Ellen Schrecker Mccarthyism: Political Repression and the Fear of Communism

Total Page:16

File Type:pdf, Size:1020Kb

Ellen Schrecker Mccarthyism: Political Repression and the Fear of Communism Ellen Schrecker McCarthyism: Political Repression and the Fear of Communism THE 28-YEAR-OLD SEAMAN WAS PUZZLED. LAWRENCE PARKER HAD BEEN forced off his job as a waiter on the S.S. President Qeveland in February 1951 as a "poor security risk," but had not been told why. This was not the first time he had been barred from the waterfront under the federal government's Port Security Program. But with the help of his union, he had appealed his earlier removal and was reinstated. "I just can't under- stand it at all," Parker told the Coast Guard official who was conducting his hearing. "I would like to have some reason or something definite I would hke to know whether I will be able to work." Unfortunately, as his attorney explained, Parker could not clear his record because "there are no facts which have been alleged an}^where ... to give him any knowledge of the charges on which the conclusion of a poor security risk is based. Therefore, it is impossible for him to respond adequately to the charges."^ Unemployable since being identified as a security risk, Parker was desperate to clear up his case and go back to sea, but as long as his status was unresolved, he could not even draw unemployment.^ Parker's encounters with the Alice in Wonderland world of the West Coast Port Security Program were not unique. Nearly 3,800 seamen and dockworkers lost their jobs under this little-known program that had been established in the immediate aftermath of the Korean War {Report of the Commission on Government Security, 1957: 333). Parker suspected that his vocal support for the left-wing Maritime Cooks and social research Vol 71 : No 4 : Winter 2004 1041 Stewards Union may have triggered his removal, but the vagueness of the charges and the refusal of the authorities to give him any specific information about who had launched them made it impossible for him to rebut them.^ Parker's attorney handled dozens of similar cases: union activists in a number of occupations, many of them African Americans like Parker, deprived of their livelihoods on the basis of secret charges by unknown informers."* Ultimately, these screened maritime work- ers were reinstated when the Ninth Circuit Court of Appeals ruled in 1955 in Parker's favor on the grounds that he should be allowed to see the evidence against him and confront his accusers (Parker v. Lester 227 F.2d 708). It was a paper victory, however, for the fiercely anticommu- nist maritime unions that were by then handling most waterfront jobs refused to let the previously screened seamen ship out.^ The story of Lawrence Parker shows us how the anticommunist political repression that we now call McCarthjdsm operated. Today, as we confront the post-9/11 assault on individual rights, it is clear that what happened in the 1940s and 1950s was no aberration but the all too common reaction of a nation that seeks to protect itself by turning against its supposed enemies at home. Obviously, the current crack- down is not a replay of the McCarthy era. Nonetheless, an examination of that earlier moment should help us understand how political repres- sion and the fear that makes it work can take hold within a modern democratic polity like the United States. Significantly, that repression requires no violence, nor—even though it usually suppresses political dissidents—is it always handled by the state. In fact, as we shall see, it is the collaboration of public and private actors that makes American political repression so effective. MCCARTHYISM: AN OVERVIEW It is by now a truism to note that McCarthyism encompasses much more than the antics of a single senator. Joe McCarthy's contributions to the political witch hunt were far from trivial, but by the time he joined the anticommunist crusade early in 1950, the movement to which he gave his name had been going strong for several years and 1042 social research would continue for several more even after he left the political scene. Nor, despite his notoriety, was he the most infiuential of the nation's Cold War redbaiters. That honor belongs to the FBI's J. Edgar Hoover. Still, despite its inaccuracy, the term "McCarthyism" has passed into general usage as a s5Tionym for the anticommunist political repression of the early Cold War. It sticks because of its literary convenience and historical specificity. It is equally misleading to assume that McCarthyism was a single phenomenon. In reality, there were many McCarthyisms, each with its own agenda and modus operandi. There was the ultraconserva- tive version peddled by patriotic groups and right-vdng activists that manifested itself in campaigns like the one in Texas that tried to purge textbooks of favorable references to the UN. There was also a liberal version that supported sanctions against Communists, but not against non-Communists, and there was even a left-wing version composed of anti-Stalinist radicals who attacked Communists as traitors to the socialist ideal.