleted] channels to President [deleted] office which now exist. Ambassador [deleted] has become aware of this special character of [deleted] U.S. relations and is trying to get a handle on this problem rather than having to react to the advice and influence offered by others.” 

Cable from Chief of Station to Headquarters, 11 February
“B. Ambassador [deleted] insists that unless he proceeds quickly ‘certain people’ will push the White House into a ‘disastrous program.’ The name of [an international businessman who contacted the White House] finally emerged. If you think the [right-wing foreign intelligence officer’s] program is bad, you should see the kind of stuff [international businessman] is trying to sell.’ In the Ambassador’s view ‘[international businessman] is further to the right than [right-wing politician].’”
State Department officials in talks with the Agency also expressed reservations in dealing with these channels to the White House. 

“2. [State Department official] said that one of the problems that he had in dealing with [deleted] affairs is that people like [international businessman] had excellent access to higher echelons of our government, and there was no way of knowing their information input. He said that [international businessman] had very good relations with [deleted] of the White House. (The international businessman conducted foreign fund-raising activities for a U.S. political party.)” 

(452) Testimony given to the Committee by the CIA Deputy Director for Operations states that “…The Forty Committee approval stated that Ambassador [deleted] would ‘control the mix and implementation…’ of the program and would be expected to ‘forward recommendations’ for additional overt activities which might be undertaken in support of U.S. objectives in [deleted].” Comm. Hearings…
The Agency was uncomfortable with this unaccustomed turn of events. In cables from the Station, it was reiterated that the Ambassador was to be the one calling the shots. 

Cable from Chief of Station to Headquarters, June
“1. Morning 4 June I delivered to Ambassador, a sterile copy of your message. After reading it he commented that ‘They still do not understand that the program as approved by 40 Committee and the President is only an illustrative one leaving to Ambassador [deleted] the authority to decide what should be done.’
“4. Headquarters is in error if it really believes friction with Ambassador [deleted] can be avoided if Ambassador understands CIA views better. He understands them only too well. It is this ‘understanding’ that causes the friction and it will continue…”
The Agency and the Ambassador had frequent disagreements over the “mix and implementation” of the project and its developments.
Comm. Hearings at
“AMBASSADOR. One of the people who was here this morning, the Acting Chief of Station, couldn’t get away from the fact that the Agency had traditionally run all this and [thought that] the Agency knew better what needed to be done and [couldn’t accept] what the 40 Committee had said and the President had approved, that the authority and the mix and implementation would be mine. He felt that if he disagreed with something, that therefore they could veto it and send it back, you see, for whatever. Yes. I did object to this.”
The Ambassador felt so strongly about his differences of opinion with the Acting Chief of Station that he mentioned their disagreements nine times during his testimony before the Committee.
The Ambassador reacted vigorously even when his authority was questioned by [the National Security adviser] and reviewed by the Forty Committee. When [the National Security adviser] decided that the CIA should submit a separate progress report of the project to the Forty Committee, the Ambassador was aroused. 

Cable from Chief of Station to Headquarters, 28 February
“1. You should be aware that Ambassador [deleted] reaction to (memo) was negative in the extreme. He considers it offensive to him personally that the CIA would submit annual report. Says it is not true that [National Security adviser] ‘ruled’ that CIA submit report. It was CIA that suggested that idea to him…”
At the annual 40 Committee review of the project, reservations were expressed by the embers on portions of the operation, particularly the funding of a moribund [political action group]. The Ambassador was annoyed at this interference from Washington and he apparently resorted to subterfuge. 

Cable from Chief of Station to Headquarters, 16 March
“1. Ambassador intensely annoyed by outcome of 40 Committee meeting.
“2. You will note that Ambassador’s message states he has committed additional [amount of money] to [affiliated political action group] effort. This is not repeat repeat not true. He was urged not to make this statement because it: (A) not accurate and (B) still not determined that [affiliated political action group] could effectively use or absorb this additional amount. Ambassador said he insisted on reporting that funds ‘committed for tactical reasons’…”

(456) The Ambassador and the CIA had sharp disagreements about the funding of this [right-wing, senior intelligence officer] and his propaganda program. Initially, the Chief of Station expressed his reservations about the project to the Ambassador. 

Cable from Chief of Station to Headquarters, 10 February
“…3. In response to Chief of Station’s question, ‘Do you really care if [foreign intelligence officer] propaganda efforts are successful or not,’ Ambassador [deleted] replied. ‘Yes, I do, but not a helluva lot. Important thing is to demonstrate solidarity for the long pull.’ ”
When the Chief of Station continued to resist further on the funding, the Ambassador became very annoyed.

Cable from Chief of Station to Headquarters, 11 February
“3. Ambassador [deleted] said Headquarters absolutely wrong. Said he had discussed in Washington (did not say with whom) and all agreed this was legitimate… Chief of Station expressed the view that Ambassador [deleted] should first clarify this point in personal exchange with CIA… He [Ambassador] thereupon accused Chief of Station of dragging his feet in contacting [foreign intelligence officer], and said if this continued beyond today he would ‘Instruct Marine guards not to let you in this building and put you on the airplane.’ “Chief of Station said he thought this a bit extreme and expressed view that Ambassador [deleted] could hardly object to what appeared legitimate Headquarters question. He did object and with vigor.”
The CIA headquarters shared the same concerns as the Station Chief and warned the Ambassador in conciliatory terms against funding, especially on a no-strings-attached.…

(457) …Control over funding was so loose that there was no way of checking to see if funds were being expended for the purposes for which they said the were to be used. The Ambassador said before the Committee, “…I think as it turned out that we did get our full money’s worth.
“Now on the question of the possibility of a rip-off, that is quite true. The possibility exists…” 

(459) [The beginning of this footnote was not available — editor’s note]… we do not wish to become involved, even indirectly, in operations which would have the effect of prolonging the insurgency, thereby encouraging separatist aspirations and possibly providing to the Soviet Union an opportunity to create difficulties for [two other U.S. allies].” A CIA cable from the COS in the area to the DCI contains the U.S. Ambassador’s views on the proposal: “My reaction is against giving financial support to this operation unless there are important policy considerations to the contrary of which I am not aware… Furthermore, the road is open-ended and if we begin and then decide to withdraw there might be unfortunate misinterpretations of our reasons which could adversely affect our relations with [our ally].” A second proposal was turned down in August of 1971 and again in March of 1972. On the latter occasion. Dr. Kissinger conferred with a high State Department official in-depth on the proposal and agreed that it should be disapproved.…

(461) The Secretary of the 40 Committee hand-carried a brief one paragraph synopsis of the project to the members for them to initial. The conclusion that the procedure was simply pro-forma is indicated by the fact that John Connally had already informed our ally that the U.S. would provide support to the insurgents. In addition, even the pros and cons contained in the CIA proposal paper prepared for Dr. Kissinger were foregone conclusions. Responding to a question by staff concerning why CIA’s negative views of the project were not put more forcefully, a CIA official responded that “the Committee must realize that CIA was told to prepare a paper on ‘how’ the project could be done, not ‘whether’ the project should be done.”…

(462) On numerous occasions the leader of the ethnic group expressed his distrust of our allies’ intentions. He did, however, trust the United States as indicated by his frequent statements that “he trusted no other major power” and asserted that if his cause were successful he was “ready to become the 51st state.” (See COS cable to DCI of January 16, 1975, for one example.) In addition, his admiration for Dr. Kissinger was expressed on two occasions when he sent a gift of three rugs and later on the occasion of Dr. Kissinger’s marriage, a gold and pearl necklace. A May 20, 1974 Memorandum to Brent Scowcroft explains the necessity of keeping the gifts secret: “As you are aware, the relationship between the United States Government and the (ethnic group) remains extremely sensitive. Knowledge of its existence has been severely restricted; therefore, the fact that Dr. Kissinger has received this gift should be similarly restricted.

(463) The cut-off of aid to the ethnic group came as a severe shock to its leadership. A CIA cable from the COS to the DCI on March 15, 1975, describes the method used by our ally to inform the ethnic group’s leadership. On March 5, a representative of our ally’s intelligence service visited the headquarters of the ethnic group and “told [them] in bluntest imaginable terms that a) the border was being closed to all repeat all movement, b) …could expect no more assistance from [our ally] , c) …should settle with our [ally’s enemy] on whatever terms he could get, and d) his military units would be allowed to take refuge in [our ally’s country] only in small groups “and only if they surrendered their arms to [our ally’s] army.” 

(464) Elaborate measures were taken to insure that the Department of State did not gain knowledge of the project. Documents suggest that it may have originally been planned to keep the project so severely restricted that not even the Ambassador to the country involved was to be told.…

In addition, evidence in the Committee files is conflicting on whether Secretary of State William P. Rogers was ever informed of the project. Officials of Kissinger’s staff and CIA officials assumed that he had been briefed since U. Alexis Johnson was a mem­ber of the Forty Committee. And, in an interview with staff, Mr. Rogers stated that he felt certain that he had been informed. Nevertheless a cable from Secretary Rogers almost a year after the project began suggests that he did not have knowledge, as of June 22, 1973. The cable ,tales that “in view of continued U.S. policy not repeat not give encouragement to the [ethnic group’s] hopes for U.S. assistance or recogni­tion, we would intend keep contact at country di­rectorate level.” Interview with William P. Rogers, by Aaron Donner, Oct 20, 1975, copy on file with Sel. Comm. on lntell. 

(465) The progressively deteriorating position of the ethnic group reflected the fact that none of the nations who were aiding them seriously desired that they re­alize their objective of an autonomous state. A CIA memo of March 22, 1974, states our ally’s and the United States’ position clearly: “We would think that [our ally] would not look with favor on the establish­ment of a formalized autonomous government. (Our ally) like ourselves, has seen benefit in a stalemate situation… in which [our ally’s enemy] is intrinsi­cally weakened by [the ethnic group’s] refusal to relinquish its semi-autonomy. Neither [our ally] nor ourselves wish to see the mailer resolved one way or the other.” 

(466) The CIA had early information which suggested that our ally would abandon the ethnic group the minute he came to an agreement with his enemy over border disputes. Two months after initialing the proj­ect a CIA memo or Oct. 17, 1972 slates: “[Our ally] has apparently used [another government’s] Foreign Minister to pass word to [his enemy] that he would be willing to allow peace to prevail [in the area] if [his enemy] would publicly agree to abrogate [a pre­vious treaty concerning their respective borders].” In addition, CIA memos and cables characterize our ally’s views of the ethnic group as “a card to play” in this dispute with his neighbor. And a CIA memo of March 22, 1974, characterizes the ethnic group as a uniquely useful tool for weakening [our ally’s enemy’s] potential for international adventurism.”

(467) A White House memorandum of October 16, 1973, from Dr. Kissinger to the DCI states: “The President concurs in your judgment in paragraph 3 of your memorandum of October 15 on the above subject. You should therefore send the following reply immediately to [the ethnic group] — We do not repeat not consider it advisable for you to undertake the offensive military action that [another government] has suggested to you. — For your information, we have consulted with [our ally] through the Ambassador and they have both made the same recommendation.” 

(469) The attack launched the day after the agreement was signed caught the ethnic group by surprise. A message from their headquarters to CIA on 10 March, 1975, read as follows: “There is confusion and dismay among our people and forces. Our people’s fate in unprecedented danger. Complete destruction hanging over our head. No explanation for all this. We appeal you and USG intervene according to your promises and not letting down ally, to save [ethnic leader’s] life and dignity of our families, to find honorable solution to [our] problem.” On that same day the Chief of Station sent the following cable to the DCI: “Is headquarters in touch with Kissinger’s office on this; if USG does not handle this situation deftly in a way which will avoid giving the [ethnic group] the impression that we are abandoning them they are likely to go public. [Our ally’s] action has not only shattered their political hopes; it endangers lives of thousands.” The COS proceeded to make suggestions for what the USG could do to help and ended with the remark “it would be the decent thing for USG to do.” 

(470) Also on March 10, 1975 the following letter ar­rived from the leader of the ethnic group to Secretary or State, Henry Kissinger: “Your Excellency, Having always believed in the peaceful solution of disputes including those between [your ally and his enemy] we are pleased to see that their two countries have come to some agreement… However, our hearts bleed to see that an immediate by product of their agreement is the destruction of our defenseless people in an unprecedented manner as [your ally] closed its border and stopped help to us completely and while [this enemy] began the biggest offensive they have ever launched and which is now being continued. Our movement and people are being destroyed in an un­believable way with silence from everyone. We feel your Excellency that the United States has a moral and political responsibility towards our people who have committed themselves to your country’s policy. In consideration of this situation we beg your Excellency to take action as immediately as possible on the following issues: 1) Stopping the… offensive and opening the way for talks between us … to arrive at a solution for our people which will at least be face saving. 2) Using whatever influence you have with [your ally] to help our people in this historically tragic and sad moment and at least in such a way that our people and (army) could maintain some liveli­hood and perform at least partisan activity in [our area] until our problem is also solved within the framework of an [overall] agreement. Mr. Secretary, we are anxiously awaiting your quick response and action and we are certain that the United States will not remain indifferent during these critical and trying times…” 

A CIA cable from the COS to the Director on 22 March 1975 states: “No reply has been received from Secretary of State Henry Kissinger to the message from [the ethnic leader]… The two additional messages received by radio from [his] headquarters are forwarded this morning… and underscore the seriousness of [their] situation, the acute anxiety of their leaders and their emotional appeal that the USG use its influence with [our ally] to get an extension of the cease fire. This would permit the peaceful passage of… refugees to asylum… Hence, if the USG intends to take steps to avert a massacre it must intercede with [our ally] promptly.” Interview with CIA official, by J. Boos, Oct. 18, 1975, copy on file with Sel. Comm. on Intell. 

(471) Over 200,000 refugees managed to escape into our ally’s country. Once there, however, neither the United States nor our ally extended adequate humanitarian assistance. In fact, our ally was later to forcibly return over 40,000 of the refugees and the United States government refused to admit even one refugee into the United States by way of political asylum even though they qualified for such admittance.…

(474) The political action program included the distribution of 50,000 campaign-type buttons identifying the wearer as a supporter of Roberto’s FNLA. 

(475) The United States has found itself in similar situations on other occasions. Having supported colonial power policies in previous years, they are constrained from developing a rapport with indigenous independence movements. The Soviets, however, are not similarly inhibited. Once the colonial power relinquishes control, the well-organized, well-financed, Soviet backed group is ready to step into the breach. The United States is forced at that point to scurry around looking for a rival faction or leader to support. The U.S. has often chosen leaders who had a prior relationship with the colonial power and whose nationalist credentials are thus somewhat suspect, or leaders who have spent most of their time outside the country waiting for the colonial power to depart. The point is that many of the U.S.-backed groups begin with ‘a variety’ of actors working to their disadvantage. 

