Privacy, Wiretapping and the Citizen Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970S Olsen, E.A

Total Page:16

File Type:pdf, Size:1020Kb

Privacy, Wiretapping and the Citizen Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970S Olsen, E.A UvA-DARE (Digital Academic Repository) Privacy, wiretapping and the citizen Congress’ battle to set legal boundaries on government wiretapping in the 1970s Olsen, E.A. Publication date 2020 Document Version Other version License Other Link to publication Citation for published version (APA): Olsen, E. A. (2020). Privacy, wiretapping and the citizen: Congress’ battle to set legal boundaries on government wiretapping in the 1970s. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:29 Sep 2021 Privacy, Wiretapping and the Citizen: Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970s ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. dr. ir. K.I.J. Maex ten overstaan van een door het College voor Promoties ingestelde commissie, op donderdag 25 juni 2020 te 13.00 uur door Erik Alfred Olsen geboren te New York Promotiecommissie Promotor: prof. dr. R.V.A. Janssens Universiteit van Amsterdam Copromotor: dr. E.F. van de Bilt Universiteit van Amsterdam Overige leden: prof. dr. B. Roessler Universiteit van Amsterdam prof. dr. I.G.B.M. Duyvesteyn Universiteit Leiden prof. dr. J.A. Peters Universiteit van Amsterdam dr. G.H. Blaustein Universiteit van Amsterdam prof. dr. M. van Leeuwen Universiteit van Amsterdam Faculteit der Geesteswetenschappen The research of this doctoral thesis received financial assistance from the Ford Presidential Library. Table of Contents Introduction 1 a. Research Topic 3 b. Existing Scholarship 10 c. Thesis Statement 25 d. Sources 36 e. Subtopics 41 Section 1: The Era of Regulation Without Oversight 46 Chapter 1: Privacy Rights in the Early Twentieth Century 47 1.a. Wiretapping Regulations in the Absence of Fourth Amendment Protections 49 1.b. Early Twentieth Century Decisions by the Supreme Court and Congress’ Foray into Wiretapping Regulations 56 1.b.1. Olmstead v. United States, 277 U.S. 438 (1928) 56 1.b.2. The Communications Act of 1934 60 1.b.3. Nardone v. United States, 302 U.S. 370 (1937) 72 Conclusion 79 Chapter 2: The 1960s: Berger, Katz and Congress Link Wiretapping to Fourth Amendment Protections 82 2.a. Privacy Evolves into a Constitutional Right, 1967-68 91 2.a.1 Berger v. New York, 388 U.S. 41 (1967) 91 2.a.2. Katz v. United States, 316 U.S. 129 (1967) 97 2.b. The Omnibus Crime Control and Safe Streets Act of 1968 105 2.c. Warrantless Wiretapping Threatens a Constitutional Conflict 108 Conclusion 118 Section 2: Congress Investigates the White House – Intelligence Community Relationship 124 Chapter 3: The Watergate Scandal, the Houston Plan and The Effects on the White House – Intelligence Community Relationship 125 3.a. Congress Learns About the Houston Plan 127 3.b. The Watergate Scandal Damages the Executive Branch 141 Conclusion 144 Chapter 4: The Rockefeller Commission, the Executive Branch’s Overture to Dominate the Intelligence Investigation of the 1970s 146 Conclusion 156 Chapter 5: The Pike Committee, A Failed Investigation from the House 157 5.a. The Failed Nedzi Committee 161 5.b. The House Kills the Pike Committee Final Report 164 Conclusion 173 Chapter 6: The Church Committee, Privacy, and Warrantless Wiretapping 177 6.a. The Church Committee’s Formation and Their Success as Contrasted with the Pike Investigation 181 6.b. The Scope of the Church Committee Investigation 190 6.c. The Imperial Presidency 195 6.d. Why Was Privacy and Warrantless Wiretapping of Such Interest to the Committee? 