Classified Records of Congress: an Overview
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Proposed Authorities of a National Intelligence Director: Issues for Congress and Side-By-Side Comparison of S
Order Code RL32506 CRS Report for Congress Received through the CRS Web The Proposed Authorities of a National Intelligence Director: Issues for Congress and Side-by-Side Comparison of S. 2845, H.R. 10, and Current Law Updated October 5, 2004 -name redacted- Specialist in Intelligence and National Security Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress The Proposed Authorities of a Director of National Intelligence: Issues for Congress, and Side-by-Side Comparison of S. 2845, H.R. 10, and Current Law Summary The 9/11 Commission, in its recent report on the attacks of September 11, 2001, criticized the U.S. Intelligence Community’s (IC) fragmented management structure and questioned whether the U.S. government, and the IC, in particular, is organized adequately to direct resources and build the intelligence capabilities that the United States will need to counter terrorism, and to address the broader range of national security challenges in the decades ahead. The Commission made a number of recommendations, one of which was to replace the current position of Director of Central Intelligence (DCI) with a National Intelligence Director (NID) who would oversee national intelligence centers on specific subjects of interest — including a National Counterterrorism Center (NCTC) — across the U.S. government, manage the national intelligence program; oversee the agencies that contribute to it; and have hiring, firing, and budgetary authority over the IC’s 15 agencies. Although the Commission recommended that the director be located in the Executive Office of the President, the Commission Vice Chairman in testimony before Congress on September 7, 2004, withdrew that portion of the recommendation in light of concerns that the NID would be subject to undue influence. -
Intelligence Legalism and the National Security Agency's Civil Liberties
112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. -
(U) Cryptologic Almanac 5Qth Anniversary Series
309855~ DOCID: Declass1_1ad and approved for release by NSA on 9 January 2007, pursuant to E.O. 12958, as amended. MDR-51909 (U) Cryptologic Almanac 5Qth Anniversary Series (U) The Time Of Investigations, Part 2 of 2 (U) SYNOPSIS: Stimulated by a climate of mistrust, a Senate committee chaired by Frank Church of Idaho investigated allegations of misdeeds by the U.S. intelligence community. After a period of adjustment, the committee and NSA learned to work together. The Church Committee substantiated charges that NSA had maintained "Watch Lists" of U.S. citizens and had a secret program to obtain copies of telegrams from private cable companies. The committee warned against NSA's potential for abuse and recommended legislation to protect American rights. (U) NOW, ON WITH OUR STORY. PIKE COMMITTEE (U) If the Church Committee and NSA learned to get along after an initial period of uneasiness, this did not happen with two other congressional committees that investigated NSA. (U) About the same time that the Senate established the Church Committee, the House of Representatives voted for a similar committee, under Otis Pike (D, NY). From the start, this committee had a broader mandate to investigate the entire intelligence community; in fact, it was set up not only to investigate alleged abuses but also to look at operational effectiveness and programming and budget issues. (U//FOUO) Some NSA seniors had already had less than positive experiences with Representative Pike. He had led a subcommittee investigating the PUEBLO incident of 1968; the subcommittee had leaked confidential testimony of then DIRNSA Marshall Carter to the press, angering many officials. -
Congressional Oversight of Intelligence: Background and Selected Options for Further Reform
Congressional Oversight of Intelligence: Background and Selected Options for Further Reform December 4, 2018 Congressional Research Service https://crsreports.congress.gov R45421 SUMMARY R45421 Congressional Oversight of Intelligence: December 4, 2018 Background and Selected Options for Further Michael E. DeVine Reform Analyst in Intelligence and National Security Prior to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) in 1976 and 1977, respectively, Congress did not take much interest in conducting oversight of the Intelligence Community (IC). The Subcommittees on the Central Intelligence Agency (CIA) of the congressional Armed Services Committees had nominal oversight responsibility, though Congress generally trusted that IC could more or less regulate itself, conduct activities that complied with the law, were ethical, and shared a common understanding of national security priorities. Media reports in the 1970s of the CIA’s