(477) The task force was composed of African experts within the Department of State, DoD officials, CIA officials, and others. Officials from the Department of State have told this Committee that the majority of that task force recommended diplomatic efforts to encourage a political settlement rather than intervention. After they had prepared their report for the Secretary of State containing this recommendation, they were informed by National Security Council aides that it was improper for them to make a recommendation on policy. Instead, they were instructed to simply list diplomatic efforts as one option among many in their final report. Thus, the African experts who made up the task force were not allowed to place their recommendations on paper to be reviewed by the Forty Committee. 

(481) The Committee attempted to determine the difference between the three contesting factions in Angola. Mr. Colby responded to questions of that nature: “They are all independents. They are all for black Africa. They are all for some fuzzy kind of social system, you know, without really much articulation, but some sort of let’s not be exploited by the capitalist nations.” The Committee also attempted to discern why certain nations were supporting different groups if they were all similar in outlook:
“MR. ASPIN. And why are the Chinese backing the moderate group?
“MR. COLBY. Because the Soviets are backing the MPLA is the simplest answer.
“MR. ASPIN. It sounds like that is why we are doing it.
“MR. COLBY. It is.”

  1. Intelligence Collection 

Human and diplomatic risks are not confined to covert action. Certain methods of intelligence-gathering invite the same danger of war and infringement of the Constitutional rights of Americans. 

The Committee has examined both technical and non-technical intelligence-gathering programs and has concluded that the risks accompanying them are often unacceptably great; that information obtained often does not justify the risk; the policy-makers have been insensitive to dangers, especially of the violation of U.S. citizens’ rights; and, that there are inadequate policy-level mechanisms for the regular review of risk assessment. 

a. Submarines 

A highly technical U.S. Navy submarine reconnaissance program, often operating within unfriendly waters, has experienced at least 9 collisions with hostile vessels in the last ten years, over 110 possible detections, and at least three press exposures. Most of the submarines carry nuclear weapons. 

The program clearly produces useful information on our adversaries’ training exercises, weapons testing, and general naval capabilities. It is also clear, however, that the program is inherently risky. Committee staff’s review of the program suggests if both Congress and the Department of the Navy were sufficiently motivated to provide the funds, technical capabilities could be developed which would make possible the acquisition of the same data through less hazardous means. 

The Navy’s own justification of the program as a “low risk” venture is inaccurate, and has, therefore, not met or resolved the Committee’s misgivings. (487) Documents provided the Committee by the Defense Department indicate that, while risk assessments are made prior to operations, they are ritualistic and pro forma. In fact, their mission risk assessments do not vary despite constant changes in political conditions, information sought, distance from enemy shores and hostile forces, and our adversaries’ ability to detect the presence of U.S. submarines. During the hundreds of missions these submarines have conducted, the Navy has never assessed military risk as anything but “low.” The Committee is, therefore, troubled by the completely pro forma nature of the mission risk assessment as it is presently accomplished. 

Just as the Navy’s assurances that the program is secure are inconsistent with the collisions, apparent detections, and press stories, their claims that the sensitive missions are closely monitored are belied by the scant tactical guidance given commanders and regular communications gaps. Once a U.S. submarine enters the 12-mile limit of another nation, communications security and the lack of certain technical capabilities make it impossible to independently verify the location of a submarine at any given moment. Many of these difficulties result from factors which are inherent in the nature of this covert operation. 

Naval inquiries into collisions and other “untoward incidents,” if held at all, are almost always conducted at a low level, effectively keeping policy-makers in the dark on changing operational conditions. Thus, it took a field-initiated, low-level investigation, conducted after three collisions in 1970, to determine that pre-mission training and operational guidelines for U.S. submarines on this type of sensitive mission needed revision and upgrading. If the Washington-based review had been adequate, it would not have taken this field investigation to determine that U.S. submarines were following other submarines too closely. In addition, staff found no evidence which would indicate that commanders of submarines colliding with hostile vessels have ever received disciplinary action of any kind. At times, commanders have escaped censure despite recommendations to that effect by a review panel. 

Despite these faults, the Committee noted the procedures implemented by the Navy to insure the safety of the mission and the crew in situations which are inherently risky. Washington-based control, review, and coordination of this program has been an evolutionary matter over the years. At present it appears to be extremely well managed, with the exception of the risk assessment area and the failure to forward the results of low-level investigations for Washington-based review. 

In reviewing past investigations and formal reviews, the Committee noted the Navy’s implementation of previous suggestions for change. There is, however, one unfortunate exception. A previous review of this program suggested that the Department of the Navy make a firm commitment to the necessity of maintaining an intelligence capability with U.S. submarines by allocating funds to research and development efforts designed to increase both the capabilities and the security of their missions. The Navy has paid only lip service to this commitment. 

Given these factors, the Committee urges a thorough review of the program’s product and hazards, to avert another Pueblo, or worse, and to insure that important intelligence collection continues with significantly less risk than presently exists. 

b. Interception of International Communications 

The National Security Agency (NSA) systematically intercepts international communications, both voice and cable. NSA officials and the Director of Central Intelligence concede that messages to and from American citizens and businesses have been picked up in the course of gathering foreign communications intelligence. They maintain, however, that these messages are small in number and usually discarded in any case. (493)

Earlier NSA programs of questionable legality focused on international narcotics traffic and radicalism, and even targeted Americans. The Committee’s preliminary investigation reveals at least one new area of non-political and non-military emphasis in international intercept — economic intelligence. Communications interception in this area has rapidly developed since 1972, partly in reaction to the Arab oil embargo and the failure to obtain good information on Russian grain production and negotiations for the purchase with American corporations. 

The Committee is not convinced that the current commercial intercept program has yielded sufficiently valuable data to justify its high cost and intrusion, however inadvertent, into the privacy of international communications of U.S. citizens and organizations. Inasmuch as the technical complexity of the program defies easy or quick evaluation, the Committee is hopeful that a permanent oversight mechanism will closely and comprehensively scrutinize the operation to determine whether the risks are necessary and acceptable. 

c. Manipulation of the Media 

The free flow of information, vital to a responsible and credible press, has been threatened as a result of CIA’s use of the world media for cover and for clandestine information-gathering. 

There are disturbing indications that the accuracy of many news stories has been undermined as well. Information supplied to the Committee suggests that some planted, falsified articles have reached readers in the U.S. (495)

Intelligence agencies have long prized journalists as informants and identity-covers. Newsmen generally enjoy great mobility, and are often admitted to areas denied to ordinary businessmen or to suspected intelligence types. Not expected to work in one fixed location, both bona fide journalists and masquerading intelligence officers can move about without arousing suspicions. They also have extraordinary access to important foreign leaders and diplomats. 

CIA, as no doubt every ether major intelligence agency in the world, has manipulated the media. Full-time foreign correspondents for major U.S. publications have worked concurrently for CIA, passing along information received in the normal course of their regular jobs and even, on occasion, traveling to otherwise non-newsworthy areas to acquire data. Far more prevalent is the Agency’s practice of retaining freelancers and “stringers” as informants. 

A stringer working in a less-newsworthy country could supply stories to a newspaper, radio, and a weekly magazine, none of whom can justify a full-time correspondent. This may make the use of stringers even more insidious than exploitation of full-time journalists. 

The Committee has learned that the employment of newsmen by CIA is usually without the knowledge or agreement of the employers back in the U.S. Publishers have been unable, despite strenuous effort, to learn from the Agency which, if any, of their employees have had a clandestine intelligence function. (498) Newsmen-informants apparently do not often disclose this relationship to their editors. The Committee has learned of cases in which informants moved from one bona fide press position to another, without ever making employers aware of their past or present CIA status. 

CIA acknowledges that “stringers” and others with whom the Agency has a relationship are often directed to insert Agency-composed “news” articles into foreign publications and wire services. U.S. intelligence officials do not rule out the possibility that these planted stories may find their way into American newspapers from time to time, but insist that CIA does not intentionally propagandize in this country. CIA insensitivity to the possibility of its adulterating news digested by Americans is indicated by its frequent manipulation of Reuters wire service dispatches — which regularly appear in U.S. media. Because Reuters is British, it is considered fair game. (499

A number of CIA officers employed by U.S. and foreign publications write nothing at all. Their journalistic affiliation is a “cover” — a sham arrangement making possible full-time clandestine work for the Agency. With these arrangements, the employer’s cooperation has been obtained. (500)

After the Washington Star-News discovered a CIA-media relationship in 1975, Director Colby ordered a review of these practices. Subsequently, the Agency terminated the informant relationships of five full-time employees of American periodicals. Stringers and freelancers are still on the payroll, despite their periodic reporting for a U.S. media usually unaware of the writer’s CIA connection. (501)

The use of American press enterprises as a cover has been tightened somewhat. No longer, for example, can a CIA officer in the field arrange for cover without headquarters approval. 

Director Colby, citing the Agency’s continuing need for reliable information, and the increasing reluctance of private firms and the government to provide cover, has maintained that the recent reforms have reduced risks to an acceptable level. 

d: CIA Presence in the Executive Branch 

CIA personnel may be found in a host of U.S. departments and agencies, in the National Security Council, and in the White House itself. 

Typically, their Agency affiliations are unknown to colleagues and to all others, except one or two leadership figures. (503) They sit on interagency panels whose members are unwitting. (504) In some cases these panels already include another, official, CIA representative, giving CIA undue representation. (505) Some of them work in positions involving evaluation of CIA’s work product and proposals. (506)

These individuals are “detailees” — CIA employees on loan to the Executive, usually at the latter’s request. They include all types, from gardeners and typists, to intelligence analysts and practitioners of covert action. (507

Detailees are requested for a variety of reasons — because the White House wants to circumvent Congressional budget ceilings, because there are no other available secretaries with security clearances, because CIA professional expertise is highly regarded, or because the position had always been staffed by an Agency officer. (508)

The Committee has found no indications that CIA detailees are instructed to make clandestine reports to headquarters on the inner workings of the host-employer. Nor is there credible evidence that they are asked by CIA to perform in any manner which is inconsistent with the best interests of the host. Nonetheless, the Committee believes that detailing as presently practiced reflects an unwise policy. 

At best, intelligence personnel such as electrical help are diverted from CIA duties thus frustrating the budget allocating intent of Congress. A far worse specter is that of CIA officers assigned to such posts as the National Security Council where they are susceptible, despite all good intentions, to substantial conflicts of interest on the most sensitive issues. The latter problem is compounded by the fact that the detailee’s background often is unknown to NSC colleagues who are also charged with CIA-related responsibilities. (509)

The Committee discovered detailees, whose Agency ties were closely held secrets, making recommendations on CIA covert action proposals to unwitting senior NSC officials. Such individuals also help conduct the NSC’s evaluation of the intelligence product, and in that capacity regularly compare CIA’s performance with that of rival agencies.

These individuals have impressed staff as highly motivated professionals, acutely aware of the problems resulting from divided loyalties. Their integrity is not at issue. But neither the White House nor the CIA is well served by an unnecessary policy which invites cynicism and compromises the quality of Executive Branch oversight of the intelligence community.

e. CIA Relationship with U.S. and Foreign Police 

In creating the CIA, Congress clearly intended to deny it any domestic police functions. Their fear that a super-secret, bureaucratically powerful spy agency might evolve into a domestic secret police, has not been realized, respite shortcomings in control and oversight. 

Evidence in Committee files, however, indicates that during the late 1960s and early 1970s, CIA allowed itself to become involved in domestic police activity. In addition, the Agency undertook other police assistance activities which jeopardized the integrity of an otherwise legitimate and useful U.S. foreign aid program. 

Association and Collaboration with U.S. Police 

Notwithstanding its charter’s clear prohibition against internal security functions, CIA has maintained relationships — many entirely appropriate — with various Federal, state and local law enforcement agencies. Questionable activities prior to the Holtman Amendment to the Omnibus Crime Control and Safe Streets Acts of 1968, included the training by CIA of domestic police and loans of Agency equipment for domestic use. In return, local police departments cooperate with CIA on matters of concern to the Agency’s Office of Security. Both activities appear to have been improper. The first violated the charter’s ban on domestic police functions, and the latter tended to circumvent jurisdiction of the FBI and the Department of Justice.

Of those activities, CIA’s role as a source of ordinary as well as exotic equipment is perhaps the most troubling and publicized. The Agency has loaned such traditional gear as body protectors, billy clubs, mace, and similar civil disturbance paraphernalia. Most of the equipment was provided during the height of the Vietnam War movement and may have been used by local police during the May 1971 demonstrations in Washington. 

More exotic loans consisted of decoders, clandestine transmitters, analyzers, and other wiretapping devices. 

A staff examination of these practices reveals that CIA officials usually provided equipment on a no-questions-asked basis, did not require the production of court orders for eavesdropping gear, and exercised virtually no control over the loaned items. 

The record suggests that on one occasion, CIA-loaned equipment was used in an illegal wiretap. In June, 1971, Mr. Kenyon F. Ballew was severely wounded during a raid on his apartment by agents of the Division of Alcohol, Tobacco and Firearms, supported by police from Montgomery and Prince Georges Counties in Maryland. 

The raid was conducted pursuant to a Federal search warrant for possession of suspected firearms and hand grenades. Plainclothes agents and police officers broke down the door to the apartment when Mr. Ballew failed to answer their knock. Mr. Ballew, a gun collector, picked up a pistol, was shot, and is now permanently disabled. He is partially paralyzed, walks only with the aid of a brace and cane, speaks with difficulty, and still has the police bullet lodged in his brain. 

Mr. Ballew was never prosecuted for any gun control violations. The case received a large amount of publicity and was the subject of a number of investigations of alleged police misconduct. Mr. Ballew brought suit pursuant to the Federal Torts Claim Act and received an adverse judgment from the courts in February, 1975. 

A CIA Office of Security employee assigned to liaison with the Montgomery County Police Department told staff that, in a conversation with a police inspector on the Ballew case, the possible use of CIA-loaned bugging equipment was revealed. He was advised that police intercepted a telephone conversation in which plans were outlined to “kill a cop.” However, neither the affidavit in support of the search warrant, the subsequent investigations, nor the transcript of the civil suit reflected the existence of any wiretap. Mr. Ballew’s case is now on appeal, and if there had been an illegal wiretap, he may be entitled to a new trial. 