200 Conclusion 203 Chapter 7: The Church Committee Investigation of the FBI and COINTELPRO 206 7.a. What Was COINTELPRO and Why Was It Created? 208 7.b. The Main Five COINTELPRO Operations and Their Budgets 211 7.b.1. COINTELPRO I: ‘Communist Party, USA’ Program (1956-71) 212 7.b.2. COINTELPRO II: ‘Socialist Workers Party’ Program (1961-69) 215 7.b.3. COINTELPRO III: ‘White Hate Group’ Program (1964-71) 216 7.b.4. COINTELPRO IV: ‘Black Nationalist – Hate Group’ Program (1967-71) 218 7.b.5. COINTELPRO V: ‘The New Left’ Program (1968 – 71) 220 7.c. The Reverend Martin Luther King, Jr. and the FBI 222 7.d. COINTELPRO Exposes the Need for Congressional Regulations on Wiretapping and Oversight of the White House Intelligence Community Relationship Stakeholders 227 Conclusion 240 Chapter 8: The Church Committee, the Central Intelligence Agency, and Operation CHAOS 242 8.a. The Creation of the Central Intelligence Agency 245 8.b. Operation CHAOS 247 8.c. How the Church Committee’s Findings with Respect to Operation CHAOS Helped Formulate Their Reform Recommendations 254 Conclusion 267 Section 3: Congress Creates New Regulations and Oversight on the White House-Intelligence Community Relationship 270 Chapter 9: The Corrective Actions of Congress and the Establishment of the Permanent Congressional Oversight Regime 271 9.a. Why the Focus on Privacy, Warrantless Wiretapping and Violations of the Fourth Amendment? 274 9.b. Historical Problems Related to Congressional Controls of Intelligence and the End of the Buddy System 285 9.c. How Does Congress Best Regulate and Perform Oversight in the White House – Intelligence Community Relationship 294 Conclusion 299 Chapter 10: The Foreign Intelligence Surveillance Act of 1978 302 10.a. The Foreign Intelligence Surveillance Act of 1978 – S. 1566 305 10.b. Defining Terms Under FISA 311 10.c. Foreign Intelligence Surveillance Court 315 10.d. Surveillance with Warrant 319 10.e. Pre-Warrant Surveillance 322 Conclusion 328 Chapter 11: Senate Resolution 400 and the Intelligence Oversight Act of 1980 333 11.a. Congressional Intelligence Oversight, Privacy and Wiretapping 341 11.b. Senate Resolution 400 (1976) 345 11.c. The ‘Cannon Compromise’ 348 11.c.1. 12 May 1976 Introduction of S.R. 400 Cannon Compromise 350 11.c.2. 13 May 1976 Debate and Amendment on the Cannon Compromise 351 11.c.3. 17 May 1976 Debate and Amendment on the Cannon Compromise 353 11.c.4. 18 May 1976 Debate and Amendment on the Cannon Compromise 356 11.c.5. 19 May 1976 Debate and Amendment on the Cannon Compromise 358 11.d. The Intelligence Oversight Act of 1980 – S.2284 361 11.e. Reporting Requirement and Covert Activity 365 Conclusion 375 Section 4: The Intelligence Reforms of the 1970s in the Changing Political Climates Over Subsequent Decades: From Church to the Torture Report 379 Chapter 12: Changes to FISA From Boland Amendments Through the Patriot Act and Torture Report 380 12.a. Congressional Oversight in the Post-1970s 386 12.a.1. The Boland Amendments 386 12.a.2. USAPATRIOT ACT of 2001 395 12.a.3. Changes to FISA via Amendment to the USAPATRIOT ACT of 2001 401 12.a.4. The CIA Torture Report and the Senate Intelligence Committee 412 12.b. Congress Abdicates Oversight Responsibilities: Two Case Studies 416 12.b.1. The Aspin-Brown Commission 416 12.b.2. The 9/11 Commission and the Bush White House Controlled Investigation 418 Conclusion 422 Conclusion 424 References 439 Summary, English 475 Summary, Dutch 479 .