domestic surveillance of Americans opposed to the war in Vietnam, in addition to the agency’s activities relating to national elections in Chile, prompted Congress to change its approach. In 1975, Congress established two select committees to investigate intelligence activities, chaired by Senator Frank Church in the Senate (the “Church Committee”), and Representative Otis Pike in the House (the “Pike Committee”). Following their creation, the Church and Pike committees’ hearings revealed the possible extent of the abuse of authority by the IC and the potential need for permanent committee oversight focused solely on the IC and intelligence activities. SSCI and HPSCI oversight contributed substantially to Congress’s work to legislate improvements to intelligence organization, programs, and processes and it enabled a more structured, routine relationship with intelligence agencies. -
Keeping the US Hand Well Hidden: the Role of the Church Committee in Rethinking US Covert Intervention in the 1970S
Keeping the US Hand Well Hidden: The Role of the Church Committee in Rethinking US Covert Intervention in the 1970s Julia Kropa A thesis submitted in partial fulfillment of the requirements for the degree of BACHELOR OF ARTS WITH HONORS DEPARTMENT OF HISTORY UNIVERSITY OF MICHIGAN April 2, 2018 Advised by Professor Victoria Langland TABLE OF CONTENTS Acknowledgments…………………………………………………………………………..ii Timeline……………………………………………………………………………………iii Introduction…………………………………………………………………………………1 Chapter 1: US Covert Involvement and the Death of General Schneider…………………14 The Election of 1970 and Escalation of US Involvement…………………………16 Creating an Atmosphere of Overthrow……………………………………………26 The Aftermath of General Schneider’s Death……………………………………..37 Chapter 2: The Formation of the Church Committee……………………………………..42 The Origins of the Church Committee…………………………………………….45 White House Opposition to the Church Committee……………………………….59 The Committee’s Purpose for Investigating Assassination Plots………………….66 Chapter 3: The Church Committee Investigates Assassination Plots……………………..70 The Church Committee’s Investigation…………………………………………...73 The Investigation Reaches the White House………………………………………81 The Committee’s Interim Report and its Findings………………………………...91 Conclusion…………………………………………………………………………………96 Appendix 1……………………………………………………………………………….102 Appendix 2……………………………………………………………………………….107 Bibliography……………………………………………………………………………...109 i Acknowledgments First and foremost, thank you to my advisor, Professor Victoria Langland, for her guidance and encouragement at every stage of this project from my initial thoughts to the end product. I would like to thank the LSA Honors Program and the History Department for generously providing funding for my research and writing. I am also thankful to my writing group, Maggie and Noah, for reading my many drafts and offering feedback at every step in the process. Many thanks to Emily for listening to me for a year and a half talking and brainstorming out loud, and for forcing me to always keep on working. -
The Freedom of Information Act and the Fight Against Secret (Surveillance) Law, 55 Santa Clara L
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara Law Review Volume 55 | Number 1 Article 4 10-7-2015 The rF eedom of Information Act and the Fight Against Secret (Surveillance) Law Mark Rumold Follow this and additional works at: http://digitalcommons.law.scu.edu/lawreview Recommended Citation Mark Rumold, The Freedom of Information Act and the Fight Against Secret (Surveillance) Law, 55 Santa Clara L. Rev. 161 (2015). Available at: http://digitalcommons.law.scu.edu/lawreview/vol55/iss1/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara Law Review by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. THE FREEDOM OF INFORMATION ACT AND THE FIGHT AGAINST SECRET (SURVEILLANCE) LAW Mark Rumold* TABLE OF CONTENTS Introduction ........................................................................... 161 I. The Secret Story of Section 215 ......................................... 164 II. The Problem of Secret (Surveillance) Law and the Traditional Ways to Avoid It ....................................... 169 A. The Problem of Secret (Surveillance) Law ........... 169 B. Traditional Ways of Avoiding Secret Law and Their Shortcomings: Congressional Investigation, Discovery, Leaks, and FOIA .......... 172 1. Congressional Investigation ............................ 172 2. -
Bansemer: Intelligence Reform: a Question of Balance