While the Department of Justice’s CIA Task Force has been made aware of this possible wiretap for months, it has apparently refused, both to act upon it, (517) and to notify the attorneys in the case. 

CIA Involvement with Foreign Police 

From the early 1950s until late 1973, CIA operated a proprietary, International Police Services (IPS), in the Washington, D.C., area. It had the dual purpose of improving allies’ internal security, and evaluating foreign cadets for pro-U.S. orientation, which might later enable CIA to recruit them as intelligence assets. 

In the early 1960s the Agency for International Development’s Office of Public Safety (AID-OPS) became actively involved in foreign police training. OPS’ 14 week course was augmented by an additional four weeks of training at IPS, pursuant to a contractual arrangement with AID. Students were not made aware that they were being trained at a CIA facility, and only a handful of AID officials, including the Director of OPS, knew of IPS’ CIA status. 

Instructors were asked to record names of students who demonstrated a pro-American attitude. It does not appear, however, that the CIA attempted to recruit students while in the United States, although CIA documents indicate that with the cooperation of OPS, lists of OPS and IPS students were made available, along with biographical information, to CIA components for operational use. 

As many as 5,000 foreign police officers from over 100 countries, many of whom have become high officials, unwittingly received training from the CIA. The position of these foreign police officers may have been damaged when, in 1973, IPS was revealed as a CIA front. 

In addition to damaging the credibility of these foreign police officers, CIA’s apparently unnecessary involvement with a legitimate foreign aid program could have seriously undermined that program from a propaganda standpoint. (523) Despite these realities, AID-OPS continued its relationship with IPS until late 1973. Department of State and AID officials should review these practices and develop alternative methods of administering foreign aid programs without CIA involvement and support. 

(487) Each monthly mission schedule forwarded to the Joint Chiefs of Staff and the Forty Committee for approval has an alpha-numeric designator attached for mission risk assessment. By far the most frequently assigned is “4 A 4”; the first digit, “4”, stands for “low military risk”; the second alpha character, “A”, stands for “high intelligence value” and the third digit, “4”, stands for “low political risk.” No mission has ever been assessed a military risk factor other than “low.” This evaluation is belied not only by the nine collisions, 110 possible detections, constantly fluctuating factors which should impact on the calculations of military risk such as presence of enemy forces in the area, distance from enemy shores, political conditions, etc., but also by a variety of statements by Navy personnel who have conducted studies on this program…

(493) Comm. Hearings.…
“MR. ASPIN.… Does the National Security Agency monitor telephone calls between American Citizens and foreigners abroad?
“MR. COLBY. The Agency does monitor foreign communications
“MR. ASPIN. Does it involve a U.S. citizen at one end?
“MR. COLBY. On some occasions, that cannot be separated from the traffic that is being monitored. It is technologically impossible to separate them.
“MR. GIAIMO. Obviously, we know that in other countries you undoubtedly perform all kinds of intercepts.
“MR. COLBY. Incidentally we pick up material about Americans abroad; yes.
“MR. GIAIMO. That is the point I am trying to get at. Did you say that incidentally you are also intercepting American citizens?
“MR. COLBY. I did not want to say that we never, never covered any American citizens abroad. If I have made a mistake in what I said, that we were not — that we incidentally cover Americans in our foreign intelligence activities.
“MR. GIAIMO. You incidentally cover Americans where?
“MR. COLBY. I say we do incidentally cover Americans. I would like to get into a further description of this in executive session.”

“Chairman PIKE. Does your system intercept the telephone calls of American citizens?
“Gen. ALLEN. I believe that I can give a satisfactory answer to that question which will relieve the Committee’s concern on that matter in closed session.”

Although the Committee met for some four hours in Executive Session to take testimony from NS A Director Allen and Deputy Director Benson K. Buffham, primarily concerning the interception of international commercial communications, Gen. Allen apparently felt it necessary to clarify and elucidate that testimony in a follow-up letter to Chairman Pike on August 25, 1975: 

“Dear Mr. Chairman:
“I am writing to provide additional clarification to the testimony I gave before your Committee on 8 August.
“At the present time, the telephone calls of U.S. citizens in the United States to a foreign location are not being monitored. The monitoring of telephone conversations of United States citizens in the United States to a location in the United States has never been authorized by NSA. Currently, we are not now monitoring any telephone circuits terminating in the United States.
“For several years prior to mid-1973, a few international radio-telephone circuits were monitored between the United States and foreign countries. This monitoring did include the calls of U.S. citizens as well as foreign nationals, and calls were sometimes selected for monitoring based on the name (or phone number) of a U.S. citizen provided us by another government agency. In the summer of 1973, the use of the names of U.S. citizens to select telephone calls was terminated and remains so.
“From mid 1975 until recently a search of our records reveals there were occasions where radio-telephone circuits between a foreign terminal and a U.S. terminal were monitored. On some occasions the monitoring was for the purpose of developing patterns of foreign communications use and, on yet other occasions, the monitoring was based on the foreign subscriber and the substance of the conversation was obtained. Our records indicate that in all of 1974, reports were made involving the substance of only eight telephone conversations, wherein a U.S. citizen might be presumed to have been conversing, and in these instances, only the foreign intelligence aspects of the conversation were reported, and the names of U.S. citizens were never used in these NSA reports. This number may be compared with reports involving [a vast number of] other foreign communications carried on international circuits.
“The executive directives applying to these efforts state: a. The purpose of the signals intelligence activities of the National Security Agency is to obtain foreign intelligence from foreign communications or foreign electronic signals, b. Foreign communications exclude communications between or among American citizens or entities.
“I hope this letter will help clarify the matter.”
/s/ Lew Allen, Jr., Lieutenant General, USAF, Director, NSA/Chief, CSS. 

(495) William E. Colby, Director of Central Intelligence, told members of the Committee staff at an October 25, 1975, meeting, that the Agency plants propaganda in the foreign press, including English-language newspapers, and can not be inhibited by the possibility that these planted stories may be picked up by American news services, etc. 

(498) The Deputy Director of Operations at the CIA explained that the Agency wants as few people as possible to know the Agency’s sources. Therefore, the CIA considers “stringers” and freelancers to be free agents, working for many employers and so there is no necessity for the CIA to inform a “stringer’s” or free-lancer’s publisher of his other employer (CIA). Committee staff meeting on October 25, 1975.…

(499) An ex-CIA Chief of Station explained that “…our American media assets… are given neither Agency guidance nor information which might influence a piece written for an American audience. These people are used entirely for intelligence gathering purposes, and are left free to write what they would have written had there been no connection with the Agency… This method is quite different from our handling of foreign media assets, writing for foreign audiences, where Agency influence over the content of certain articles is selectively applied.” He further states, CIA will undertake no activity in which there is a risk of influencing domestic public opinion either directly or indirectly.” But he turns around in the next sentence to say: “The Agency does have a responsibility for undertaking certain propaganda activities in foreign countries.” Director Colby emphatically stated on October 25, 1975, to members of the Committee staff and Congressman Johnson that he “differentiates between AP and Reuters. I consider AP to be an American wire service and therefore off limits… but Reuters is a foreign wire service.” It was pointed out to Director Colby that Reuters, a British wire service, was frequently used by American media, but this fact did not change his mind. In an effort to assure that official Washington is not deceived by planted articles in the foreign press, CIA maintains high-level liaison with the Department of State and the U.S. Information Agency to identify spurious stories. 

(500) The CIA’s Cover and Commercial staff files show that in 1975 11 CIA employees used media cover with 15 news field companies — TV, radio, newspapers, and magazines. Five of these are of major general news impact, nine of no major general news influence, and one a proprietary. 

(501) When the CIA had fiduciary relations with five full-time correspondents of major American news organizations, three of their employers were unwitting, according to William E. Colby.…

(503) At the National Security Council, there are four CIA employees working as professional staff. Three of them are overt employees of the CIA, open employees. The fourth is an undercover employee, one who does not acknowledge the CIA as his true employer. Ironically, through committee staff interviews, the undercover employee was the only CIA detailee readily identified by his colleagues or subordinates. 

(504) [Name deleted] sits on the Interagency Classification Review Committee (ICRC) , representing the National Security Council staff, although he is actually detailed to the NSC staff from the CIA. The CIA also has a representative on the ICRC. [Name deleted] told the Committee staff that he does not tell other ICRC members of his true affiliation. The man who preceded [Name deleted] at the NSC was [Name deleted]. He also sat on the ICRC representing the NSC. And he was also a CIA detailee. Further, he was a key NSC staffer, but the only people at the NSC who knew that he was from the CIA were Dr. Kissinger and Alexander Haig. 

(505) This Interagency Classification Review Committee rules on questions of declassification from the Executive branch agencies. These questions come up as a result of Freedom of Information Act (FOI) requests. If a FOI request is initially denied, the requester may appeal to the head of the Agency; and if that appeal is denied, he may appeal to the ICRC. Many of these declassification cases involve the CIA. 

(506) The man who directed Operations CHAOS the CIA is now detailed to the NSC staff as Director or Intelligence Coordination of the NSC staff. His task is to evaluate the quality of intelligence sent to the NSC, including intelligence from his regular employer, the CIA. He maintains close contact with the CIA as part of his job. 

(507) There are, or have been, CIA detailees working the White House (including the Federal Executive Institute, Cabinet Committee on Price Stability, White House Joint Committee on Science, Office of Emergency Preparedness, Council on International Economic Policy and President’s Foreign Intelligence Advisory Board), the Department of Justice and the Bureau of Narcotics and Dangerous Drugs, the State Department and the Agency for International Development, the Treasury Department, the Defense Department and the Defense Intelligence Agency, the Federal Aviation Administration, the Federal Energy Administration, the Vice President’s Office, the National Security Council and the Commerce Department.
The CIA details cover: communications technicians, biographic analysts, general illustrators, secretaries, clerks, couriers, laborers, telephone operators, graphic analysts, personal assistants, physical scientist, intelligence officers, operations officers, economists, administrators assistants, program analysts, chauffeurs, sky marshals, and stenographers. 

(508) “The White House used CIA detailees to keep the total number of staff down, in contravention of Congressional appropriation staff ceilings. The NSC staff ‘”borrows” secretaries initially from the CIA, until their secretaries get clearances, but in many cases, the CIA secretaries stay at the NSC for years. Many exec­utive branches, such as the Department of the Trea­sury, use CIA professionals as advisors to Secretaries, etc. And finally, the NSC staffer responsible for covert action proposals and approvals is almost always from the CIA’s Directorate of Operations, which requests the covert actions. He has sole custody of all the Forty Committee’s records. 

(509) See previous note on a key staffer at the NSC who made recommendations on policy options. He, therefore, was called upon to make these recommen­dations on CIA policies to people who did not know of his current CIA affiliation. 

(517) The Agency’s position in this case is that the Agency was not involved beyond the loan of audio equipment, which may have been used against Mr. Ballew…

(523) For example, the AID-OPS program was damaged considerably by allegations linking foreign police training to the CIA. In 1970, Dan Mitrione, a law enforcement officer of impeccable credentials and reputation, employed by AID as a Public Safety Advisor in Uruguay, was kidnapped and murdered by Tupamaro guerrillas. The Tupamnros alleged that Mitrione was a CIA “agent” and that Public Safety Advisors including Mitrione taught torture tactics to police. CIA documents indicate that although Mitrionc may have had some contact with CIA officers stationed in Uruguay, he was not a CIA employee or informant… Allegations of AID-OPS sponsored torture train­ing, depicted in various press reports and the film ‘”Slate of Siege,” appear factually unsupportable. However, this type of allegation had a tremendous propaganda impact which contributed substantially to the termination of AID-OPS in 1975.

  1. Domestic Intelligence Investigations 

Domestic intelligence carries with it two distinct types of risks. There are programs that by their very nature and method offend individual liberties and statutory rights. Then there are legitimate intelligence methods that are improperly applied, turning the law-enforcers into law-breakers.

a. Programs as Abuses 

COINTELPRO was a series of covert counterintelligence programs aimed at identifying, penetrating, and neutralizing subversive elements in the United States. The program itself consisted of myriad clandestine dirty tricks carried put by FBI agents against persons and organizations considered subversive by the FBI. (525) Careers were ruined, friendships severed, reputations sullied, businesses bankrupted and, in some cases, lives endangered. (526

The FBI justified this aberration from traditional law enforcement programs by stating that it was dictated by the mood of the times. The FBI, as implementors of the program, thereby became the barometer of the country’s mood, instead of fulfilling their statutory function of enforcing Federal laws. (527) Evidence received by the Committee of FBI racism, (527a) bias, and strong conservative ideology hardly qualifies it to review people’s politics. Moreover, the Constitution prohibits such a role and protects the very things FBI was attempting to punish. 

COINTELPRO is only one example. Another would be programs grouped under “anticipatory” intelligence. 

FBI states: “Because the FBI’s investigative responsibilities follow the contours of those entrusted to the Attorney General, the Bureau’s domestic intelligence investigations are, of necessity, broader than investigations strictly designed to collect evidence for criminal proceedings. The FBI’s domestic intelligence responsibilities have a distinct anticipatory, or preventive, purpose, requiring continuing investigative activity in cases wherein criminal conduct remains a future possibility. Whereas the evidence required to initiate an investigation under such a standard would obviously be something less than probable cause of a crime, (529) it would nevertheless be more than mere suspicion. The FBI itself states that advocacy of an ideology alone is not sufficient grounds for classifying a group as subversive. 

Anticipatory domestic intelligence projects, however, do create serious problems on occasion. A few examples illustrate the point. 

Lori Paton testified before the Committee on November 18, 1975. In 1974, Miss Paton, then a high school student, inadvertently wrote the Socialist Workers Party as an academic assignment. She intended to write to the Socialist Labor Party. 

The FBI was conducting a “mail cover” (532) on the SWP and intercepted Miss Paton ’s misdirected letter. They immediately began an investigation of her, and the attendant publicity in Miss Paton’s small town caused her great mental anguish. 

The Bureau’s response was that the “FBI did not publicize the fact” of Lori Paton’s investigation, although they had interviewed her school principal and the local police chief. 

Assume, however, that Miss Paton had correctly written to the SWP, as many people undoubtedly have. That fact alone would apparently have been grounds for an anticipatory investigation, even though it is hard to imagine what crimes could be anticipated by writing a letter. In addition, the chilling effect such investigations have on First Amendment rights, including freedom of association, is painfully clear. (534)

For those who do join SWP, the chill is likely to spread to employers. The Committee heard from one witness who termed FBI’s inquiries about his employee, Bruce Bloy, who was an SWP member, as “presumptive, mysterious, and… aggressive.” 