Recommended publications
  • Selected Chronology of Political Protests and Events in Lawrence
    SELECTED CHRONOLOGY OF POLITICAL PROTESTS AND EVENTS IN LAWRENCE 1960-1973 By Clark H. Coan January 1, 2001 LAV1tRE ~\JCE~ ~')lJ~3lj(~ ~~JGR§~~Frlt 707 Vf~ f·1~J1()NT .STFie~:T LA1JVi~f:NCE! i(At.. lSAG GG044 INTRODUCTION Civil Rights & Black Power Movements. Lawrence, the Free State or anti-slavery capital of Kansas during Bleeding Kansas, was dubbed the "Cradle of Liberty" by Abraham Lincoln. Partly due to this reputation, a vibrant Black community developed in the town in the years following the Civil War. White Lawrencians were fairly tolerant of Black people during this period, though three Black men were lynched from the Kaw River Bridge in 1882 during an economic depression in Lawrence. When the U.S. Supreme Court ruled in 1894 that "separate but equal" was constitutional, racial attitudes hardened. Gradually Jim Crow segregation was instituted in the former bastion of freedom with many facilities becoming segregated around the time Black Poet Laureate Langston Hughes lived in the dty-asa child. Then in the 1920s a Ku Klux Klan rally with a burning cross was attended by 2,000 hooded participants near Centennial Park. Racial discrimination subsequently became rampant and segregation solidified. Change was in the air after World "vV ar II. The Lawrence League for the Practice of Democracy (LLPD) formed in 1945 and was in the vanguard of Post-war efforts to end racial segregation and discrimination. This was a bi-racial group composed of many KU faculty and Lawrence residents. A chapter of Congress on Racial Equality (CORE) formed in Lawrence in 1947 and on April 15 of the following year, 25 members held a sit-in at Brick's Cafe to force it to serve everyone equally.
    [Show full text]
  • CIA Intelligence Collection About Americans: CHAOS and the Office
    CIA INTELLIGENCE COLLECTION ABOUT AMERICANS : CHAOS AND THE OFFICE OF SECURITY CONTENTS I. Introduction Page A. CHAOS___________________________________------------ 681 B. MERRIMAC and RESISTANCE _ _ __ _______ ___- _______ 681 C. Special security investigations _____ _ _ - _ _ _ _ - _ -_ _ _ _ _ _ _- __ __ _ 682 D. The investigation ____________ -- _____ -- __________________ 683 E. Summary of the issues-- _____ ________________ ___________ 683 1. Statutor authority_-_______--------------------- 684 a. CTounterintelligence-- _ _ _ _ _-_ __ __ __ _-_-_ __ __ b. Protecting sources and methods of intelligence- :E 2. Statutory prohibitions--- _-_ __ _ __ __ _ _ _ _ _ __ _-__ _ _ __ 686 3. Questions raised by CHAOS----- - _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 686 4. Questions raised by the Office of Security Programs-- 688 11. History and Operation of CHAOS _ - _ _-_ __ _ ___ ___ _ _ _ _ __ _-_-__ _ __ 688 A. Background----____________-_______-_______________-__ 688 B. Authorization of CHAOS _____ __ __ __ __ __ __ _ __ __ __ _ _ --_-_ _ C. The November 1967 peace movement study- ______________ % D. Operation of the CHAOS program and related CIA projects- 693 1. Gathering information ______ __ __ __ _ __ __ __ __ ____ -_- 693 2. Processing, storage and control of CHAOS informa- tion--_________________-_____-__________--~--- 695 3. Reporting by CIA- _ _ - _ _ _ __ _ _ _ _ _ __-__ _ _ _ _ _ __ ____ _ a.