Brig Gen Kenneth Newton Walker Kenneth Walker enlisted at Denver, Colorado, on 15 December 1917. He took flying training at Mather Field, California, getting his commission and wings in November 1918. After a tour in the Philippines, he returned to Langley Field, Virginia, in February 1925 with a subsequent assignment in December 1928 to attend the Air Corps Tactical School. Retained on the faculty as a bombardment in- structor, Walker became the epitome of the strategic thinkers at the school and coined the revolutionary airpower “creed of the bomber”: “A well-planned, well-organized and well-flown air force attack will constitute an offensive that cannot be stopped.” Following attendance at the Command and General Staff School at Fort Leavenworth, Kansas, in 1933 and promotion to major, he served for three years at Hamilton Field, California, and another three years at Luke Field, Ford Island, and Wheeler Field, Hawaii. Walker returned to the United States in January 1941 as assistant chief of the Plans Division for the chief of the Air Corps in Washington, DC. He was promoted to lieutenant colonel in July 1941 and colonel in March 1942. During this time, when he worked in the Operations Division of the War Department General Staff, he coauthored the air-campaign strategy known as Air War Plans Division—Plan 1, the plan for organizing, equipping, deploying, and employing the Army Air Forces to defeat Germany and Japan should the United States become embroiled in war. The authors completed this monu- mental undertaking in less than one month, just before Japan attacked Pearl Harbor—and the United States was, in fact, at war. -
523696 REF ID:A523696 {U) Chapter 16 Cryptology and the Watergate
DOCID: 523696 REF ID:A523696 lOP SECRET I::JMBM {U) Chapter 16 Cryptology and the Watergate Era (U) BACKGROUND TO SCANDAL (U) The greatest political scandal in American history originated with an obscure note in the Metro seetion of the Washington Post on Sunday, June 18, 1972. In it, two ~etro . section reporters, Bob Woodward and Carl Bernstein, cove~ed what appeared to be an amateurish break-in at the Democratic National Headquarters in the Watergate Hotel in downtown Washington. (U) The Nixon administration managed to cover over the politi~l effects of the break-in until after the elections in Novem~r. But when Congress returned in January, it was ready to investigate. In February 1973, the Senate voted to establish a Select Committee, commonly referred to as the Ervin Committee after Senator Sam Ervin, Democratic senator from North Carolina, to hold hearings. At the time, no one associated with the committee knew where they would get information, since the administration was keeping a tight lip, and· the . Watergate burglars weren't•talking. But on March 23, one of the burglars, James McCord, turned state's evidence: The federal judg~, John Sirica, had been pressuring the defendants by threatening lengthy prison terms if they did not cooperate. Now McCord was cooperating, and the entire thing began to unravel. The president, concerned with get~g on with his second term. tried to shush the (U) Prealclent Nixon an4 hlalDner circle, 1973 whole thing. (U) The scandal, of course, would not shush. Instead, it mushroomed, swallowing first Nixon's White House staff', then much of his cabinet, and imally the president himself. -
A Practical History of USA PATRIOT Act Section 215
Counterintelligence and Access to Transactional Records: A Practical History of USA PATRIOT Act Section 215 Michael J. Woods* The USA PATRIOT Act1 has sparked intense public debate, with proponents claiming that the Act is a necessarily hard-minded response to a national crisis,2 while opponents see unwarranted, even opportunistic, expansion of state power.3 Perhaps no provision of the Act has generated more controversy than §215, which authorizes the FBI to seek a court order compelling the production of “any tangible things” relevant to certain counterintelligence and counterterrorism investigations.4 Like many other provisions of the USA PATRIOT Act, §215 will expire on December 31, 2005, unless reauthorized by Congress.5 The controversy, therefore, is likely to intensify over the coming months. The rhetoric swirling about this provision has been extreme, despite the paucity of evidence that it has ever actually been used6 – which suggests that the section is neither the deadly threat to civil liberties nor the vital operational * The author is a former chief of the FBI’s National Security Law Unit. He later served as Principal Legal Advisor to the National Counterintelligence Executive. The views expressed in this article are his own and do not necessarily reflect the position of any U.S. government component. 1. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. No. 107-56, 115 Stat. 272. The name of the Act became controversial almost immediately. See H.R. REP. NO. 107- 236(I), at 433 (2001) (comments of Rep. -
1 Supervising America's Secret Foreign Policy: A