Trash covers are another odious form of anticipatory investigations. The IPS trash cover has already been discussed, save for a comment on command and control. When FBI personnel were originally asked about trash covers by Committee staff, they stated: “we have not engaged in [trash covers] since July 1966… We had no trash covers on the IPS.” Two weeks later, at a Committee hearing, they corrected themselves. They stated that, while there was an FBI policy of not conducting trash covers, that policy was not always followed. 

Two memoranda show that the Bureau knew of the trash covers and recognized the risks in such a method. The concerns? The “potential harm to the FBI and the Federal Government, per se, far outweigh the potential information that could be expected.” (539) It was not risks to an individual’s right of privacy that concerned the FBI. 

b. Law Enforcement Turned Law-Breaking 

The use of informants, albeit an effective law enforcement tool, is a method of investigation which is particularly subject to abuses of Constitutional rights and rights of privacy. 

The Committee heard testimony from a former FBI informant named Robert Hardy. Mr. Hardy chronicled for the Committee his role in a 1971 Camden Draft Board break-in. Pursuant to FBI instructions, he infiltrated a peaceful anti-war group in Camden, New Jersey. (540) He instigated the burglary and supplied the would-be burglars with tools, money, technical assistance and encouragement. (541)

In sum, Mr. Hardy acted as an “agent-provocateur.” At one point, he attempted to halt the actual burglary, because a conspiracy had been established. His FBI handling-agents insisted that the burglary be committed. (542)

The disturbing lesson is that in the FBI system there is virtually no mechanism to control agents in charge of informants. The FBI Manual of Instructions on Informants sets forth specific guidelines for the handling of informants, yet the uniqueness and secrecy surrounding each informant’s relationship with the handling-agent impairs the effectiveness of those instructions. 

In the Hardy case, the informant-agent relationship was further complicated by political considerations. The defendants in a celebrated case in nearby Harrisburg, Pennsylvania, had recently been acquitted of all conspiracy counts. The FBI apparently felt that an overt act such as an actual break-in would be required to insure a conviction, even though the alleged crime of conspiracy, which was the basis of later prosecution, appears to have been completed far in advance of the actual break-in. 

It should be noted that Department of Justice attorneys were advised of this situation long before the break-in and did nothing to avert the course of events. 

The Committee investigated another example of lack of control over informants. The FBI used Robert Merritt as an informant on New Left activities during the early 1970s. His duties included reporting on activities at the Institute of Policy Studies. Merritt told the Committee that his FBI handling-agents instructed him to conduct break-ins, deliver unopened mail acquired illegally, and solicit and provide information to the FBI regarding homosexual proclivities of politically prominent people and individuals of the New Left. 

The FBI agents who handled Merritt denied these allegations under oath. They stated that Merritt acted on his own. 

The handling-agents stated that they terminated Merritt because they ascertained that he had provided false information on one occasion and had reason to believe he provided false information at other times in the past. If this was true, it does not fit with other facts. During the seven months that Merritt was an FBI informant, he provided over 100 reports on at least 25 people. He had, in fact, been categorized as “reliable” in FBI records. 

No effort was ever made to “correct” the Merritt reports, by indicating that the information contained therein might be unreliable. No prosecutive actions were ever recommended as a result of Merritt’s allegedly wrong actions. His efforts apparently fit well with intelligence operations. 

Furthermore, Merritt told staff that he had committed numerous illegal acts at the direction of District of Columbus Metropolitan Police. 

His FBI handling-agents stated that although they acquired Merritt from the Metropolitan Police Department, they never inquired as to the nature of his prior activities as a police informant. This attitude of “see no evil, hear no evil” appears to violate the seemingly rigid regulations of the FBI Manual, designed to effect the recruitment of responsible and reliable informants. 

Conflicting testimony in the Merritt matter reveals the problem itself. Since FBI agents’ instructions to their informants are, by necessity, given orally and without witnesses, it is difficult, if not impossible, to accurately fix responsibility for an informant’s actions. 

If the FBI agent is at fault, the problem becomes one of administrative command and control. If, however, the informant has gone bad, the problem is more difficult. For example, if an informant successfully instigates others to commit a crime, as in the Hardy matter, his FBI contact agent may overlook the informant’s improper actions, because the informant is important to a case for which the FBI agent is likely to receive credit. 

The risk that informants may use illegal methods is heightened when one considers the kind of person needed to infiltrate suspected criminal elements. Understating the problem, James Adams, Assistant to the Director of FBI, testified before the Committee on November 18, 1975: “[T]he informants you develop are not recruited from Sunday Schools.” The dubious character of most informants is compounded by the fact that informants are paid cash, and their payment is commensurate with the information they furnish. The more incriminating the information, the more lucrative the reward. 

Electronic Surveillance — The Kissinger Wiretaps 

In the last half-century, electronic technology has revolutionized the science of investigations. These developments also mean that “Big Brother” may be watching. 

Improper application of electronic surveillance poses obvious risks because of its enormous potential for invading privacy and the difficulty of detecting intrusion. 

Some examples follow. 

In the spring of 1969, the Nixon White House was disturbed that extremely sensitive information regarding diplomatic relations and national security was leaking to the press on a fairly regular basis. 

On May 9, 1969, William Beecher of the New York Times wrote an article on Cambodia which triggered a strong reaction from the White House. That day, a series of telephone calls to ascertain the source of the leaks took place. The calls were between Dr. Kissinger and J. Edgar Hoover, and between Colonel Alexander Haig and FBI personnel. 

The apparent result of these consultations was the installation of a wiretap on the residence of a National Security Council staff on May 9, 1969. Significantly, approval for this “national security” wiretap was not requested until May 10, 1969. The wiretap was requested by Col. Haig “on the highest authority,” and was not approved by Attorney General John Mitchell until May 12, 1969. 

Seventeen persons were eventually wiretapped pursuant to this program. 

Although the FBI never overheard information indicating any breach of national security, the taps continued for lengthy periods of time. 

No approval was ever sought for extensions of the wiretaps as they continued unabated and unsupervised. In addition, the FBI continued to report information which can only be characterized as political or personal. 

William C. Sullivan, former Chief of Intelligence for the FBI, told staff that FBI Director J. Edgar Hoover did not regard these taps as FBI operations. But as executive requests. According to Mr. Sullivan, Hoover insisted on sending copies of the transcripts directly to the White House, so the President would be apprised of the “service” FBI was providing. 

Several risks were inherent in the FBI’s national security wiretaps installed for Dr. Kissinger. 

The first involved wiretapping United States citizens without prior judicial approval. These dangers were recognized by the Supreme Court in 1972. The Court held that electronic surveillance of domestic organizations or citizens was forbidden unless prior judicial approval was obtained. 

Secondly, wiretapping State Department officials and members of the press, tends to stifle voices of criticism and dissenting views, and infringes upon freedom of the press. 

Finally, the Kissinger wiretaps posed a risk that the FBI could become the tool by which an Administration in power obtains political information. 

The Houston Episode 

On October 9, 1975, Anthony Zavala, a former narcotics officer with the Houston Police Department who had been sentenced to three years’ imprisonment on wiretap convictions, told the Committee of widespread illegal police wiretapping in Houston, Texas, from 1969 through 1972. 

Mr. Zavala recounted that wiretapping had become “second nature to us all,” and “that it was all discussed freely, and that everyone knew what was going on.” 

In 1973, Anthony J.P. Farris, United States Attorney for the Southern District of Texas, learned of allegations of wiretapping. He brought this information to the attention of the FBI in the fall of 1973, and requested that the Bureau investigate. 

They did not. His requests continued. Finally, in April 1974, the FBI assigned one special agent to investigate the case. He filed reports, which according to Farris were “…notable only in their lack of substance, consisting largely of Xeroxed newspaper articles.” (572)

(525) The primary programs were the Communist Party. U.S.A. program (commenced in 1956), the Socialist Workers Party program (commenced in 1961), the White Extremist program (commenced in 1964), the Black Extremist program (commenced in 1967), and the New Left Domestic program (commenced in 1968). Lesser programs were the Puerto Rican Bomber program (1966), Operation Hoodwink (1966) (a program pitting the Mafia against the Communist Party), Operation Border Coverage (1961), the Cuban program (1961) and the Yugoslav program (1969). All COINTELPRO programs terminated after their existence was discovered following the burglary of the FBI office in Media, Pa., on April 27, 1971. Staff COINTELPRO briefing between W. Raymond Wannall. Assistant Director of the FBI in charge of the Intelligence Division and J.B.F. Oliphant and R. Vermeire, at FBI headquarters, Aug. 22. 1975, copy on file with Sel. Comm. on Intell. 

(526) The following are but a few examples of specific COINTELPRO programs, of which there were a total of 5,247 proposed and 2,370 carried out:
In 1969, the FBI authorized an agent to send anonymous letters to the superior of Father Augustus Taylor, Jr., a Catholic priest, complaining of Father Taylor’s speaking out on his television show against the war in Vietnam and of his public support of certain black organizations. Father Taylor’s television show was subsequently cancelled and he was transferred. FBI COINTELPRO memoranda…
In 1968, the FBI authorized interfering with a Mellon Foundation’s decision of whether to give Unity Corporation, a black organization in Pittsburgh, Pennsylvania, a $150,000 grant. The FBI contacted a confidential source within the Mellon Foundation, the grant was denied, and the Unity Corporation subsequently went bankrupt. FBI COINTELPRO Memoranda…
In 1969, the FBI approved furnishing information to a responsible Harvard University official that a student who was employed by the University was involved in Students for a Democratic Society (SDS) activities. Shortly thereafter, the student lost his job. FBI COINTELPRO Memoranda…
More seriously, one program was carried out wherein an anonymous letter was set to the Black Panther Party accusing one of their members of being a police informant. FBI COINTELPRO Memoranda 100-448006-2308. Another program authorized sending a threatening letter to Huey Newton purporting to be from a follower of Eldridge Cleaver. FBI COINTELPRO Memoranda.…

(527) “MR. VERMEIRE. Why was there such a significant break in investigative techniques in 1973?”
“MR. WANNALL. Principally because an analysis was made by a predecessor and a determination, I think, that we should be aware, I think as we always have been, of the climate of the times and restructure on a strict statutory basis.
“I think the history of the Bureau, and I would not bore you with details, has been one of responsiveness, an awareness of the climate of the times, and restructuring.” Staff Interview with W. Raymond Wannall, FBI Assistant Director in charge of Intelligence Division: Robert L. Shackelford. Section Chief, FBI Intelligence Division, and David Ryan. Supervisor, FBI Intelligence Division, by J.B.F. Oliphant, R. Vermeire. J. Atkisson and E. Miller, Nov. 5, 1975, copy on file with Sel. Comm. on Intell. 

(527a) A case in point was the FBI’s alleged targeting of Congressman Andrew Young, of Georgia, wherein the FBI requested Arthur Murtagh, a Special Agent, to surreptitiously obtain Congressman Young’s personal stationery and handwriting sample. At the time. Congressman Young was a candidate for Congress. Comm. Hearings, testimony of Arthur Murtagh, Nov. 18, 1975.
The FBI denies the aforementioned allegation. Furthermore. Black agents presently comprise approximately 1.2 percent of FBI agent personnel. Comm. Hearings, testimony of W. Raymond Wannall, Nov. 18, 1975. 

(529) The Committee staff attempted to find out what triggered domestic intelligence investigations. The best answer appeared to be:
“MR. VERMEIRE. Investigation with respect to a particular crime?
“MR. SHACKELFORD. Potential crime.
“MR. VERMEIRE. Potential; is there probable cause?
“MR. SHACKELFORD. Of course not.”
Probable cause, of course, has been the traditional test for arrest…

(532) A mail cover is observing only what appears on the outside of an envelope or parcel, a practice which is carried out, of course, with the cooperation of postal authorities. The technique is perfectly legal. 

(534) The risk may even be intended. As Dean Louis Poliak put it: “When the official investigation long outlives its initially professed justification — that is to say, reasoned suspicion or criminal activity imminent or actually carried out — at that point it is inescapable… that an important consequence, if not necessarily a purpose, of the continuing investigation will be the imposition of an official stigma on the political or research activity being carried out by the ‘subject.’ ” 

(539) “[The Washington Field Office] feels it would be most unwise at this point in time to seriously consider instituting a similar operation as encompassed by the utilization of this source [the trash cover]. Potential harm to the FBI and the Federal Government, per se, far outweigh the potential information that could be expected from such a reinstated operation.” FBI Washington Field Office Memorandum to Headquarters, August 4, 1973. 

(540) None of the group’s members was known by the FBI to be violence-prone. 

(541) All of which were paid for with FBI funds. 

(542) The FBI’s denial of this allegation appears in their Memorandum of Nov. 28, 1975.…

(572) The complete ineptitude of the FBI investigation of the Houston matter was brought out by Congressman Johnson’s questioning of Mr. Farris:
“MR. JOHNSON. Can you tell me why in this case, when you requested information with respect to investigation of other law enforcement agencies — in this case the Houston Police Department — you didn’t get any response from anybody who was of real significance?
“MR. FARRIS.… In all other cases they always responded; they always performed admirably; but in this case — the investigation of the allegations of illegal electronic surveillance by the police department in Houston — there was not only reluctance but obvious foot dragging.
“MR. JOHNSON.… What was the result of your contacts with Saxbe and Kelley and the others?
“MR. FARRIS. To quote myself in other hearings, zip; nothing. Saxbe didn’t answer; the Deputy Attorney General of the United States didn’t answer; the Assistant Attorney General Crime Section didn’t answer. No one answered. I don’t think they were listening.
“MR. JOHNSON. But you can characterize cooperation they received prior to that time as “zip.”
“MR. FARRIS. It is not worthy of the name investigation; yes, sir.
“MR. JOHNSON. Once again, this is inconsistent make for other investigations?
“MR. FARRIS. That is correct.”

  1. SALT-Political Control of Intelligence 

Nowhere is the risk of corrupting intelligence greater than in recent efforts to restrict and shape important data on Soviet compliance with strategic arms agreements. 

Staff investigation and examination of key documents reveal that these SALT treaties, which are of grave strategic significance, were consummated without full intelligence input, that the prime U.S. official who sponsored the accords also effectively controls the verification of their feasibility, and that day-to-day intelligence analysis of compliance is hindered by arbitrary and inconsistent attempts to prevent leaks of SALT data. 