^ In addition, there was a partisan brand of McCarthyism, purveyed by ambitious politicians like Richard Nixon and Joe McCarthy who hoped to further their own careers and boost the Republican party. Local politicos, patriots, and businesspeople brought more parochial concerns to the Cold War red scare.^ All, however, sought in one way or another to protect the nation against the threat of domestic commu- nism. And all contributed in one way or another to the overall success of the anticommunist crusade. As the maritime unions' blacklisting of previously screened sailors and dock workers revealed, the diffuse nature of that crusade increased its power. McCarthyism was to become the longest lasting and most widespread episode of political repression in modem American history precisely because of its diversity. Yet, despite its heterogeneous character, McCarthyism did not well up from below. It may have been a popular movement, but it was not a populist one. It began in Washington, D.C., and then spread to the rest of the country. The federal government was the crucial actor here; its activities transformed the Communist party from an unpopu- lar political group into a perceived threat to the American way of life. McCarthyism 1043 But the government's campaign against communism was not mono- lithic. Different branches adopted different and sometimes competing strategies for handling the communist threat. That competition simply intensified the anticommunist furor as politicians and bureaucrats struggled to gain attention or to ensure that they would not be seen as coddling Communists or worse. Central to the process was a stra- tegically situated network of full-time anti-Communists like J. Edgar Hoover who had dedicated themselves to eliminating communism firom all positions of influence in American life. Some of these people were in the govemment, some outside. Politicians, bureaucrats, jour- nalists, and professional witnesses, they knew each other and collabo- rated in a surprisingly self-conscious manner.* Together they managed to structure much of the campaign against domestic communism and bring it to the forefront of American political life once the Cold War made it salient. As the travails of Lawrence Parker and his maritime colleagues reveal, the machinery that these people constructed was deeply fiawed. If nothing else, the political repression of the late 1940s and 1950s, like that of today, was marked by serious violations of due process. Secrecy and unfairness may well be essential to political repression— though as Corey Robin shows, they are not invariably involved (Robin, 2004). Whether it was reflising to let people confront their accusers or forcing witnesses to inform on others or illegally bugging people's homes and offices, almost every criminal prosecution, congressional investigation, loyalty-security hearing, and political surveillance of the McCarthy era infringed on individual rights. Had the courts been more vigilant in protecting those rights, many of these repressive activities might not have occurred. As it turned out, when the judiciary finally began to recover its backbone in the mid-fifties, it came to insist on a modicum of due process and thus brought many of those activities to a halt.9 Although a victim of political repression, Lawrence Parker did not face a firing squad or go to jail. He lost his job. Economic sanc- tions allowed McCarthyism to stifie political opposition almost as effec- 1044 social research tively as more overt forms of coercion. That kind of coercion existed, to be sure. Criminal prosecutions sent a few hundred people to prison and two—-Julius and Ethel Rosenberg—to the electric chair, while offi- cial proceedings like congressional hearings or IRS audits damaged left-wing unions and other organizations by harassing their leaders and diverting their resources to self-defense. But most of the men and women affected by the McCarthy era political repression were, like Lawrence Parker, ordinary workers who found themselves unemployed and often blacklisted because they had associated with the Communist party or the many so-called "front groups" within its penumbra. These sanctions—or more commonly the fear of them—^were sufficient to keep people from joining the Left or advocating unpopular positions in public. The imposition of the McCarthy-era economic sanctions was a collaborative process. The federal government led the way, with the Truman administration's loyalty-security program creating a template that other governments and private employers were quick to copy. While such programs sometimes made it possible to fire people outright, most of the time these sanctions operated in accordance with a two-stage procedure. First, the alleged Communists were identi- fied; then, they were fired. The first stage was usually handled by an official body like a congressional investigating committee or the FBI, while a public or private employer took care of the second.