    [Show full text]
  • The Vietnam War, 1965-1975
    How I will compress four lectures into one because I’ve run out of time. A last‐minute addition to my bibliography: • B.G. Burkett (Vanderbilt, 66) and Glenna Whitley, Stolen Valor: How the Vietnam Generation was robbed of its Heroes and its History (Dallas, 1998). • Burkett makes many claims in this book, but the most fascinating aspect of it is his exposure of the “phony Vietnam veteran,” a phenomenon that still amazes me. “Many Flags” campaign ‐ Allied support 1.) South Korea –largest contingent – 48,000(would lose 4407 men)‐US financial support 2.) Australia – 8000, lost 469 3.)New Zealand, 1000, lost 37 4.) Thailand – 12,000 troops, 351 lost 5.) Philippines – medical and small number of forces in pacification 6.) Nationalist China –covert operations American Force levels/casualties in Vietnam(K=killed W=wounded) 1964 23,200 K 147 W 522 1965 190,000 K 1369 W 3308 1966 390,000 5008 16,526 1967 500,000 9377 32,370 1968 535,000 14,589 46,797 1969 475,000 9414 32,940 1970 334,000 4221 15,211 1971 140,000 1381 4767 1972 50,000 300 587 Soviet and Chinese Support for North Vietnam • 1.) Despite Sino‐Soviet dispute and outbreak of Cultural Revolution in China, support continues • 2.) Soviet supply of anti‐aircraft technology and supplies to the North –along with medical supplies, arms, tanks, planes, helicopters, artillery, and other military equipment. Soviet ships provided intelligence on B‐52 raids – 3000 soldiers in North Vietnam (Soviet govt. concealed extent of support) • 3.) Chinese supply of anti‐aircraft units and engineering
    [Show full text]
  • 'Lose in Vietnam, Bring Our Boys Home'
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2004 ‘Lose in Vietnam, Bring Our Boys Home’ Robert N. Strassfeld Case Western Reserve University - School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Law Commons Repository Citation Strassfeld, Robert N., "‘Lose in Vietnam, Bring Our Boys Home’" (2004). Faculty Publications. 267. https://scholarlycommons.law.case.edu/faculty_publications/267 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. "LOSE IN VIETNAM, BRING THE BOYS HOME" ROBERTN. STRASSFELD. This Article examines the contest over dissent and loyalty during the Vietnam War. The Johnson and Nixon Administrations used an array of weapons to discourage or silence antiwar opposition. These included crinLinal prosecutions for "disloyal speech," a tool that they used with less frequency than s01ne other administrations in times of war; prosecutions for other "crimes" that served as pretext for prosecuting disloyal speech; infiltration and harassment; and an attempt to characterize their critics as disloyal. The antiwar movement, in turn, responded to allegations that dissent equaled disloyalty by offering an alternative vision of loyalty and patriotism. In so doing, they recast notions of allegiance, betrayal, support of the troops, and our obligations in the face of conflicting loyalties. INTRODUCTION ..................................................................................... 1892 I. THE USES OF LOYALTY IN THE VIETNAM WAR ERA ........... 1894 A. The Model of Legal Repression: The World War I Experience ...........................................................................
    [Show full text]
  • Nixon's Wars: Secrecy, Watergate, and the CIA
    Eastern Kentucky University Encompass Online Theses and Dissertations Student Scholarship January 2016 Nixon's Wars: Secrecy, Watergate, and the CIA Chris Collins Eastern Kentucky University Follow this and additional works at: https://encompass.eku.edu/etd Part of the Defense and Security Studies Commons, and the United States History Commons Recommended Citation Collins, Chris, "Nixon's Wars: Secrecy, Watergate, and the CIA" (2016). Online Theses and Dissertations. 352. https://encompass.eku.edu/etd/352 This Open Access Thesis is brought to you for free and open access by the Student Scholarship at Encompass. It has been accepted for inclusion in Online Theses and Dissertations by an authorized administrator of Encompass. For more information, please contact [email protected]. Nixon’s Wars: Secrecy, Watergate, and the CIA By Christopher M. Collins Bachelor of Arts Eastern Kentucky University Richmond, Kentucky 2011 Submitted to the Faculty of the Graduate School of Eastern Kentucky University In partial fulfillment of the requirements for the degree of MASTER OF ARTS December, 2016 Copyright © Christopher M. Collins, 2016 All rights reserved ii Acknowledgments I could not have completed this thesis without the support and generosity of many remarkable people. First, I am grateful to the entire EKU history department for creating such a wonderful environment in which to work. It has truly been a great experience. I am thankful to the members of my advisory committee, Dr. Robert Weise, Dr. Carolyn Dupont, and especially Dr. Thomas Appleton, who has been a true friend and mentor to me, and whose kind words and confidence in my work has been a tremendous source of encouragement, without which I would not have made it this far.
