The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee

Total Page:16

File Type:pdf, Size:1020Kb

The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee Information & Communications Technology Law, 2014 Vol. 23, No. 3, 192–219, http://dx.doi.org/10.1080/13600834.2014.970375 The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe? Maria Helen Murphy* Law Department, National University of Ireland, Maynooth, Ireland This article considers how the pendulum metaphor can be applied to shifts in popular opinion concerning the right to privacy. At times, the media portrays privacy as an individualistic right, serving at the behest of criminals and terrorists. Every so often, however, an event occurs that starkly reminds the public of the value of privacy. Public opinion drives debate and this debate often leads to legal reform. The Church Committee, formed in response to the Watergate scandal, is a classic example of the effect the exposure of abuse can have on the regulation of privacy. Over time, however, legislative gains in privacy protection have a tendency to erode. In addition, extreme events, such as the terrorist attacks of 9/11, can cause the pendulum to swing back to the opposite position. Following the exposure of mass surveillance practices by Edward Snowden, the world has, once again, been questioning government surveillance activities. This article seeks to consider the transatlantic impact of the National Security Agency revelations. Transparency is highlighted as a crucial regulating force on excessive government interference with privacy rights. Keywords: Snowden; surveillance; privacy; data retention; European Union Introduction The concept of a swinging pendulum frequently serves as a political metaphor, illustrat- ing oscillations from one policy position to another over time.1 The metaphor borrows from the scientific principle that the restoring force of gravity, combined with the mass of a pendulum, will cause it to swing back and forth indefinitely. In addition to being used to portray electoral swings,2 trends in criminal justice,3 and education Downloaded by [Maynooth University Library] at 08:41 24 October 2017 *Email: [email protected] 1See, for example, M Lebo and H Norpoth, ‘The PM and the Pendulum: Dynamic Forecasting of British Elections’ (2007) 37 BJ Pol S 71; S Ranchod-Nilsson, ‘Gender Politics and the Pendulum of Political and Social Transformation in Zimbabwe’ (2006) 32 JSAS 49; B Jackson, The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a US Domestic Counterterrorism Intelligence Agency (Rand Corporation, 2009) 90, 112. 2M Harrop, ‘The Pendulum Swings: The British Election of 1997’ (1997) 32 Gov’t & Oppos 305; S Severinghaus, ‘Mongolia in 2000: The Pendulum Swings Again’ (2001) 41 Asian Surv 61; D Collier, ‘The Ideal Pendulum Swing: From Rhetoric to Reality’ (2008) 13 BJCL 175. 3G Miller, ‘Watching the Correctional Pendulum Swing’ (1993) 62 FBI Law Enforcement Bulletin 24; D Spader, ‘Megatrends in Criminal Justice Theory’ (1985–1986) 13 AJCL 157; D Collier, ‘The Ideal Pendulum Swing: From Rhetoric to Reality’ (2008) 13 BJCL 175; K Parker, ‘Coddling Not Allowed’ © 2014 Taylor & Francis Information & Communications Technology Law 193 reforms,4 the metaphor of the pendulum has been utilised by many to demonstrate how public opinion regarding the balance between security and surveillance has tended to see– saw at various points in history.5 The logic underlying this theory is that in times of crisis, the government may curtail civil liberties in order to protect national security. Etzioni has commented that once the threat has passed, the intrusive measures ‘can gradually be rolled back.’6 While this understanding of the balance between the powers of the State and the protection of civil liberties may place undue faith in the ability of societal forces to correct the excesses of its government systems over time, it can be useful to illustrate observable shifts in public opinion and subsequent developments in government policy. Due to the secrecy of surveillance systems, the public often only learns of the true nature of government activity following the actions of a whistle-blower, like Edward Snowden. Due to this information deficit, the pendulum is only prone to swing back in favour of greater protection of privacy rights once the relevant information enters the public domain. Often, the importance of privacy is weighed against the importance of national security. This balancing can place an undue burden on the right to privacy, as a threat to privacy appears remote in comparison to a threat to personal safety. Privacy, as a fundamental right, has faced criticisms of varying degrees of severity. At the more moderate end of the scale, Hixon has described privacy as being a right worth protecting, but not worth pro- tecting ‘on the grand scale that claims for privacy are pressed today.’7 More negatively, privacy has been described as a ‘cult’ that ‘rests on an individualist conception of society.’8 In popular discourse, privacy is often wholly identified as a benefit to the individ- ual, weighing against general social goods, such as security.9 Despite the vigorous protesta- tions of civil liberties organisations a frequently made argument is that privacy is a moribund right that people no longer need and is, in fact, an anachronistic value in modern life.10 Predictably, the argument goes, in the war on terror and organised crime, privacy is even less important. Popular culture is infected with an ‘us v. them’ mentality Chicago Tribune (Chicago, 24 November 1999) <articles.chicagotribune.com/1999–11-24/news/ 9911240048_1_discipline-psychotropic-greater-communication-and-education> accessed 10 October 2014. 