The prime factor in this situation is Dr. Kissinger, with his passion for secrecy and his efforts to concentrate power and to consolidate ultimate control of important intelligence functions, through his various bureaucratic roles. 

It is clear that, in the final stages of the SALT talks, U.S. negotiators did not fully consult or inform intelligence experts, who had been key figures in previous treaty sessions. Only Russian technical experts were on hand. Dr. Kissinger’s private talks with Soviet leaders in this period were not disseminated. Some officials assert that “ambiguities” which plague the accords may have been the result of U.S. policy-makers’ self-imposed intelligence blackout at the critical moment. (575

The record indicates that Dr. Kissinger, U.S. architect of the accords, has attempted to control the dissemination and analysis of data on apparent Soviet violations of the SALT pact. 

Although CIA, as the government’s principal analytical arm, has both general and specific responsibility for the monitoring of SALT compliance, the Assistant to the President for National Security Affairs has advised the Agency to avoid any written judgements that the Soviets are in violation of SALT agreements. Such findings were to be privately communicated to the National Security Council, which, coincidentally, was headed by Dr. Kissinger. 

When sensitive intelligence reports on Soviet compliance began to turn up with regularity, the National Security Council initiated the procedure of severely restricting dissemination of the information, by causing it to be placed in a “hold” status. Typically, the CIA Deputy Director for Intelligence would, in consultation with NSC staff, place an item on “hold” until Dr. Kissinger or his representative agreed to release it. 

Two principal reasons have been given for access restrictions: fear of leaks by officials seeking to influence U.S. SALT policy; (578) and the need for adequate time to determine a report’s real significance, thus avoiding rash judgments on complicated technical issues. 

This unusual procedure, invoked previously in such momentous situations as the 1962 Cuban missile crisis, has been strangely implemented this time. At times, the Secretary of State, the Director of the Arms Control and Disarmament Agency, and key U.S. officials in SALT compliance meetings with the Soviets have not been aware of the existence of sensitive data suggesting Soviet cheating. Dissemination within several intelligence components has been haphazard and uncontrolled. (589

Two other problems with the “hold” process detract from the integrity of the intelligence product. NSC staff, for example, has influenced the timing and content of intelligence community publications. (590) Worse, both high officials and working level analysts have been cut off from information for periods of time ranging from days to six months. (591)

Dr. Kissinger’s comments on this situation are at variance with the facts. (592)

The specter of important information, suggesting Soviet violation of strategic arms limitations, purposefully withheld for extended periods of time from analysts, decision-makers and Members of Congress, has caused great controversy within the Intelligence Community. (593) In addition, it has raised questions as to the President’s own knowledge of, and concurrence with, the “hold” procedure. (594)

The problem continues, as official fears of leaks and policy-makers’ penchant for a unified view on SALT goes on. Former State Department Bureau of Intelligence and Research Director Ray S. Cline, in testimony before the Committee, framed the issue: “I do think the Congress should be sure that the procedures for handling of strategic intelligence… should have certain checks and balances in them so that there is no possibility of suppression of information that is unattractive to policy-makers.” Cline concluded, “As I was leaving government, I found these procedures breaking down, and that is why I feel that the problem does deserve attention from the Congress.” 

(575) Interview with U.S. intelligence officials, J. Boos, Dec. 4, 1975, copy on file with Sel. Comm. on Intell. Admiral Elmo Zumwalt agreed in testimony to the Committee.…

(578) Testimony by William Hyland, Dec. 17, 1975: “I think the whole SALT process has been plagued by leaks. Not only have negotiating positions and fall-back positions appeared in the press before they could ever be put to the Russians, but the whole issue of compliance has been clouded by a considerable amount of misinformation which has appeared in journals such as Aviation Week and the newspapers on what the Soviets have or have not done.” 

(589) The Assistant Chiefs of Staff for Intelligence told staff they had not received SALT hold items. Interview by E. Sheketoff with Director of Naval Intelligence, and the Assistant Chief of Staff for Intelligence of the Air Force, Dec. 15 & 16, 1975. On the other hand, one “hold” item was given to at least 75 people in CIA alone. Testimony by William Hyland and Edward Proctor, Dec. 17, 1975. DIA informed the Committee that it kept no records on “hold” dissemination and, consequently could not determine just who was authorized to see these sensitive items. Letter to the Committee, Dec. 16, 1975, from office of Thomas Latimer, Department of Defense; testimony by Edward Proctor, Dec. 17, 1975.
Key U.S. officials, like Sidney Graybeal and U. Alexis Johnson of the SALT compliance team, were kept away from some data. Deputy CIA Director Proctor noted: “After talking with General Walters around noon yesterday I called Ray Cline to tell him about the status outlined above. Cline was of course disappointed. He said that he had talked to Rush about the situation. Although Rush recalled being briefed by Duckett on [deleted] shortly after they were discovered, his recollection was very vague. Rush had not realized that Secretary Rogers had not been briefed. Ray reported that Rush was very concerned that Alex Johnson and Sid Graybeal had not been told. Rush is to talk to Rogers and urge that Rogers talk to Kissinger to get permission to tell Johnson and Graybeal.” Edward Proctor, Note for the Record, July 13, 1973. 

(590) …Col. Merritt of the NSC staff told the CIA official that “Dr. Kissinger wanted to avoid any written judgments to the effect that the Soviets have violated any of the SALT agreements. If the Director believes the Soviets may be in violation, this should be the subject of a memorandum from him to Dr. Kissinger. The judgment that a violation is considered to have occurred is one that will be made at the NSC level.” 

(591) …In one case, the head of the U.S. SALT team in Geneva, U. Alexis Johnston, was not told of a secret understanding made a year earlier on an agreed interpretation of the treaty. Johnson first learned of this from his Soviet counterparts. His cable to Washington is as follows:
“To: The White House for General Scowcroft Only
“From: U. Alexis Johnson SALT Geneva
“I. You will note that statement by Ustinov at yesterday’s SCC meeting contained reftel [sic — editor’s note] refers to ‘the agreed interpretive statements of May 26 and July 29, 1972…’ We have no record here, and no one in the delegation has any recollection of latter statement. Presume it was a result of Henry’s exchanges with Dobrynin following Moscow summit. Would appreciate text or summary of contents, so that we will be in position to handle when Soviets again raise matter in present negotiations on destruction, dismantling and replacement procedures. Presumably Phil Odeen or Bill Hyland are familiar with subject. Warm regards. Johnson.” June 7, 1973.
Admiral Zumwalt testified to the same effect. Comm. Hearings… Dec. 2, 1975. 

(592) Dr. Kissinger: “Whatever compliance issues existed at the time were brought to the Attention of the Verification Panel.” Kissinger press conference, Wash., D.C., Dec. 9, 1975.
From documentary evidence: The Verification Panel consists of the Assistant to the President for National Security Affairs, Deputy Secretary of State, Chairman of Joint Chiefs of Staff, Director of ACDA, and the Director of Central Intelligence. Intelligence on SALT compliance with is put on hold routinely goes to only the Secretary of Defense, Director of DIA, and Kissinger.
Dr. Kissinger: “All the decisions of the Verification Panel with respect to compliance have been unanimous.”
From documentary evidence: One member wrote a memo on Jan. 14, 1975: “Upon further consideration following the recent Verification Panel meeting on SALT which addressed compliance issues, I am concerned about the decision not to raise the issue of Air Defense Testing… This testing could have major strategic implications and its impact, in my opinion, was not sufficiently assessed at this recent session of the Verification Panel.”
The Panel also does not vote or make formal decisions.
Dr. Kissinger: “There is nobody who has claimed that the issue of compliance was not being adequately pursued. There is nobody who has objected to the handling of the information.”
Documentary evidence: Proctor memo of 13 July, 1973… Colby letter to Richard Kennedy, Nov. 14, 1974…
Dr. Kissinger: “All intelligence concerning alleged noncompliance was immediately distributed to all the members of the Verification Panel…”
Dr. Kissinger: “The longest time an item was on ‘hold’ was two months.”
From documentary evidence: Some items were on “hold”: 19 June 1973–8 Aug. 1973; 28 June 1974–17 Dec. 1974; 26 July 1974–17 Dec. 1974; 11 Sept. 1974–17 Dec. 1974; 23 Sept. 1974–17 Dec. 1974.
Dr. Kissinger: “No Soviet interference actions have interfered with our national means of detection.”
From documentary evidence: Some important concealment activities, as well as Soviets interfering with national means of verification. 

(593) On January 15, 1973, Dr. Edward Proctor, Deputy Director of the CIA for Intelligence and a member of the SALT Steering Group, informed Acting Director of Central Intelligence Walters that “It is now 24 days since we reported to Dr. Kissinger on the detection of several” alleged Soviet SALT violations. Proctor noted that the “hold” items had been restricted for so long as to raise suspicions “that important information is being withheld” from the many people in the intelligence community who had related responsibilities. Proctor advised that “there is little likelihood that it [the hold item] will be lifted soon,” and that Mr. Odeen of Dr. Kissinger’s staff “would like to see a draft of the Monitoring Report with the item in it to recommend to Kissinger whether the Report should be published and whether it should have the item in it.” Note for the Record, July 13, 1973, Edward W. Proctor. 

(594) Proctor wrote on July 13 that “Earlier this morning, I had discussed with General Walters and Mr. Colby the DCI’s obligation — a la Watergate — to make sure that the President knew of the withholding of intelligence, was aware of the consequences of prolonged delay in informing others in the Executive and Legislative Branches, and nonetheless had approved the continuation of the restrictions.” Ibid. The President was never personally approached. 


From The Archives From The Archives NEWS & POLITICS ARCHIVES Security THE FRONT ARCHIVES Uncategorized Washington, D.C.

Annals of the Age of Reagan: Missile Mess in Europe

True Story of the SS-20 and Pershing II

In the last few weeks, some of the larg­est demonstrations in the postwar history of Western Europe have surged through the streets of London, Brussels, Bonn, Rome, Milan, and Paris. With varying em­phasis, they have been directed against the growth of so-called “theater nuclear” weaponry — primarily the U.S.-made Pershing IIs and Cruise missiles to be deployed by NATO, and the SS-20 missile deployed by the Soviet Union. 

Western European fears are not hard to explain. The Reagan administration, rabid on the topic of the Russian threat, has escalated bellicose rhetoric to a level which quite simply terrifies people. Ensuing assertions by the administration that deployment of the new NATO missiles will go hand-in-hand with talks with the Rus­sians on reduction of these and the Soviet missiles seem either specious or ludicrous. 

Reaganite rationale for the Pershing IIs and the Cruise, following the line of the Carter administration — which promulgated the policy — is that something had to be done about the threat posed by the fearsome SS-20s, and that it was in fact Chancellor Helmut Schmidt of West Ger­many who asked for the new weapons in the first place. In a talk with U.S. journal­ists on October 29, Schmidt denied this, and said Carter had proposed the plan at the Guadeloupe summit in January 1979. 

Whatever the truth of Schmidt’s asser­tion, the proposed deployment of the new missiles threatens his own leadership and has posed enormous problems for NATO, confronted by a peace movement broader by far than the campaigns of the late 1950s. 

[related_posts post_id_1=”717255″ /]

Crisis at Nadiradze
Acres of newsprint in recent years have been covered with spine-shriveling ver­biage about the Soviet SS-20 medium­-range missiles, invoked by U.S. and Western European arms lobbies as the most conspicuous evidence of Soviet de­termination to Finlandize the continent from the Elbe River to the Bay of Biscay, and as a threat which had to be countered. 

But in all the high-minded discussion about the famous SS-20s and the NATO response to them, much essential data has been omitted. 

Arms debates, as conducted by politi­cians, strategists, and the press, invariably ignore an important point: weapons are made by people who want to make money out of them. And if these people have no weapons to make, they will be out of a job. 

Such was the grim prospect faced by at least some of the comrades at the Nadiradze Design Bureau in the Soviet Union in the mid-1970s, and by their op­posite numbers in the Martin Marietta Corporation in the United States. 

The Nadiradze Design Bureau has, for the last 20 years, been charged with the responsibility for constructing a solid­-fueled intercontinental ballistic missile for the Strategic Rocket Forces of the Soviet Union. Other bureaus in the Soviet Union, such as the Yangel and Cholomei, have been briskly turning out liquid-fueled ICBMs (the SS-11, 17, 18, 19), all of a type abandoned by the U.S. some 20 years ago. 

After herculean efforts, the Nadiradze Bureau finally managed to come up with a prototype for the SS-16 in the mid-’70s. It was not a success. Test-firings, monitored by the U.S., almost invariably went wrong, and the SS-16 never went into production. Glum faces in the comfortable dachas inhabited by Nadiradze bureaucrats and engineers — and in the adjacent dachas inhabited by the generals of the Soviet Strategic Rocket Forces, who had been promised up-to-date missiles of the sort flaunted by the Americans.

From this crisis emerged the SS-20, hailed by Nadiradze salesmen and by U.S. threat-inflaters as super-accurate and terrifyingly MIRVed with up to three warheads. In fact the SS-20 is our old friend, the SS-16, chopped down by a third. The Russians began to deploy it in the late 1970s across the breadth of the Soviet Union, aimed at both the Chinese and NATO hordes.

[related_posts post_id_1=”717232″ /]

…and at Martin Marietta
Meanwhile, in the early 1970s, a crisis rather similar to that afflicting the Nadiradze/Strategic Rocket Forces complex was brewing between the Martin Marietta Corporation, headquartered in Florida, and the U.S. Army. 

By 1970, Martin Marietta was in danger of losing its treasured status as a “prime contractor” for military aerospace items. A prime contractor makes complete systems — a plane, a missile, a ship — thus lording it over humbler accomplices making subsystems: parts. One of the corporation’s more successful recent products had been the Pershing I medium-range nuclear missile, contracted for by the U.S. Army and deployed in Europe. But the days of Pershing I production were ebbing. Martin Marietta was faced with the disaster of no follow-on contract, and the U.S. Army with the prospect of being without an up-to-date nuclear missile and losing the last vestiges of nuclear missile turf to the enemy — the U.S. Air Force and U.S. Navy. 

At the time, there were no plans in NATO to purchase a fresh range of nuclear missiles for deployment in Europe. NATO was amply equipped with nuclear bombs on planes, on the aforementioned Pershing I, and on Polaris submarines. Undeterred by the absence of a policy decision by the NATO powers (and certainly undisturbed by the SS-20 threat, which had yet to be invented by the Nadiradze Bureau), the U.S. Army funded the development of the Pershing II, which, it claimed, would have a longer range than its predecessor and unprecedented accuracy.