Recommended publications
  • A Legacy of Advocacy Is Born As AAI Confronts Mccarthyism
    AAI LOOKS BACK A Legacy of Advocacy Is Born as AAI Confronts McCarthyism by Bryan Peery and John Emrich Today, across-the-board cuts in federal funding for scientific research threaten to drive leading scientists overseas and deter the next generation from entering scientific professions. Sixty years ago, scientists had similar concerns for their own funding, albeit for very different reasons. lthough federal spending forf the business meeting late Awas on the rise in the ini the afternoon on Tuesday, decades immediately following AprilA 13. Rumors that the U.S. the Second World War, it was also PublicP Health Service (USPHS), the height of the Second Red whichw administered National Scare associated with Senator InstitutesI of Health (NIH) grants, Joseph McCarthy (R-WI), and wasw blacklisting scientists on scientists faced the possibility of politicalp grounds had circulated having their individual funding amonga attendees during the withheld on the basis of mere firstfi two days of the Federation rumor or innuendo about their ofo American Societies for past political associations. ExperimentalE Biology (FASEB) In this political climate, meeting.m Disturbed by these scientists increasingly turned rumors,r Michael Heidelberger Members off the HouseHouse Un-AmericanUn American ActivitiesActivities to their professional societies (AAI( ’35, president 1946–47, Committee outside of Chaiman J. Parnell Thomas’s 1948–49) brought the matter to defend their interests before home (l-r): Rep. Richard B. Vail, Rep. Thomas, Rep. John policy makers. The leadership McDowell, Robert Stripling (chief counsel), and Rep. to the floor of the business of the American Association of Richard M. Nixon meeting.
    [Show full text]
  • J. Edgar Hoover, "Speech Before the House Committee on Un‐American Activities" (26 March 1947)
    Voices of Democracy 3 (2008): 139‐161 Underhill 139 J. EDGAR HOOVER, "SPEECH BEFORE THE HOUSE COMMITTEE ON UN‐AMERICAN ACTIVITIES" (26 MARCH 1947) Stephen Underhill University of Maryland Abstract: J. Edgar Hoover fought domestic communism in the 1940s with illegal investigative methods and by recommending a procedure of guilt by association to HUAC. The debate over illegal surveillance in the 1940s to protect national security reflects the on‐going tensions between national security and civil liberties. This essay explores how in times of national security crises, concerns often exist about civil liberties violations in the United States. Key Words: J. Edgar Hoover, Communism, Liberalism, National Security, Civil Liberties, Partisanship From Woodrow Wilson's use of the Bureau of Investigation (BI) to spy on radicals after World War I to Richard Nixon's use of the renamed Federal Bureau of Investigation (FBI) to spy on U.S. "subversives" during Vietnam, the balance between civil liberties and national security has often been a contentious issue during times of national crisis.1 George W. Bush's use of the National Security Agency (NSA) to monitor the communications of suspected terrorists in the United States is but the latest manifestation of a tension that spans the existence of official intelligence agencies.2 The tumult between national security and civil liberties was also visible during the early years of the Cold War as Republicans and Democrats battled over the U.S. government's appropriate response to the surge of communism internationally. Entering the presidency in 1945, Harry S Truman became privy to the unstable dynamic between Western leaders and Josef Stalin over the post‐war division of Eastern Europe.3 Although only high level officials within the executive branch intimately understood this breakdown, the U.S.
    [Show full text]
  • Durham Research Online
    Durham Research Online Deposited in DRO: 27 April 2017 Version of attached le: Accepted Version Peer-review status of attached le: Peer-reviewed Citation for published item: Lu, Jennifer (2017) 'Covert and overt operations : interwar political policing in the United States and the United Kingdom.', American historical review., 122 (3). pp. 727-757. Further information on publisher's website: https://doi.org/10.1093/ahr/122.3.727 Publisher's copyright statement: This is a pre-copyedited, author-produced version of an article accepted for publication in American Historical Review following peer review. The version of record Lu, Jennifer (2017). Covert and Overt Operations: Interwar Political Policing in the United States and the United Kingdom. American Historical Review 122(3): 727-757 is available online at: https://doi.org/10.1093/ahr/122.3.727 Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full DRO policy for further details. Durham University Library, Stockton Road, Durham DH1 3LY, United Kingdom Tel : +44 (0)191 334 3042 | Fax : +44 (0)191 334 2971 https://dro.dur.ac.uk “Covert and Overt Operations: Interwar Political Policing in the United States and the United Kingdom” Manuscript accepted for publication by the American Historical Review Jennifer Luff Readers should consult the final copy-edited version published in the American Historical Review SINCE THE EARLY DAYS OF THE Cold War, observers have reproached American anticommunism by invoking the example of British moderation.