    [Show full text]
  • Looking at the Law
    Looking at the Law Michelle Parrini and Charles F. Williams The recent London subway “There is always a possibility that at preventing the exercise of bombings drew renewed attention a secret police may become a First Amendment rights of to the difficulties facing government menace to free government and speech and association, on attempts to uncover and intercept ter- free institutions because it carries the theory that preventing the ror plots; though there may now be with it the possibility of abuses of growth of dangerous groups more awareness of the issue, nations power which are not always quick- and the propagation of dan- have been trying to learn their enemy’s ly apprehended or understood.” gerous ideas would protect the secrets since the beginning of recorded national security and deter vio- history. Spies appear in Homer’s Greek — The Church Committee lence…Many of the techniques epic, the Iliad. Ancient Roman writ- Report, 1976.1 used would be intolerable ings are filled with accounts of intrigue in a democratic society even and assassination plots. Caesar’s secret gence on other countries increased 39 if all of the targets had been agents looked out for his interests in percent between 1998-2002.2 Public involved in violent activity, Rome. Sun Tzu’s The Art of War (500 and congressional opinion about the but COINTELPRO went far BC) describes espionage and the use appropriate scope of covert govern- beyond that. The unexpressed of human intelligence as key to suc- ment activities, and perceptions that major premise of the programs cessful warfare.
    [Show full text]
  • Declaration of War Against Vietnam
    Declaration Of War Against Vietnam Perpendicular Marshal sometimes enrapturing any evasions denitrifies nasally. Secure Adlai fate whenglobally astute and remotely,Bjorne factors she shieldmost andher cartoonistspalatalise her brigades heinousness. majestically. Giraud often jellies irrelevantly Movement organizers took pace the antiwar cause, impelled in part that a disproportionate number of Chicanos being drafted into to military. Fellow Australians, it feel my melancholy duty to inform you officially, that in spur of a persistence by Germany in her invasion of Poland, Great Britain has declared war if her color that, county a result, Australia is also hate war. United States is threatened by the application, or the theme danger of application, of physical force nor any foreign government or agency against the United States, its citizens, the pile of its citizens, or her commercial interests. Applicability of other requirements. There are in raids of each declaration of war against vietnam war on our restraint. And the war ii stories delivered a war declaration of vietnam against barry. Democratic party are those intent of vietnam also uses ultrapatriotic images of the start of the prerogative, hannah dreier and idealistic in. Dow Shall i Kill. Vietnam to head to me say that of war declaration generally, once combat is a thin line, resigned his information. States maintain order the justice, set their problems by cooperation, and eliminate violence. Geneva Agreements and that avoid precipitating an armed conflict. In the classic sense, the conventions presume a declared state of war about two or eradicate sovereign states, each fielding a regular army fighting on a readily identifiable battlefront.
    [Show full text]
  • Rockefeller Commission Report - Final (1)” of the Richard B
    The original documents are located in Box 7, folder “Intelligence - Rockefeller Commission Report - Final (1)” of the Richard B. Cheney Files at the Gerald R. Ford Presidential Library. Copyright Notice The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Gerald Ford donated to the United States of America his copyrights in all of his unpublished writings in National Archives collections. Works prepared by U.S. Government employees as part of their official duties are in the public domain. The copyrights to materials written by other individuals or organizations are presumed to remain with them. If you think any of the information displayed in the PDF is subject to a valid copyright claim, please contact the Gerald R. Ford Presidential Library. Digitized from Box 7 of the Richard B. Cheney Files at the Gerald R. Ford Presidential Library -·====== Report to tl'1e President by the COMMISSION ON ··~----- ... , ~-: '; t·. ·"~~ ..;· ' '· .·.. /;-., . ::·.._ COMMISSION ON CIA ACTIVITIES WITHIN THE UNITED STATES VICE PRESIDENT NELSON A. ROCKEFELLER, Chairman JOHN T. CONNOR LYMAN L. LEMNITZER C. DOUGLAS DILLON RONALD REAGAN ERWIN N. GRISWOLD EDGAR F. SHANNON, Jr. LANE KIRKLAND DAV!D W. BELIN, Executive Director Senior Counsel HAROLD A. BAKER ROBERT B. OLSEN ERNEST GELLHORN WILLIAM W SCHWARZER \..iOUIU:iel- - MARVIN L. GRAY, Jr. JA.,.\IES N. ROETHE GEORGE A. MANFREDI JAMES B. WEIDNER Special Counsel Staff Members RONALD J. GREENE R. MASON CARGILL PETER R. CLAPPER TIMOTHY S. HARDY Special Counsel to Counsel to the Vice President the Vice President SOL NEIL CORBIN PETER J.