4P Wolfe and L Poynor, ‘Politics and the Pendulum: An Alternative Understanding of the Case of Whole Language as Educational Innovation’ (2001) 30 Educational Researcher 15–20; C Mellon, ‘Technology and the Great Pendulum of Education’ (1999) 32 JRCE 28; D Coulby, R Cowen and C Jone, Education in Times of Transition (Psychology Press, 2000). 5D Clarke and E Neveleff, ‘Secrecy, Foreign Intelligence, and Civil Liberties: Has the Pendulum Downloaded by [Maynooth University Library] at 08:41 24 October 2017 Swung Too Far?’ (1984) 99 PSQ 493; P Pillar, ‘The Pendulum of Opinion on Security and Privacy’ The National Interest (11 June 2013) <www.brookings.edu/research/opinions/2013/06/09- security-privacy-surveillance-phone-internet-terrorism-pillar> accessed 10 October 2014; O Kerr, ‘Technology, Privacy, and the Courts: A Reply to Colb and Swire’ 102 Mich L Rev 933; R Matthew and G Shambaugh, ‘The Pendulum Effect: Explaining Shifts in the Democratic Response to Terrorism’ (2005) 5 Analyses of Social Issues and Public Policy 223; D Solove, ‘Data Mining and the Security-Liberty Debate’ (2008) 75 U Chi L Rev 343. 6A Etzioni, The Limits of Privacy 25 (Basic Books, 1999) 25; See D Solove, Nothing to Hide: The False Trade-off between Privacy and Security (Yale University Press, 2011) 55–56. 7G Laurie, Genetic Privacy: A Challenge to Medico-legal Norms (CUP, 2002) 47. R Hixson, Privacy in a Public Society (OUP, 1987) 4. 8H Arndt, ‘The Cult of Privacy’ (1949) 21 AQ 68, 70–71; S Benn, ‘Privacy, Freedom, and Respect for Persons’ in F Schoeman (ed), Philosophical Dimensions of Privacy (CUP, 1984) 303. 9See D Solove, Understanding Privacy (Harvard University Press, 2008) 10. 10J Rule, Privacy in Peril (OUP, 2007) xi. 194 M.H. Murphy where the idea of protecting privacy rights is viewed by many as abhorrent pandering to terrorists and criminals.11 Such complacency is occasionally checked, however. Often this task is performed by the press, such as when the News of the World phone hacking scandal was exposed.12 When reports emerged exposing the phone hacking of celebrities, politicians, and members of the Royal Family, there was mild public interest.13 When the recognisable and relatable figure of Millie Dowler and her family became part of the story, however, the increased level of outrage was palpable.14 Revelations like this make people stop and think, turn the intangible into the material and remind people that privacy is a right worth protecting. This article considers how non-voluntary transparency has influenced sur- veillance policy in the past by examining the aftermath of the Watergate scandal and the Bush administration warrantless wiretapping scandal. The Edward Snowden revelations have, once again, brought the question of privacy to the fore of public consciousness. By refusing to view this latest scandal in isolation, this article gains insight from previous experiences. This article considers the effect of the Snowden revelations on public opinion and assesses the implications of the disclosures from the European perspective. Transparency is highlighted as a crucial regulating force on excessive government interfer- ence with privacy rights. Watergate and the Church Committee During the Cold War, public anxiety was high and the threat posed by the Soviet Union was keenly felt. With the Cold War being waged through technological and political compe- tition, the importance of espionage and the fear of foreign spies rose.15 This environment enabled the rapid expansion of the powers and capabilities of government investigative agencies.16 In spite of the fact that public perception tends to associate the abuses exposed following the Watergate scandal solely with the Nixon administration, such a 11C Gearty, ‘Reflections on Civil Liberties in an Age of Counterterrorism’ (2003) 41 OHLJ 185, 187. 12The Guardian, Phone Hacking:
Recommended publications
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • Frank Church, And/ Or United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, And/Or U.S
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84652B 11 July 2017 JOHN GREENEWALD Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 7 June 2016 for Intellipedia pages on the Church Committee, and/ or Frank Church, and/ or United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, and/or U.S. Senate Select Committee on Intelligence. A copy of your request is enclosed. In our initial response to you, dated 8 June 2016, we informed you that this request was assigned case number 84652 and that there are no assessable fees for this request. We provided you with two responsive documents on 12 August 2016 and informed you that we continued to work on your case. The final responsive documents are enclosed. This Agency is authorized by statute to protect certain information concerning its activities (in this case, internal URLs) as well as the names of its employees. Such information is exempt from disclosure pursuant to the third exemption of the FOIA, which provides for the withholding of information specifically protected from disclosure by statute.