    [Show full text]
  • 1 MWF 10:30-11:30 Fall, 2014 Swarthmore College Department Of
    MWF 10:30-11:30 Fall, 2014 Swarthmore College Department of History Professor M. Murphy History 45 History Department 211 Trotter email: mmurphy1 Ext. 8091 Office Hours: Wed 2-4 History 45: America Since 1945 This course is a survey of social, political and cultural history of the United States since 1945. Topics include: The Cold War, McCarthyism, Civil Rights, Rock n’ Roll, TV, Baby Boomers, JFK, Gender, LBJ, the Viet Nam War, Nixon and Watergate, The Oil Crisis, The rise of the New Right, Ronald Reagan, George Bush I & II; Bill Clinton, 911, the Iraqi War. We will use the presidencies to help generalize the political climate, discuss the sensibility of each era and select some cultural and social events. The entire era is heavily documented with film of actual events, especially the Atom Bomb, McCarthyism, Civil Rights, the Vietnam War, Ronald Reagan, and the Gulf War, the Election of 2000. We will view portions of these documentaries in class and you are urged to finish viewing them in the library. Papers: There are four written assignments in the class: first a 7 page essay on McCarthyism based on the Ellen Schrecker documents and readings in class; then a mid-term which consists of one essay and ten identifications; Third the analysis of a set of documents on 9/11, 7-10pp.; fourth a final examination consisting of two essay questions and ten identifications. No late papers will be accepted for any reason. Ample time has been provided for the completion of these essays on the due date. Requirements: Reading the weekly reading material, preparing carefully for class and participation in class discussions are also part of the requirement.
    [Show full text]
  • The Rosenberg Ring Revealed Industrial-Scale Conventional and Nuclear Espionage
    UsThdein Rosenberg Ring Revealed The Rosenberg Ring Revealed Industrial-Scale Conventional and Nuclear Espionage ✣ Steven T. Usdin Recent leaks from the archives of the former Soviet Committee on State Security (KGB) have ªnally made it possible to assemble a nearly complete picture of Julius Rosenberg’s espionage career.1 The new informa- tion not only illuminates aspects of his career that were previously unknown; it also removes the shadows that have cloaked many of Rosenberg’s activities and those of his comrades. The image that emerges is that of a Soviet agent who was far more involved in nuclear espionage than federal prosecutors or his most persistent critics over the last 60 years could have known. The reassessment is made possible by notes that Alexander Vassiliev took in the Russian Foreign Intelligence Service (SVR) archive, including many verbatim transcriptions of cables to and from Rosenberg’s Soviet handlers in New York. Although Vassiliev, a former KGB ofªcer, had permission from the Russian government to make the notes, they were not supposed to be released and are available today only because Vassiliev decided to make them public in deªance of the Russian government. The notes’ provenance and reliability are detailed by John Earl Haynes and Harvey Klehr in this issue of the Journal of Cold War Studies. The accuracy and reliability of the notes are conªrmed by a thorough review and a comparison with information about the Rosenberg ring from the Venona decrypts of World War II KGB cables released by the U.S. National Security Agency (NSA), from declassiªed Federal Bureau of Investigation (FBI) ªles, and from other sources.2 1.
    [Show full text]
  • Administrative National Security
    ARTICLES Administrative National Security ELENA CHACHKO* In the past two decades, the United States has applied a growing num- ber of foreign and security measures directly targeting individualsÐ natural or legal persons. These individualized measures have been designed and carried out by administrative agencies. Widespread appli- cation of individual economic sanctions, security watchlists and no-¯y lists, detentions, targeted killings, and action against hackers responsible for cyberattacks have all become signi®cant currencies of U.S. foreign and security policy. Although the application of each of these measures in discrete contexts has been studied, they have yet to attract an inte- grated analysis. This Article examines this phenomenon with two main aims. First, it documents what I call ªadministrative national securityº: the growing individualization of U.S. foreign and security policy, the administrative mechanisms that have facilitated it, and the judicial response to these mechanisms. Administrative national security encompasses several types of individualized measures that agencies now apply on a routine, inde®- nite basis through the exercise of considerable discretion within a broad framework established by Congress or the President. It is therefore best understood as an emerging practice of administrative adjudication in the foreign and security space. Second, this Article considers how administrative national security integrates with the presidency and the courts. Accounting for administra- tive national security illuminates the President's constitutional role as chief executive and commander-in-chief and his control of key aspects of * Lecturer on Law, Harvard Law School (Fall 2019); Post-doctoral Fellow, Perry World House, University of Pennsylvania; S.J.D. Candidate, Harvard Law School; LL.B., Hebrew University of Jerusalem (2014).