[related_posts post_id_1=”714416″ /]

A Blessed Threat
Development of the Pershing II went limping along, to the gratification of the army and Martin Marietta but unbeknownst to all but the most assiduous readers of U.S. military budget statements. No production contracts had been awarded. Then came salvation, with the news that the SS-20 was being deployed. Threatmongers, notably Richard Burt — then at the Institute for Strategic Studies, subsequently defense correspondent for The New York Times, and now a Haig deputy in the State De­partment — and Uwe Nerlich, a West Ger­man defense analyst, began to bewail a NATO “escalation gap” which supposedly had opened up, requiring the deployment of a fresh generation of missiles in Europe. 

Thus, in the face of the dreadful SS-20 threat, began the campaign for installation of Pershing II and Cruise missiles — every­one conveniently forgetting that in the ’60s the U.S. had withdrawn medium-range missiles capable of hitting the Soviet Un­ion from Europe in favor of missiles of equal prowess based on submarines cruis­ing in the North Atlantic and Mediter­ranean. 

The advantage of the Pershing II over the Pershing I is that it will be capable, if deployed, of hitting the Soviet Union — a fact not lost on the Soviets, who are less worried about the slow-moving and wildly inaccurate Cruise than the Pershing II, which can reach their territory in five min­utes. 

NATO proposes to deploy 108 Pershing IIs and 464 ground-launched Cruise mis­siles. The Soviets have about 259 SS-20s deployed in the Soviet Union. 

It goes without saying that both the Pershing II and SS-20 have far fewer technical capabilities than those usually pro­claimed on the printed page. Veterans of Pentagon procurement say that even by the usual relaxed standards, the tests of the Pershing II guidance system were “outrageously faked.” The SS-20, some­times called “highly mobile” but with the relative speed of movement of an oil rig, has also turned out to be much less ac­curate than claimed. 

Today, the collective lunges at self-preservation and profit of the Nadiradze Bureau and Martin Marietta have led to the rebirth of the disarmament lobby and a mass movement in Europe, and the corresponding derogation of NATO. 

The uproar has greatly benefited the Russians. For years, the Soviet Union has been trying to get forward-based tactical nuclear systems included in arms-limita­tion talks. For years, the U.S. has stoutly resisted. Now, under pressure from Western European allies, the U.S. may at last have to enter into serious limitation talks about these very systems. 

If the U.S. decides to abort such talks, the Russians come out ahead once again­ because European disarmament cam­paigns will continue with redoubled force. 

From The Archives NEWS & POLITICS ARCHIVES Security THE FRONT ARCHIVES Washington, D.C.

New Cloaks for the CIA

New Cloaks for the CIA
November 11, 1981

On September 23 the House of Repre­sentatives voted 354 to 56 to enact a piece of legislation that perilously abridges free­dom of speech and of the press: On Octo­ber 6 the Senate Judiciary Committee voted 17–0 in favor of a similar bill making final passage a certainty. What follows is the history of this extraordinary piece of legislation, purportedly designed to pro­tect the identities of intelligence agents but perhaps marking a fatal turning point in the history of liberty in America. 

The story begins with former Central Intelligence Agency officer Philip Agee. But although Agee’s personal odyssey is by now all too familiar, the complex series of actions he initiated had repercussions far different from anything he intended — and repercussions that even today are little­-known. 

In London, on October 3, 1974, Agee, Notre Dame ’56, made a public announce­ment more quixotic than most. He in­tended, he said, to wage unremitting private war against the Agency which had employed him for 11 1/2 years. According to Agee, who entered the CIA a rabid anti-­Communist and who left it in 1968 a rabid pro-Communist, the CIA’s unforgivable sin was its success in forestalling the worldwide triumph of revolutionary Marx­ism. Since that is just what the CIA claims, Agee’s opinions disturbed nobody at the Langley, Virginia, headquarters of the largest, busiest, and most inept “intelli­gence service” in the world. What did in­furiate the CIA was the strictly practical aspect of Agee’s little war. In order to cripple the Agency, announced Agee, he intended to identify, and to train disciples to identify, “CIA officers and agents,” and by doing so to “drive them out of the countries where they are operating.”

[related_posts post_id_1=”716252″ /]

A self-important sort of person (re­sembling in this respect the Agency he abhors), Agee did not divulge the CIA trade secret on which his prospective war depended — the almost comical truth that the identities of undercover CIA officers are not a secret, have never been a secret, and are not even meant to be a secret. These officers work at U.S. embassies un­der the thin guise of State Department employees and their “cover” is as trans­parent as a plastic raincoat, beneath which they wear, metaphorically speaking, CIA T-shirts in order to make it easier for the natives to find them.

In a foreign capital you can identify the CIA crew at the embassy by asking anyone at the bar favored by newsmen and politic­os. The habitues can always give you the name of the CIA chief of station because he probably gives conferences — or even cocktail parties for that matter. Or you can ask an embassy janitor to point out Americans who all work in the same room and only talk to each other. If you travel in diplomatic circles, you don’t even have to ask who the CIA people at the embassy are, for, as one ex-CIA officer put it, “a favorite pastime of Foreign Service Officers and their wives was to point them out whenever the opportunity arose.” 

Even stay-at-homes can identify the CIA lads working under embassy cover with the help of various unclassified gov­ernment publications. If you want to know how it’s done, read “How to Spot a Spook” in the November 1974 issue of the eminently respectable Washington Monthly. One “indicator,” as the CIA calls it, is the fact that no CIA official at an embassy is allowed to be listed as a foreign service officer. This is because foreign serv­ice people, who have to take a stiff test to win that coveted title, refuse to let it be worn, unearned, by some ill-educated CIA clodhopper. So much for America’s famed clandestine service. 

[related_posts post_id_1=”717232″ /]

This great CIA trade secret would be something of a joke if the American people shared it. Most Americans do not, and because they do not, Congress, at this very moment, is exploiting that ignorance to carry out one of the deadliest assaults on First Amendment liberties ever attempted on Capitol Hill. The assault has been more than a year and a half in the making and the slow pace is readily understandable. Given a Constitution which states catego­rically that “Congress shall make no law… abridging freedom of speech or of the press,” passing such a law is not the work of a day. 

For a number of years, in fact, Agee’s little war against the CIA was scarcely noticed in Congress, although by the end of 1978 he and his handful of followers had published in one place or another the names of 1000 CIA officers working in U.S. embassies around the world. Con­gressional lethargy stemmed from many sources, but chiefly from the fact that we were still in the era of detente; that popu­lar support for the Cold War had broken down, and that the CIA itself was in ill­-repute. Thanks to Watergate’s endlessly ramified revelations, the Agency, by 1975, had almost lost the only “cover” it has ever really cared about — the 30-year-long pre­tense that the Central Intelligence Agency is in fact an “intelligence-gathering” service. Blaring headlines about a CIA-backed coup in Chile and shocking stories about CIA attempts to assassinate foreign rulers gave the American people a tantalizing glimpse of the long-hidden truth. The chief activity of the CIA is to intervene politically in the internal affairs of half the countries in the world. The CIA is little more, in fact, than an enormous bureau of incessant meddling, working constantly to prop up pro-American governments, how­ever inept or vile, and to subvert independ­ent-minded rulers, however popular or worthy. It is chiefly because the CIA’s embassy operatives are political manipu­lators, not spies, that their “cover” is of so little consequence. 

All such “covert action,” as it is called at Langley, is no secret to the Kremlin, which, interestingly enough, makes no ef­fort to impede it. Indeed, it is no secret to anyone in the world except the American people, whose knowledge of what their government does overseas constitutes the only danger to “national security” Ameri­ca’s rulers really fear.

[related_posts post_id_1=”717156″ /]

The real CIA is a secret of state, and by mid-1979, the time was ripe for shoving this secret back in the box. The political atmosphere was changing. Detente and Jimmy Carter were on their last legs. Suddenly Agee’s little war, a minor nuisance at most, took on interesting legislative possibilities. Agee himself was not especially useful. A law making it a crime for a former intelligence officer to publish the names of CIA officials, although often proposed in Congress, held few attractions either for the CIA or for men bent on putting the “cover” back on the Agency, namely the members of the House and Senate Intelli­gence committees. Such legislation would “get Agee,” as various legislators put it, but it had one quintessential drawback. It would leave the American press free to publish what it wanted about the doings of the CIA. 

Far more promising was an Agee-in­spired little magazine known as the Covert Action Information Bulletin. For one thing its three radical editors, Ellen Ray, Louis Wolf, and William Schaap, were private citizens. Secondly, their magazine is uncommonly easy to denounce. In addi­tion to articles about CIA meddling abroad, the Bulletin lists at the back of each issue the names and biographies of 25 or so CIA officials working at various U.S. embassies. The editors label this the “nam­ing names” section and the very sight of this gratuitous little directory can turn even liberal spirits livid. 

Just how the CIA and its Congressional allies were going to exploit the Bulletin first became public on an NBC network program, a news magazine called Prime Time Sunday, shown on July 8, 1979. Af­ter the Bulletin editors were shown trying to explain why they opposed the CIA’s covert action the interviewer turned to Admiral Stansfield Turner, then the CIA director. What did he think these Bulletin people were trying to do? “They are avowedly doing this in order to destroy the intelligence-collecting capability of our country.” What kind of people did he think they were? “Traitors.” “What do you think would happen to these people if they lived, say, in the Soviet Union?” After pondering the blessings of dictatorship, the good Admiral crisply replied: “They would be put in jail in nothing flat.” Shouldn’t we be able to do that here, asked the interviewer, who by this time sounded like a man convinced that America faced imminent ruin because of some insane omission in the U.S. Penal Code. Yes, we should, answered the CIA’s deputy director, Frank Carlucci, now deputy secretary of defense in the Reagan administration. “We’re in the process of drafting legisla­tion right now.” In order to get around “such problems as freedom of the press and the First Amendment,” said the depu­ty director, it would be “narrowly based, narrowly drawn legislation,” scarcely ap­plicable to anything save wantonly naming CIA names in publications avowedly de­voted to harming the Agency. 

[related_posts post_id_1=”714416″ /]

On October 17, 1979, Edward Boland, Massachusetts Democrat and the chair­man of the House Intelligence Committee introduced the CIA’s “narrowly drawn legislation” to the House, with his entire committee co-sponsoring it. Three months later, New York’s Democratic Senator Pa­trick Moynihan introduced identical legis­lation into the upper chamber with similar bipartisan support. What had won this enthusiastic backing was a bill distin­guished by the fact that nothing about it was narrow. Despite the talk about “nam­ing names,” it was only loosely linked to naming names. Despite the talk about pro­tecting CIA officials abroad, it was not limited to CIA officials abroad. 

Under the key provision of the bill, anybody could be prosecuted, convicted, and imprisoned for disclosing “any infor­mation,” including information that was already public, which directly or indirectly revealed the identity of any person in the world who had secretly been an “agent” or “source of operational assistance” to the CIA. This means thousands of CIA-bribed politicians and trade union officials; this encompasses the security police of dozens of countries; this includes kings, sheiks, presidents, party leaders, dictators, and juntas from one end of the third world to the other. A reporter who publishes a de­tailed account of some CIA-backed coup, or a diplomatic historian who traces the secret links between our government and the old Congo regime, could, using infor­mation already public, without naming a name, find himself subject to federal pros­ecution. If the government proved “intent to impair or impede the intelligence ac­tivities” of the United States, the prison doors would clang shut behind him.

This was not a so-called “names of agents” bill, as a spokesman for the Ameri­can Civil Liberties Union was soon to testi­fy. “We are talking about closing down substantial discussion about the foreign policy and intelligence activities of this country.” In making it a crime to publish public information, said Floyd Abrams, the most eminent First Amendment law­yer in the country, the bill’s backers were doing something “flatly and facially un­constitutional,” something “absolutely un­precedented and terribly dangerous.” They were putting into the hands of the federal government the liberty-destroying power to prosecute the press. Had such legislation existed in 1972, Americans would never have learned about the crimes of Richard Nixon; instead, it would have been a crime to reveal that the Watergate burglars had been agents of the CIA.

[related_posts post_id_1=”716582″ /]

The House Intelligence Committee held hearings on this extraordinary piece of legislation on January 30 and 31, 1980. The first witness was one of the most important men in the House, Jim Wright of Texas, the Democratic majority leader. His brief testimony in favor of the bill proved to be the epitome of the ex­traordinary fakery to come. Americans had become so critical of a futile war and a lawless president, so irked by revelations long overdue and by corruption too long hidden, said the majority leader, that “It has become chic in some circles to dis­parage and belittle the CIA.” This was cutting close to the national security bone. “To make the nation’s intelligence ap­paratus the object of scorn is damaging,” he went on. “It is bad because of the dele­terious effect that it exercises upon the morale of those who must perform this delicate, dangerous, and difficult task for the United States… they have lost their zest simply because they haven’t been able to feel that the public, that the United States appreciated their efforts or were behind them.”

Such was the majority leader’s testi­mony that in both the House and the Senate, CIA spokesmen and defenders would be left perfectly free to describe the Agency as, above all else, an “intelligence­-gathering apparatus” engaged in the dan­gerous craft of espionage, to describe CIA officers as top-secret spymasters pene­trating the designs of America’s ad­versaries, to describe their cover as a mat­ter of life and death.

Consider the testimony of Deputy Di­rector Carlucci, who bore the brunt of jus­tifying legislation which, looked at square­ly, would make it a crime for an American to tell a fellow citizen what the CIA takes no pains to conceal from the KGB. “I start this morning,” said Carlucci, “from the premise that our effort to collect informa­tion about the plans and intentions of our political adversaries cannot be effective in a climate that condones revelations of the means by which these efforts are con­ducted.” Given that “premise,” which sug­gests that lack of sympathy for the CIA is itself a menace to America’s safety, the deputy director then cited the damage done by “unauthorized disclosure of the identity of individuals employed or assist­ing in the foreign intelligence activities of the United States.” For one thing, “nearly all major foreign intelligence services with which we have liaison relationships have undertaken reviews of their relations with us.” What this portended was not as yet clear. For another thing, when CIA of­ficials have their identities revealed “some must be removed from their assignments at substantial cost,” which implies that most of them stay right on the job, “blown” cover and all. The damage that has been done, or could be done, or might be done to America’s fictive ability to discover “the plans and intentions of our political ad­versaries,” plus the “climate” condoning that damage, “constitutes,” concluded Carlucci, “a serious threat t0 our national security.” 