    [Show full text]
  • Executive Order 12,333: Unleashing the CIA Violates the Leash Law Sherri J
    Cornell Law Review Volume 70 Article 6 Issue 5 June 1985 Executive Order 12,333: Unleashing the CIA Violates the Leash Law Sherri J. Conrad Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Sherri J. Conrad, Executive Order 12,333: Unleashing the CIA Violates the Leash Law, 70 Cornell L. Rev. 968 (1985) Available at: http://scholarship.law.cornell.edu/clr/vol70/iss5/6 This Note is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. EXECUTIVE ORDER 12,333: "UNLEASHING" THE CIA VIOLATES THE LEASH LAW "Security is like liberty in that many are the crimes committed in its name." On December 4, 1981, President Ronald Reagan promulgated Executive Order 12,333, establishing United States intelligence guidelines. 2 Restrictions on the Central Intelligence Agency (CIA) were instituted in the 1970s in response to disclosures of wide- spread wrongdoing.3 The Order reflects the President's determina- tion to "unleash" 4 America's intelligence community5 from those limitations. The Order allows the CIA, America's chief foreign in- telligence gathering entity, to direct domestic counterintelligence, foreign intelligence, covert operations, and law enforcement activity against United States citizens. 6 The drafters of the Order ignored the statutory limits on intelligence gathering activity codified in the National Security Act. 7 The President's action thus constitutes a statutorily impermissible license for renewed government intrusion, and the Order should be revoked.
    [Show full text]
  • Congressional Oversight of Intelligence: Background and Selected Options for Further Reform
    Congressional Oversight of Intelligence: Background and Selected Options for Further Reform December 4, 2018 Congressional Research Service https://crsreports.congress.gov R45421 SUMMARY R45421 Congressional Oversight of Intelligence: December 4, 2018 Background and Selected Options for Further Michael E. DeVine Reform Analyst in Intelligence and National Security Prior to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) in 1976 and 1977, respectively, Congress did not take much interest in conducting oversight of the Intelligence Community (IC). The Subcommittees on the Central Intelligence Agency (CIA) of the congressional Armed Services Committees had nominal oversight responsibility, though Congress generally trusted that IC could more or less regulate itself, conduct activities that complied with the law, were ethical, and shared a common understanding of national security priorities. Media reports in the 1970s of the CIA’s domestic surveillance of Americans opposed to the war in Vietnam, in addition to the agency’s activities relating to national elections in Chile, prompted Congress to change its approach. In 1975, Congress established two select committees to investigate intelligence activities, chaired by Senator Frank Church in the Senate (the “Church Committee”), and Representative Otis Pike in the House (the “Pike Committee”). Following their creation, the Church and Pike committees’ hearings revealed the possible extent of the abuse of authority by the IC and the potential need for permanent committee oversight focused solely on the IC and intelligence activities. SSCI and HPSCI oversight contributed substantially to Congress’s work to legislate improvements to intelligence organization, programs, and processes and it enabled a more structured, routine relationship with intelligence agencies.