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Jessica Mitford
    Jessica Mitford: An Inventory of Her Papers at the Harry Ransom Center Descriptive Summary Creator Mitford, Jessica, 1917-1996 Title Jessica Mitford Papers Dates: 1949-1973 Extent 67 document boxes, 3 note card boxes, 7 galley files, 1 oversize folder (27 linear feet) Abstract: Correspondence, printed material, reports, notes, interviews, manuscripts, legal documents, and other materials represent Jessica Mitford's work on her three investigatory books and comprise the bulk of these papers. Language English. Access Open for research Administrative Information Acquisition Purchase, 1973 Processed by Donald Firsching, Amanda McCallum, Jana Pellusch, 1990 Repository: Harry Ransom Center University of Texas at Austin Mitford, Jessica, 1917-1996 Biographical Sketch Born September 11, 1917, in Batsford, Gloucestershire, England, Jessica Mitford is one of the six daughters of the Baron of Redesdale. The Mitfords are a well-known English family with a reputation for eccentricity. Of the Mitford sisters, Nancy achieved notoriety as a novelist and biographer. Diana married Sir Oswald Mosley, leader of the British fascists before World War II. Unity, also a fascist sympathizer, attempted suicide when Britain and Germany went to war. Deborah became the Duchess of Devonshire. Jessica, whose political bent ran opposite to that of her sisters, ran away to Loyalist Spain with her cousin, Esmond Romilly, during the Spanish Civil War. Jessica eventually married Romilly, who was killed during World War II. In 1943, Mitford married a labor lawyer, Robert Treuhaft, while working for the Office of Price Administration in Washington, D.C. The couple soon moved to Oakland, California, where they joined the Communist Party. In California, Mitford worked as executive secretary for the Civil Rights Congress and taught sociology at San Jose State University.
    [Show full text]
  • Researching Soviet/Russian Intelligence in America: Bibliography (Last Updated: October 2018)
    Know Your FSB From Your KGB: Researching Soviet/Russian Intelligence in America: Bibliography (Last updated: October 2018) 1. Federal Government Sources A. The 2016 US Presidential Election Assessing Russian Activities and Intentions in Recent US Elections. Office of the Director of National intelligence, January 6, 2017. Committee Findings on the 2017 Intelligence Community Assessment. Senate Select Committee on Intelligence, July 3, 2018. Disinformation: Panel I, Panel II. A Primer in Russian Active Measures and Influence Campaigns: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Thursday, March 30, 2017. (Y 4.IN 8/19: S.HRG.115-40/) Link: http://purl.fdlp.gov/GPO/gpo86393 FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment. White House Office of the Press Secretary, December 29, 2016. Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Department of Justice Office of Public Affairs, July 13, 2018. Grizzly Steppe: Russian Malicious Cyber Activity. U.S. Department of Homeland Security, and Federal Bureau of Investigation, December 29, 2016. Information Warfare: Issues for Congress. Congressional Research Service, March 5, 2018. Minority Views: The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018, Submit the Following Minority Views to the Majority-Produced "Report on Russian active Measures, March 22, 2018." House Permanent Select Committee on Intelligence, March 26, 2018. Open Hearing: Social Media Influence in the 2016 U.S. Election: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Wednesday, November 1, 2017.