[related_posts post_id_1=”659688″ /]

CIA witnesses and committee members pointed out time and again that un­authorized disclosures jeopardize the lives of CIA officials and their families. Yet nobody asked a CIA witness why after five years and 2000 published names, no CIA official so named had demonstrably suf­fered harm because of it. The lawmakers didn’t ask because they already knew the answer: CIA people are so widely known that further identification makes re­markably little difference. The one named CIA official killed by terrorists was a CIA chief of station, Richard Welch. In Decem­ber 1975, he was gunned down in Athens outside his front door, not because his assassin had read his name in a several-­months-old American pamphlet but be­cause he had insisted, despite three warn­ings from Langley, in renting the home of the previous CIA chief of station in Athens. If terrorists really started attack­ing CIA officials abroad, what would be needed is not a law against the press but a new system of cover.

One after another, CIA witnesses testi­fied that unauthorized disclosure of CIA identities “crippled” America’s ability to learn the plans of its enemies, to “blunt their plots,” to “monitor their military ac­tivities.” Yet no member of either commit­tee asked the perfectly obvious question, which reduces such assertions to absurdi­ty: If identifying CIA officials is such a “serious threat to our national security,” why doesn’t the KGB do it? The legislators didn’t ask because the real CIA, the Agen­cy which props up and subverts fourth-­rate powers, has no convincing answer. That was demonstrated in August 1980, when the names-of-agents bill passed through the hostile purlieus of the House Judiciary Subcommittee on Civil and Con­stitutional Rights. There the CIA’s legisla­tive counsel, Fred Hitz, finally had to con­front the KGB question. It reduced him to that curious combination of blather and self-pity which characterizes the CIA whenever it is put on the defensive. The counselor replied (if that is the word) that what “professional intelligence officers… did not sign up for is a situation where citizens from their own country in effect make the moral judgment themselves that the activity in which the intelligence of­ficer is engaged is improper…” At which point his questioner, Democrat John Seiberling of Ohio, impatiently cut Hitz short: “My question is not what they signed up for.”

Not only did the intelligence commit­tees ask no revealing questions, they utter­ly ignored the few witnesses who raised the questions themselves. One such witness was an ex-CIA man named John Stockwell, who had served in the Agency from 1964 until 1977. Unlike Agee, who turned against the Agency because he thought it stemmed the tide of “social­ism,” Stockwell had turned against it be­cause he thought it disgraced America. In the long written statement he submitted to the Senate Intelligence Committee, he noted the Agency’s “long and continuing record of arrogance, incompetence, cruel­ty, and irresponsible activities.” Covert in­terventions, in his own long experience, “had little if anything to do with United States’ national security.” What he had come to tell the committee, his statement continued, is that “the objective of this bill is clearly not to protect the safety of secret agents, as its proponents claim, because the CIA itself is flagrantly careless of the identities of its own agents.” The bill’s real objective, wrote Stockwell, is “to gain an important weapon for the CIA to use in silencing its critics.”

[related_posts post_id_1=”670116″ /]

Stockwell’s spoken testimony was brief but devastating. “I was a clandestine case officer for 12 ½ years. I lived under cover. I did CIA operations on four continents… I think it is fair to say that I know how cover functions.” The committee did not seem to realize, said Stockwell, that cover “is not intended to be, nor has anyone in CIA ever pretended that the 95 per cent of its officers are, in fact, safely and com­pletely covered when they go overseas… Everyone around them knows they are CIA.” What is more, it is often actually an “advantage” to be so known. “This was the first thing my first chief of station told me. He said: ‘Forget everything you learned in training about cover. You want people to know you are CIA so that they will come to you, they will report to you.’ ” Far from being “dangerous for CIA people to be known as CIA,” they often “played to” their CIA identities. 

Hard-won truth was at last confront­ing flimsy sham. What would the sham artists say? Senator Jake Garn, Utah Re­publican, was the first to reply. “Mr. Stockwell, it is a little bit difficult for me to handle this because I have such disgust for your activities… and your disloyalty to this country.” Stockwell’s answer was simple and eloquent. “I cannot let anyone challenge my loyalty to this country. I have been awarded medals. I have served in three wars for this country. I was 19 years in the Marine Corps Reserve. I am sorry, I cannot let you challenge my loyalty to this country. The CIA is not the United States of America.” Following Garn, Senator John Chafee, high-toned Rhode Island Re­publican, evaded Stockwell’s home truths somewhat more deftly. He insisted that what Stockwell had said about cover could not possibly be true because “What you are doing today is giving evidence that is quite contrary to the evidence by the head of the Association of Former Intelligence Officers, whom you just heard, that of Mr. Carlucci, that of station chiefs that we have met.” When Stockwell replied that the committee was getting the CIA’s “par­ty line,” Senator Chafee replied, in tones of shocked disbelief: “Is this a master plot?” Was Stockwell actually suggesting the ex­istence of “some kind of cabal”? Clearly anyone that hostile to the CIA, concluded Chafee, was a worthless witness with noth­ing to say “constructively” about the legis­lation in hand. 

So much for John Stockwell, and so much, too, for the 1980 hearings on what had come to be known as the Intelligence Identities Protection Act. Throughout the hearings, the bill’s proponents had argued that they were compelled to entrench upon freedom of the press because of the over­riding demands of national security. The truth was exactly the opposite. Exploiting the mystique of espionage, they pro­pounded a sham threat to national security in order to abridge our freedom to discuss the seamy side of American foreign policy. As Robert McClory of the House Intelli­gence Committee put it: “We are in a new age and we are plowing new ground.” 

[related_posts post_id_1=”714267″ /]


America’s venerable liberties, however, cannot be plowed under quite so readily. When the Senate committee hearing ended on June 25, the future of the bill was cloudy. Two ingredients of success were still missing. The first was genuine popular support, support strong enough to cow the press, which, for all its faults, does protect its freedom from the grosser forms of as­sault. The second missing element was a Justice Department assurance that the bill was constitutional, thereby providing balm to legislative consciences of the more tender variety. Unfortunately for the bill’s proponents, the department could not bring itself to agree that the bill’s chief provision, the one which made it a crime for the press to publish public information, was quite up to snuff constitutionally. It was hard for Justice Department lawyers to see how prohibiting the publication of information not even classified could pos­sibly be constitutional. As long as the Jus­tice Department refused to enter “the new age,” the bill’s proponents were leery of reporting it out of committee. 

Just when civil libertarians were begin­ning to breathe easily, however, a stunning event took place in Kingston, Jamaica, that gave momentum to identities legislation. On July 2, just eight days after Senate hearings had ended, Louis Wolf of the Covert Action Information Bulletin held a press conference in Kingston in which he supplied the names and addresses of 15 CIA officers working at the U.S. Embassy, including station chief Richard Kinsman. The main object of this exercise was to prove that the CIA was working for the conservative candidate for prime minister, Edward Seaga, against the socialist incumbent, Michael Manley, whom Seaga ac­cused of being a puppet of Fidel Castro and his CIA. Both accusations were proba­bly true. In any case, at around three o’clock on the morning of July 4, some unidentified gunmen sprayed .45 caliber bullets at the home of Kinsman, many of the bullets riddling the blank wall of his carport. Nobody was hurt; indeed Kinsman’s family was away on holiday. Kinsman himself did not call the police. Knowing a propaganda coup when he saw one, he called up the Daily Gleaner, the leading anti-Manley newspaper in King­ston, and on July 5 the story of the attack made front-page headlines from one end of the U.S. to the other. The next day CIA lobbyists hotly demanded to know why a bill designed to prevent just such an out­rage lay bottled up in congressional com­mittees. 

[related_posts post_id_1=”714700″ /]

The Justice Department suddenly saw the light. Reluctant Intelligence Commit­tee members hurried to get on the bandwagon. As one of Senator Chafee’s aides explained to me many months later, the Kinsman attack “established clearly the connection between naming names and terrorist attacks,” a connection which, he noted, “the Welch case” had unfortunately failed to make. Could anyone doubt now that naming names endangered the lives of CIA officials? Yes. Anyone, for instance, who notices how the failed, indeed markedly feeble, attack on Kinsman’s home was trumped up by its chief benefi­ciary, namely the CIA. The Agency, in fact, had what every detective looks for in de­termining a prime suspect, namely means, motive, and opportunity — not to mention a 30-year history of pulling off “dirty tricks” exactly like the Kinsman attack. 

Ready to “plow new ground,” the Jus­tice Department no longer doubted the constitutionality of a law prohibiting the press from publishing public information. The Department had one proviso, how­ever. The disclosure of “any information” that might identify a ‘”covert agent” of the United States would be a criminal act only if done “in the course of a pattern of activities intended to identify and expose covert agents.” The original bill’s propo­nents were entirely agreeable to this ap­parent narrowing. The House Intelligence Committee added an analogous condition, that the disclosure, to be criminal, must be made “in the course of an effort to identify and expose covert agents.” On July 25, the House Intelligence Committee unanimous­ly reported out its amended bill. On Au­gust 6, the Senate committee reported out its new version of the bill with only a single dissenting vote. 

Those who had hotly supported the un­amended bill were pleased to announce that the amended version accomplished everything they had wanted all along-to prohibit what the Senate committee’s re­port called “a conscious and pernicious effort to expose agents,” in short, Agee’s little war and nothing else. The amended law, said Kentucky Democrat Roman Mazzoli, was drawn up “so only the real fish we are going after — and that is the Covert Action Bulletin-type information — is netted.”

In fact the amended bill did nothing of the sort, as Don Edwards’s House Judi­ciary Subcommittee on Civil and Constitu­tional Rights made clear in mid-August hearings. The criminal disclosure still did not have to be a name — so much for “net­ting” the Bulletin‘s “naming names” sec­tion. The definition of a “covert agent” remained as vague and as broad as ever­ — so much for all the talk about protecting the lives of CIA officers. The bill still threw a protective blanket over the entire secret world of American foreign policy, the part the CIA conducts. The “pattern of ac­tivities” requirement proved under ques­tioning to be little more than window dressing. As Associate Deputy Attorney General Robert Keuch testified, the “pat­tern” did not mean “that you have to have a series of revelations” of names in order to prosecute. The government could prose­cute a writer, said Keuch, even if he never named a name in his life. Nothing had been changed at all.

[related_posts post_id_1=”714572″ /]

Although a campaign year recess and some knotty parliamentary tangles kept the Intelligence Identities Protection Act of 1980 from the floor of the 96th Congress, Deputy Director Carlucci had every reason to boast of the Agency’s legislative success at the sixth annual meeting of the Associa­tion of Former Intelligence Officers. “We’ve managed to pursue a very ag­gressive strategy on the Hill; that strategy has paid dividends.” Immediately rein­troduced in the 97th Congress, the legisla­tion is now moving smoothly toward even­tual passage, strengthened, if anything, by the stunning victory of Ronald Reagan, by Republican control of the Senate, and by what leaders of both parties regard as a popular mandate to restore the good old days of the Cold War.

The operative word is restoration. Therein lies the significance of identities legislation, the reason its promoters pre­tend it is narrow but drew it broad, why they asked no honest questions and swal­lowed so many lies. As Thomas Powers put it in The Man Who Kept the Secrets, “the history of the CIA is the secret history of the Cold War.” As long as Americans are free to write about, read about, and discuss the real CIA and the secret Cold War, the restoration of the old Cold War political system cannot be carried out.

For 30 years, our leaders have justified their Cold War policies by blatant appeals to fear, by raising false alarms, by detect­ing nonexistent “gaps,” by crying up “growing threats,” by endlessly depicting an America backed weakly against the wall. But what the covert activities of the CIA reveal is that America’s leaders, in secret, regard Russia as a markedly in­ferior power and have not seriously feared her since 1948. CIA activities reveal, too, what Americans at home cannot readily grasp, that their country is so ex­traordinarily rich and powerful that CIA twerps fresh out of college can make and break the careers of politicians twice their age and with five times their ability. Our leaders have also justified their Cold War policies by working up moral outrage over “Communist subversion” and “Soviet ex­pansionism,” but the covert actions of the CIA reveal that America is just as sub­versive as Russia, just as determined to expand its dominion, just as ruthless in the means it employs. 

In short, popular knowledge of the se­cret Cold War the CIA wages would deprive our leaders of fear and moralizing as propaganda props for their Cold War policies. Such knowledge would force them to do what they have not done for 30 years: attempt to explain to the American people just what relation actually exists between their foreign policy and our national in­terests — our just and legitimate interest in safeguarding the independence of the Re­public and the liberties of its people. In­stead, by means of the Intelligence Identi­ties Protection Act of 1981, they hope to abridge our liberties in order to safeguard their Cold War. ■

Protest Archives Security THE FRONT ARCHIVES Violence

The Student Anti-Gun Walkout Is Just the Beginning

The kids are still angry, and now they’re getting organized.

Across the country, thousands of students are preparing to walk out of their classrooms on Wednesday morning, exactly one month after the mass shooting at Marjory Stoneman Douglas High in Parkland, Florida, left seventeen people dead. Spearheaded by youth organizers of the Women’s March, the #Enough National School Walkout is aimed at persuading members of Congress to “pass legislation to keep us safe from gun violence at our schools, on our streets, and in our homes and places of worship,” per their official website.

The mass action comes as Parkland survivors continue to build a sweeping anti-gun movement that seemed unthinkable just weeks ago. But while the eloquence and fury of the Florida students has jolted much of the country, their fellow teenagers are far from shocked. Beyond putting pressure on politicians, the purpose of the walkout, according to organizers, is to show that Parkland is not an aberration, and that the surge of youth-led activism is only just beginning.

“This moment feels like culmination of a year and a half of youth energy that began with the election,” Bryson Wiese, a junior at the Dalton School and co-founder of the student-led advocacy group Coalition Z, tells the Voice. “Trump obviously highlighted the stakes for our generation, and now we’re seeing the full force of that energy play out in the fight over gun reform.”

Wiese says he’s received organizing advice from Parkland students on Twitter, and is currently in touch with several young activists in New York who he knows only through online correspondence.

“Being on social media has allowed me to talk to people around the country about the issues that affect us,” echoes Haley Hartigan, a senior at Baruch High School in Manhattan. “It’s what basically started this whole movement.”