    [Show full text]
  • COINTELPRO.S.Pdf
    COINTELPRO, FBI Counterintelligence, Covert Operations, Black Bag Jobs, Church Committee COINTELPRO http://www.icdc.com/~paulwolf/cointel.htm (1 of 7) [9/3/2001 11:33:41 AM] COINTELPRO, FBI Counterintelligence, Covert Operations, Black Bag Jobs, Church Committee COINTELPRO was the FBI's secret program to undermine the popular upsurge which swept the country during the 1960s. Though the name stands for "Counterintelligence Program," the targets were not enemy spies. The FBI set out to eliminate "radical" political opposition inside the US. When traditional modes of repression (exposure, blatant harassment, and prosecution for political crimes) failed to counter the growing insurgency, and even helped to fuel it, the Bureau took the law into its own hands and secretly used fraud and force to sabotage constitutionally - protected political activity. Its methods ranged far beyond surveillance, and amounted to a domestic version of the covert action for which the CIA has become infamous throughout the world. The COINTELPRO Papers: Documents from the FBI's Secret Wars Against Dissent in the United States by Ward Churchill & Jim Vander Wall Preface - The Face of COINTELPRO HTML Index to the Documents Introduction - A Glimpse Into the Files of America's Political Police Chapter 1 - Understanding Deletions in FBI Documents Chapter 2 - COINTELPRO - CP/USA Chapter 3 - COINTELPRO - SWP Chapter 4 - COINTELPRO - Puerto Rican Independence Movement Chapter 5 - COINTELPRO - Black Liberation Movement Chapter 6 - COINTELPRO - New Left Chapter 7 - COINTELPRO
    [Show full text]
  • Central Intelligence Agency FOIA Request Logs, 2000-2005
    Central Intelligence Agency FOIA request logs, 2000-2005 Brought to you by AltGov2 www.altgov2.org/FOIALand ... , Calendar Year 2000 FOIA Case Log Creation Date Case Number Case Subject 03-Jan-00 F-2000-00001 IMPACT VISA CARD HOLDERS 03-Jan-0O F-2000-00003 WILLIAM CHARLE BUMM JSC RADEL, LTD; ELTEK COMPANY WIDEBAND SYSTEMS DIGITAL FREQUENCY DISCRIMINATOR; ED 03-Jan-00 F-2000-00004 BATKO OR BATKO INTERNATIONAL; COLONEL SERGEY SUKARAEV 03-Jan-0O F-2000-00005 INFO ON FATHER 04-Jan-00 F-2000-00006 JOHN CHRISLAW 04-Jan-00 F-2000-00007 1999 BOMBING OF CHINESE EMBASSY IN BELGRADE, YUGOSLAVIA. 04-Jan-00 F-2000-00008 COMMANDER IAN FLEMING 04-Jan-00 F-2000-00009 MALCOLM X AND ELIJAH MUHAMMAD AND HIS SON, AKBAR MUHAMMAD AND THE NATION OF ISLAM 04-Jan-00 F-2000-00010 WILLIAM STEPHENSON 04-Jan-00 F-2000-00011 SIX DECEASED INDIVIDUALS WITH CRIMINAL BACKGROUND 04-Jan-00 F-2000-00012 INFO ON ARGENTINA 04-Jan-00 F-2000-00013 ENRIQUE FUENTES LEON, MANUEL MUNOZ ROCHA, AND ERNESTO ANCIRA JR. 04-Jan-00 F-2000-00014 SOVIET ESPIONAGE IN AND AGAINST THE UNITED STATES 04-Jan-00 F-2000-00015 SOVIET ESPIONAGE IN AND AGAINST THE UNITED STATES SPECIFIC INFO ON CIA POSITIONS RELATING TO THE INFORMATION SYSTEMS CONTACTS AND 04-Jan-00 F-2000-00016 PURCHASING- OFFICERS 04-Jan-00 F-2000-00017 MKULTRA CDROMS 04-Jan-00 F-2000-00018 CIA PROJECTS ON OR AROUND 9 APRIL 1959 04-Jan-00 F-2000-00019 JERZY PAWLOWSKI 04-Jan-00 F-2000-00020 PERSONNEL FILES OF ALDRICH AMES 05-Jan-00 F-2000-00026 PERSONNEL FILES OF ALDRICH AMES 05-Jan-00 F-2000-00027 32 PAGE LETTER AND TWO TDK TAPES ON HER PROBLEMS 05-Jan-00 F-2000-00028 EMERSON T.