    [Show full text]
  • The Impact of the Cold War and the Second Red Scare on the 1952 American Presidential Election
    Eastern Kentucky University Encompass Online Theses and Dissertations Student Scholarship January 2019 The Impact of the Cold War and the Second Red Scare on the 1952 American Presidential Election Dana C. Johns Eastern Kentucky University Follow this and additional works at: https://encompass.eku.edu/etd Part of the Political History Commons, and the United States History Commons Recommended Citation Johns, Dana C., "The Impact of the Cold War and the Second Red Scare on the 1952 American Presidential Election" (2019). Online Theses and Dissertations. 594. https://encompass.eku.edu/etd/594 This Open Access Thesis is brought to you for free and open access by the Student Scholarship at Encompass. It has been accepted for inclusion in Online Theses and Dissertations by an authorized administrator of Encompass. For more information, please contact [email protected]. STATEMENT OF PERMISSION TO USE In thispresenting thesis in partial fulfillment of the requirements for a Master of Arts degree at Eastern Kentucky University, I agree that the Library shall make it available to borrowers under rules of the Library. Brief quotations from this document are allowable without special permission, provided that accurate acknowledgements of the source are made. Permission for extensive quotation from or reproduction of this document may be granted by my major professor. In [his/her] absence, by the Head oflnterlibrary Services when, in the opinion of either, the proposed use of the material is for scholarly purposes. Any copying or use of the material in this document for financial gain shall not be allowed without my written permission. Signature: X Date: q/ \ \ 9/ \ THE IMPACT OF THE COLD WAR AND THE SECOND RED SCARE ON THE 1952 AMERICAN PRESIDENTIAL ELECTION BY DANA JOHNS Submitted to the Faculty of the Graduate School of Eastern Kentucky University in partial fulfillment of the requirements for the degree of MASTER OF ARTS 2019 © Copyright by DANA JOHNS 2019 All Rights Reserved.
    [Show full text]
  • Site Aerial.Ai
    FORT MONMOUTH REUSE AND REDEVELOPMENT PLAN TECHNICAL MEMORANDUM: SITE CHARACTERISTICS Fort Monmouth Reuse and Redevelopment Plan Technical Memorandum: Site Characteristics Prepared for: Fort Monmouth Economic Revitalization Planning Authority Prepared by: EDAW, Inc. September 14, 2007 This Technical Memorandum presents an overview of the existing conditions of Fort Monmouth and its surroundings, providing a baseline understanding of the site’s potential for reuse. Establishment and History of Fort Monmouth Fort Monmouth has been a significant presence in Monmouth County, New Jersey since its establishment in 1917. Prior to this time, the site was home to Monmouth Park Race Track since 1870. After being abandoned due to New Jersey’s ban on horse betting, the Army began leasing the land from a private owner in 1917 and purchased the land in 1919. The original name of Fort Monmouth was Camp Little Silver in 1917, then renamed Camp Alfred Vail. The fort was originally established as a temporary facility for training the 1st and 2nd Reserve Signal Battalions, in anticipation of the United States’ involvement in World War I. The Chief Signal Officer authorized the purchase of Camp Alfred Vail in 1919 when the Signal Corps School relocated to Camp Vail from Fort Leavenworth that year. In 1925, the installation was granted permanent status and renamed Fort Monmouth, in honor of the soldiers of the American Revolution who died in the battle of Monmouth Court House. The first permanent structure at Fort Monmouth, the barracks building on Barker Circle, was built in 1928. The construction of additional facilities to house the various communications technologies and laboratories occurred shortly thereafter.
    [Show full text]
  • A Concise History of Fort Monmouth, New Jersey and the U.S
    A CONCISE HISTORY OF FORT MONMOUTH, NEW JERSEY AND THE U.S. ARMY CECOM LIFE CYCLE MANAGEMENT COMMAND Prepared by the Staff of the CECOM LCMC Historical Office U.S. Army CECOM Life Cycle Management Command Fort Monmouth, New Jersey Fall 2009 Design and Layout by CTSC Visual Information Services, Myer Center Fort Monmouth, New Jersey Visit our Website: www.monmouth.army.mil/historian/ When asked to explain a loyalty that time had not been able to dim, one of the Camp Vail veterans said shyly, "The place sort of gets into your blood, especially when you have seen it grow from nothing into all this. It keeps growing and growing, and you want to be part of its growing pains." Many of the local communities have become very attached to Fort Monmouth because of the friendship instilled...not for just a war period but for as long as...Fort Monmouth...will inhabit Monmouth County. - From “A Brief History of the Beginnings of the Fort Monmouth Radio Laboratories,” Rebecca Klang, 1942 FOREWORD The name “Monmouth” has been synonymous with the defense of freedom since our country’s inception. Scientists, engineers, program managers, and logisticians here have delivered technological breakthroughs and advancements to our Soldiers, Sailors, Airmen, Marines, and Coast Guardsmen for almost a century. These innovations have included the development of FM radio and radar, bouncing signals off the moon to prove the feasibility of extraterrestrial radio communication, the use of homing pigeons through the late-1950s, frequency hopping tactical radios, and today’s networking capabilities supporting our troops in Overseas Contingency Operations.
    [Show full text]