Both Hartigan and Wiese are helping to organize the walkouts at their schools, as well as an “Evening of Action” later that night, where students will work on concrete policy demands and “lay the groundwork for a sustained student-led gun sense movement,” according to the event’s Facebook page. On Saturday, the two met with around two dozen student leaders from other schools for an informal sign-making event near Union Square. (“I was like, ‘Hey, Mom, I’m gonna go to this girl’s apartment I’ve never met,’ but thankfully she gets it,” Hartigan recalls.) Over pretzels and soda, the teenagers traded ideas for signs, and discussed the logistics of their schools’ respective walkouts. Some will be marching to rallies planned at Central Park and Prospect Park, and others are in the process of organizing their own demonstrations.

While administrators and local politicians are lending a hand with the larger events, the decentralized nature of the walkout has given many high schoolers the freedom to craft their own messages and agendas. Students from the Manhattan Center for Science and Math, for example, are planning to block off the road outside their high school in East Harlem. A press release written by Aaron Jackson, a senior at MCSM, includes a warning to Congress to “pay attention and take note: Many of us will vote this November and many others will cast their ballots in 2020.”

Other students, meanwhile, see the walkout as an opportunity to push for reform on the local level. During a town hall on gun violence held by Mayor de Blasio last week, several students voiced objections to the presence of metal detectors and overzealous police personnel within their schools — 91 schools currently have metal detectors, and the NYPD’s school safety division includes around 5,200 safety officers and police officers. In response to these concerns, the mayor was “dismissive,” and “curved every question that had to do with metal detectors, safety officers and community of color,” according to Andrea Colon, a senior at Rockaway Park High School For Environmental Sustainability and organizer with the Rockaway Youth Task Force.

Colon’s hope for the walkout, she says, is to bring attention to what the city’s attempts to curb gun violence actually look like in practice. “It’s dehumanizing to walk through scanners every day, or to see police officers with guns in our cafeterias,” Colon tells the Voice. Meanwhile, her school has 300 students and only two guidance counselors — one of whom, Colon says, recently admitted that she didn’t have the capacity to deal with mental illness. If the city divests from “prison-like security,” Colon says, it might be able to improve its mental health resources, something she feels would be far more effective at reducing the likelihood of a mass shooting.

When Colon joins thousands of other teenagers in walking out of school on Wednesday, she’ll be doing so for both federal gun control and city-level changes to her community — and with a set of demands she intends to keep working toward long after returning to the classroom. “The older generation still sees us as young kids who don’t know what we’re doing,” she says. “But they have to realize that we’re not afraid to raise our voices now, and we know what we want.”


City to Spend $30,000 Apiece on Anti-Terror Bollards

In response to two high-profile car-ramming attacks in Manhattan last year, the city is embracing a new $50 million weapon in the War on Terror: metal posts.

On Tuesday, Mayor Bill de Blasio announced that 1,500 of the three-foot-tall posts, known as bollards, will soon be coming to highly trafficked sidewalks and pedestrian plazas throughout the city. The permanent structures will replace the concrete barriers hastily erected in parts of the city following last year’s major incidents — a drug-fueled rampage in Times Square that killed one person and injured twenty-two, and an ISIS-inspired attack on the Hudson River Greenway on Halloween that left eight dead and twelve injured.

“When someone with a vehicle plows into a group of innocent pedestrians, it’s disgusting, but we know there are some out there who mean to do us evil, and we will protect against it,” the mayor said at a press conference in Times Square. “This major investment will help us to be even safer going forward.”

How, exactly, the city plans to invest $50 million in squat posts remains unclear. According to a City Hall press release, the concrete structures installed after last year’s incidents will soon be replaced by “more attractive temporary blocks,” which will in turn be switched out for the 1,500 permanent bollards beginning in March. The vast majority of new bollards will be the familiar metal posts, mayoral spokesperson Austin Finn told the Voice, while others will be unspecified “geometric structures.” All told, the city will wind up paying more than $30,000 per bollard. (The mayor did not take questions at the press conference, and the Voices request for a price breakdown, and a list of sites where the bollards will be erected, went unanswered.)

Following Tuesday’s announcement, critics seized on the outsize figure and drew parallels to runaway prices for subway construction recently detailed in the New York Times. Others noted that installing 500 bollards in Las Vegas is estimated to cost $2.5 million, or a more reasonable $5,000 per post. While Jon Coaffee, a professor of urban geography at the University of Warwick, cautions against simple comparisons, noting that moving underground infrastructure could cause varying challenges for different cities, he also says that the average cost of a bollard should be a few thousand dollars.

Looking past the price tag, New Yorkers, and Americans in general, should get used to seeing more of these security barriers in busy areas. According to Coaffee, metal bollards are “incredibly effective at stopping vehicles from entering urban spaces,” and have thus become a “default option” for cities hoping to combat potential terrorists.

“They also undoubtedly perform an element of security theater,” adds Coaffee. “They are a way of conveying, in a very physical sense, that governments are doing something to thwart the terrorist threat, or at least mitigate its impacts.”

But efforts to convey that message with ubiquitous security structures have not always been welcomed by city residents. Anti-terror bollards installed last summer in Melbourne, Australia, were widely regarded as an unnecessary eyesore, and were subsequently covered in paint and fabric as part of a #bollart protest. Though Coaffee says the “continuing ‘bollardification’ of [American] cities” has yet to spark similar protests, Tuesday’s announcement is already stoking anger among some pedestrian advocates.

“The idea of hardening our cities against terrorists with vehicle barricades is as preposterous as it is futile,” Jeff Speck, a city planner and author of Walkable City: How Downtown Can Save America, One Step at a Time, tells the Voice. “The antiterrorism industrial complex has completely warped our national conversation about public safety. Why have we thrown untold trillions of dollars at a threat that is, at last measure, 568 times less deadly than car crashes?”

Beyond being concerned about letting the terrorists win, some worry that the bollards could wind up encroaching on already limited pedestrian space. It’s of particular concern in Times Square, through which some 355,000 people walk each day. “What you don’t want to do is trap people in a large crowded area,” warns Walter Enders, a security expert and University of Alabama economics professor. “You need to give people, some of whom are older or not agile, the ability to enter and exit that area without getting pushed.”

Still, there are opportunities for the new bollards to serve the city’s pedestrians in ways not mentioned in de Blasio’s thinly detailed plan. While the mayor remains opposed to congestion pricing (and frames his own congestion-easing measures as a strategy for increasing driver speeds), it’s not inconceivable that the plan could pave the way for more pedestrian-only spaces in vulnerable parts of midtown or Lower Manhattan. Consider that Governor Andrew Cuomo is slated to endorse a widely backed congestion pricing plan, and the prospect of our SUV-loving mayor restricting cars from certain crosstown blocks becomes a bit easier to imagine.

For now, at least, the bollards will eliminate those enormous cement barriers haphazardly dropped throughout the city over the last year. That may not be worth $50 million, but it’s worth something.


What We Can Learn From Europe’s Response to Terror

One week ago today, Uzbek national Sayfullo Saipov drove a van through the two-lane West Side Highway bike path, killing eight people and injuring twelve others. It was the latest in a series of low-tech attacks with vehicles that have ramped up in the wake of the Islamic State’s recent decline: About 130 people have been killed in vehicle-ramming attacks in Germany, Sweden, Spain, Britain, and France. Vans or cars are easier to obtain than the chemicals to make bombs, and require fewer skills to operate, making them particularly hard to defend against, experts say.

While President Donald Trump called Saipov an “animal,” and promised to get rid of the Diversity Visa Lottery Program that allowed Saipov to enter the United States, his European counterparts have mostly called for unity in the wake of similar attacks. After 13 people were killed by a van on Las Ramblas boulevard in Barcelona, Spain, in August, Spanish prime minister Mariano Rajoy joined hundreds of thousands of people marching for peace, and against islamophobia. In Nice, France, where 84 people were killed in July 2016 by a 19-ton truck, which zigzagged through the crowds celebrating Bastille Day, a national holiday, leaders lauded #PortesOuvertesNice (“OpenDoorsNice”), a social media campaign that offered shelter to stranded passersby.

At the same time, European leaders have been quick to install barriers, such as bollards — vertical posts that prevent vehicles from entering — as their go-to measure to protect against vehicle-ramming attacks in Nice, Madrid, and London. But, as their numbers increase — changing the landscape and freedom of movement of cities, prompting artists in Europe to stage bollard protests and encourage rejecting what they say is a culture of fear — experts have urged adopting more measured ways of coping with urban terrorism.

New York has already seen its first infrastructure response to last week’s attack. On Thursday, the city began installing barriers at 57 intersections along the West Side bike path, where they will prevent any cars from entering. “These concrete barriers are a short-term solution that will better protect bikers, walkers, runners, and all New Yorkers — and DOT is moving forward expeditiously to develop a permanent solution that will enhance security while allowing emergency vehicles to do their jobs,” Cathy Calhoun, acting commissioner and chief of staff of the New York State Department of Transportation (DOT), said in an emailed statement Friday.

The new barriers are not without controversy. After a car jumped the sidewalk and mowed over pedestrians at Times Square in May, killing one woman, city officials placed more barriers at strategic points across the city — Times Square, Herald Square — to protect against vehicle-ramming attacks. “They’re ugly,” a NYPD counterterrorism officer posted at Herald Square told me last Wednesday, looking at the five 4,000-pound concrete blocks covered in plain blue mats and yellow lettering. But, he added, “You’ll see more of them.”

[related_posts post_id_1=”566027″ /]

Herald Square is very much what terrorism experts call a “soft target”: tourists sitting at the red tables on yellow chairs, taking a break from shopping, checking their phones in the glow of storefront lighting. But in the longer term, says Jon Coaffee, visiting professor of urban geography at New York University’s Center for Urban Science and Progress, “it is imperative that we begin to think beyond bollards and embrace effective urban designs that are less obtrusive, and which have other benefits to the public realm — flower pots, benches, etc. — but which still retain hostile vehicle mitigation functionality.”

Other cities have already warned of how too many bollards could harm the social fabric of a city. In Melbourne, Australia, where six people were killed by a driver in January, as well as in Milan and Edinburgh, Scotland, artists have rallied at #boll-art protests, covering the blocks in bright fabrics, graffiti, or paint, to draw attention to this risk. At Westminster Bridge in London, where five people were killed in a van attack in June, security railings or fences were placed. Madrid chose to install flower pots. (Barcelona decided to use barriers only during Christmas and other high-risk times.) In Copenhagen, Denmark, authorities discussed planting trees instead of cement barriers. At the Promenade des Anglais, the site of the truck attack in Nice, officials placed 190 bollards between 0.8 miles of steel cables in fortified cement. Parisians opted for a more esthetically pleasing solution: At the Eiffel Tower, where visitors used to roam freely, a bullet-proof glass wall will be built.

“[Possible targets] cannot all be defended without making the city look as if it is under siege through the ubiquitous use of barrier security and high-visibility policing,” Coaffee says.

What renders vehicle attacks more difficult to protect against can also make their victims harder to mourn publicly. Whereas the September 11, 2001, attack changed the landscape of the city, vehicle attacks lack a similar sense of place, says Katherine Brown, a counterterrorism expert at the University of Birmingham.

“These are quite mundane sites — they’re bridges, sidewalks, they’re the everyday,” Brown says. “So to recognize when those places became less than everyday, when they became traumatic places, is really important.”

At London’s Westminster Bridge, people left sticky notes with messages of support on an improvised memorial wall after someone left a box with Post-it notes and pens for passersby to use. In Barcelona, arrangements of flowers, drawings, and candles grew in concentric circles on Las Ramblas. In New York last week, people adorned a “ghost bike” with bouquets of white carnations and gypsophila, and a single red rose. Failing urban commemoration, one’s own body can mark healing: After attacks in Paris and Manchester, England, tattoos of bees — Manchester’s symbol — and the phrase “Fluctuat nec mergitur” (“Shaken but not sunk”) — Paris’s Latin motto — became popular.

On Wednesday, twelve bouquets, a hat, and an envelope were left at a makeshift memorial on the West Side Highway. A Belgian flag was attached to a steel barrier. A park officer told me she had comforted the family of a 31-year-old Belgian woman, Ann-Laure Decadt, who was among the eight victims killed in the attack last week. The officer told me she held Decadt’s mother in one arm, her sister in the other, as Decadt was lifted into an ambulance. “Please don’t tell me that my baby is gone!” her mother said. Her sister screamed: “Please tell me she is going to be all right!” The officer also told me that Decadt’s mother, who lives in the small Belgian town of Staden, and was on vacation in New York, asked her: “Why did we come here?”

In Western Europe, the recent attacks have also led to crackdowns on civil liberties. Last week, two years after the attack by gunmen and suicide bombers on multiple targets in Paris killed 130 people, the French government finally ended its state of emergency, which had given security officials powers previously available only to their American counterparts, such as wiretapping and wider search and raid powers. But it replaced the emergency rule with a new law human rights advocates say is “abusive,” allowing officials to comb areas within a large perimeter without a judge’s order, making it easier to place individuals under house arrest and to close mosques suspected of inciting violence, and enshrining other provisions of the emergency state into law.

Meanwhile, Brussels, the European Union capital, voted in February to deport foreign residents on the sole suspicion of terrorist activity, without the involvement of a judge. And the EU itself, capitalizing on fears that jihadists could return amid the flows of refugees entering the EU through Greece, last year forged a deal that discouraged people from taking that route, leaving nearly 3 million people — many from war zones in Syria, Iraq, and Afghanistan — stuck in Turkey, according to rights groups, with nowhere else to go.

[related_posts post_id_1=”418503″ /]

The United States now faces similar choices, with Trump threatening the diversity visa program — which since 1995 has granted about 50,000 visas a year to applicants from countries that are underrepresented in the U.S.’s immigration mix — and continuing to press for a ban on immigrants from Muslim nations. In the U.S., as in the EU, such measures — which are discriminatory, and, legal experts say, unlawful — reflect a wider choice between quelling fear and maintaining an open, democratic society in the face of urban terrorism.

“I don’t think you can stop these attacks,” says Brown, the counterterrorism expert at the University of Birmingham. “The cost of trying to prevent every single attack isn’t worth it, because the cost is to our way of life.” On Wednesday, New Yorkers went out to celebrate Halloween, drawing the usual huge crowds, and on Sunday, more than 50,000 people ran the marathon.

“Cities have to live,” Brown adds, noting that the New Yorker attitude of carrying on regardless can provide a sense of security for visitors as well. It might not be as obvious a counterterrorism measure as a concrete barrier, she says, “but it’s actually those things that give people resilience — it’s that coming together, activities that create a sense of shared belonging, shared ownership, and a shared city.”