SUPERVISING AMERICA’S SECRET FOREIGN POLICY: A SHOCK THEORY OF CONGRESSIONAL OVERSIGHT Loch K. Johnson University of Georgia You see, the way a free government works, there’s got to be a housecleaning every now and then . .i —Harry S. Truman Introduction The framers of the Constitution established a government for the United States based on the notion of sharing powers among the three branches of government: the executive, the legislative, and the judiciary. The idea was to prevent any one branch from becoming too powerful and, as a consequence, dangerous to citizens through an abuse of authority—a core principle of American government that applies to both foreign and domestic policymaking.ii This principle is put to a rigorous test in times of national emergency, when there is a tendency to concentrate power in the hands of president and other officials in the executive branch. The nation’s most egregious abuses of power have occurred under such circumstances. Examples in the modern era include the confinement of Japanese-Americans to guarded camps, as a result of an executive order from President Franklin D. Roosevelt during the Second World War; Roosevelt’s sweeping use of executive agreements to move the United States towards entry into 1 that war; the expansive use of the war powers by President Harry S. Truman and Dwight D. Eisenhower in the early stages of the Cold War; President Lyndon B. Johnson’s misleading of the American people about the poor progress of the war in Vietnam; the preparation by the Nixon Administration of a -
Spies, Civil Liberties, and the Senate: the 1975 Church Committee
Spies, Civil Liberties, and the Senate: The 1975 Church Committee Doctorate of Philosophy Department of History Dafydd Townley May 2018 Abstract This research examines the relationship between US public opinion and national security policy. The focus of this study is the role that public opinion played during the Year of Intelligence, the sixteen-month investigation by Congress into alleged domestic abuses by the US intelligence community. The period, between January 1975 and April 1976, saw the innermost secrets of various US intelligence agencies laid bare before the world as a result of televised public hearings and investigative journalism. The research analyses what both President Gerald R. Ford and Congress defined as public opinion, and how they used such information to shape their strategic decisions concerning national security. The study investigates the ways in which Congress responded to public opinion during the creation of the Church Committee, and how great an influence public opinion had on the objectives and methods of the Church Committee investigation. The research also assesses whether the Church Committee fulfilled its obligations the Senate and the American public and considers the criticism that some contemporaries and academics have levelled at the committee’s chairman, Senator Frank Church of Idaho. Using extensive archival evidence supported by oral history interviews, the research identifies that public opinion played an important role during the Year of Intelligence and, as a consequence, national security policy. The significance of the role is clearly illustrated by the research’s contrast of the failure of the Ford administration to achieve any of its strategic objectives, and the success of Congress in gaining substantial reform to congressional oversight of the intelligence community. -
COINTELPRO: the Untold American Story
COINTELPRO: The Untold American Story By Paul Wolf with contributions from Robert Boyle, Bob Brown, Tom Burghardt, Noam Chomsky, Ward Churchill, Kathleen Cleaver, Bruce Ellison, Cynthia McKinney, Nkechi Taifa, Laura Whitehorn, Nicholas Wilson, and Howard Zinn. Presented to U.N. High Commissioner for Human Rights Mary Robinson at the World Conference Against Racism in Durban, South Africa by the members of the Congressional Black Caucus attending the conference: Donna Christianson, John Conyers, Eddie Bernice Johnson, Barbara Lee, Sheila Jackson Lee, Cynthia McKinney, and Diane Watson, September 1, 2001. Table of Contents Overview Victimization COINTELPRO Techniques Murder and Assassination Agents Provocateurs The Ku Klux Klan The Secret Army Organization Snitch Jacketing The Subversion of the Press Political Prisoners Leonard Peltier Mumia Abu Jamal Geronimo ji Jaga Pratt Dhoruba Bin Wahad Marshall Eddie Conway Justice Hangs in the Balance Appendix: The Legacy of COINTELPRO CISPES The Judi Bari Bombing Bibliography Overview We're here to talk about the FBI and U.S. democracy because here we have this peculiar situation that we live in a democratic country - everybody knows that, everybody says it, it's repeated, it's dinned into our ears a thousand times, you grow up, you pledge allegiance, you salute the flag, you hail democracy, you look at the totalitarian states, you read the history of tyrannies, and here is the beacon light of democracy. And, of course, there's some truth to that. There are things you can do in the United States that you can't do many other places without being put in jail. But the United States is a very complex system.