    [Show full text]
  • Support the Constitution? You're a Terrorist Suspect! Support the Constitution? You're a Terrorist Suspect!
    SUPPORT THE CONSTITUTION? YOU'RE A TERRORIST SUSPECT! SUPPORT THE CONSTITUTION? YOU'RE A TERRORIST SUSPECT! From those same lovable folks who brought you the crimes and abuses of COINTELPRO comes the following brochure, printed at taxpayer expense by the FBI and intended to be issued to law enforcement, requesting that the Joint Terrorism Task Force be called in the event suspicious behavior is witnessed. And what is "suspicious behavior"? Defending the Constitution! Read it yourself on the inside page of the brochure. Defending the Constitution is cause to label you a terrorist suspect. Even referring to it is grounds for suspicion that you are a terrorist, with all the harassment that the suspicion implies! Click for full size scan of front of the flyer. Click for full size scan of front of the flyer. http://www.whatreallyhappened.com/FBIsuspect.html (1 of 2) [10/13/2002 11:25:41 AM] SUPPORT THE CONSTITUTION? YOU'RE A TERRORIST SUSPECT! Return to top of What Really Happened http://www.whatreallyhappened.com/FBIsuspect.html (2 of 2) [10/13/2002 11:25:41 AM] COINTELPRO COINTELPRO The Sabotage Of Legitimate Dissent Last update Sat Jun 5 16:00:09 PDT 1998 ● The Brian Glick article on COINTELPRO. ● The Jean Seberg Smear. ● The Brian Glick history of COINTELPRO. ● US Domestic Covert Operations ● The Framing Of Qubilah Shabazz. ● The Black Panther Coloring Book. ● Actual FBI COINTELPRO documents. ● Newsline: In Defense Of Paranoia. ● The Bari/Cherney Bombing. http://www.whatreallyhappened.com/RANCHO/POLITICS/COINTELPRO/cointelpro.html (1 of 4) [10/13/2002 11:25:52 AM] COINTELPRO ● "A Rough, Tough, Dirty Business".
    [Show full text]
  • Anglo-American Privacy and Surveillance
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2006 Anglo-American Privacy and Surveillance Laura K. Donohue Georgetown University Law Center, [email protected] Georgetown Public Law and Legal Theory Research Paper No. 12-030 © 2006 by Northwestern University School of Law This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/790 http://ssrn.com/abstract=2020411 96 J. of Crim. L. & Criminology 1059-1208 (2006) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Comparative and Foreign Law Commons, Military, War, and Peace Commons, and the National Security Law Commons 0091-4169/06/9603-1059 THE JOURNAL OF CRIMINAL LAw &CRIMINOLOGY Vol. 96. No. 3 Copyright 0 2006 by Northwestern University. School of Law Printed in U.S.A. CRIMINAL LAW ANGLO-AMERICAN PRIVACY AND SURVEILLANCE LAURA K. DONOHUE· TABLE OF CONTENTS INTRODUCTION ................ ....... ................ ..................... .......................... 1061 . .. I. SURVEILLANCE AND THE LAW IN THE UNITED STATES .......... ...... 1064 A. REASONABLE EXPECTATION OF PRIVACY ............................ 1 065 B. NATIONAL SECURITY AND SURVEILLANCE .......................... 1072 1. TheRed Scare ......... .. ...... ...... ............ ........ .... .. _ . ...................... 1073 2. Title III. ........... ....... ............... ......... ... .... ... ............
    [Show full text]