    [Show full text]
  • Supreme Court of the United States ______
    No. 13-58 In the Supreme Court of the United States ______ IN RE ELECTRONIC PRIVACY INFORMATION CENTER, Petitioner _______ On Petition for a Writ of Mandamus and Prohibition, Or a Writ of Certiorari to the Foreign Intelligence Surveillance Court _______ AMICUS CURIAE BRIEF OF FORMER MEMBERS OF THE CHURCH COMMITTEE AND LAW PROFESSORS IN SUPPORT OF PETITIONERS _______ LAURA K. DONOHUE ERWIN CHEMERINSKY Professor of Law (Counsel of Record) Georgetown University Dean, Distinguished Law Center Professor of Law 600 New Jersey Ave., NW University of California, Washington, DC 20001 Irvine School of Law (202) 662-9455 401 E. Peltason Dr. lkdonohue@ Suite 1000 law.georgetown.edu Irvine, CA 92697 (949) 824-7722 [email protected] August 12, 2013 i QUESTION PRESENTED Did the Foreign Intelligence Surveillance Court exceed its authority to authorize foreign intelligence surveillance under 50 U.S.C. §1861, when it directed Verizon Business Network Services to provide, on an ongoing basis, all call detail records of communications wholly within the United States to the National Security Agency? ii TABLE OF CONTENTS IDENTITY AND INTEREST OF AMICUS CURIAE ....................................................................... 1 SUMMARY OF ARGUMENT ..................................... 2 ARGUMENT ............................................................... 3 I. Congress introduced the Foreign Intelligence Surveillance Act to prevent intelligence agencies from engaging in broad domestic surveillance ..... 3 A. The NSA has a history of conducting broad domestic surveillance programs under the guise of foreign intelligence ............................. 5 1. The NSA understood foreign intelligence to involve the interception of communications wholly or partly outside the United States and not targeted at U.S. persons ................. 6 2. Project MINARET introduced to collect foreign intelligence information, ended up intercepting hundreds of U.S.
    [Show full text]
  • Keeping the US Hand Well Hidden: the Role of the Church Committee in Rethinking US Covert Intervention in the 1970S
    Keeping the US Hand Well Hidden: The Role of the Church Committee in Rethinking US Covert Intervention in the 1970s Julia Kropa A thesis submitted in partial fulfillment of the requirements for the degree of BACHELOR OF ARTS WITH HONORS DEPARTMENT OF HISTORY UNIVERSITY OF MICHIGAN April 2, 2018 Advised by Professor Victoria Langland TABLE OF CONTENTS Acknowledgments…………………………………………………………………………..ii Timeline……………………………………………………………………………………iii Introduction…………………………………………………………………………………1 Chapter 1: US Covert Involvement and the Death of General Schneider…………………14 The Election of 1970 and Escalation of US Involvement…………………………16 Creating an Atmosphere of Overthrow……………………………………………26 The Aftermath of General Schneider’s Death……………………………………..37 Chapter 2: The Formation of the Church Committee……………………………………..42 The Origins of the Church Committee…………………………………………….45 White House Opposition to the Church Committee……………………………….59 The Committee’s Purpose for Investigating Assassination Plots………………….66 Chapter 3: The Church Committee Investigates Assassination Plots……………………..70 The Church Committee’s Investigation…………………………………………...73 The Investigation Reaches the White House………………………………………81 The Committee’s Interim Report and its Findings………………………………...91 Conclusion…………………………………………………………………………………96 Appendix 1……………………………………………………………………………….102 Appendix 2……………………………………………………………………………….107 Bibliography……………………………………………………………………………...109 i Acknowledgments First and foremost, thank you to my advisor, Professor Victoria Langland, for her guidance and encouragement at every stage of this project from my initial thoughts to the end product. I would like to thank the LSA Honors Program and the History Department for generously providing funding for my research and writing. I am also thankful to my writing group, Maggie and Noah, for reading my many drafts and offering feedback at every step in the process. Many thanks to Emily for listening to me for a year and a half talking and brainstorming out loud, and for forcing me to always keep on working.
    [Show full text]
  • NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]
  • The Role of the Telecommunications Industry in Electronic Surveillance
    Beyond Privacy and Security: The Role of the Telecommunications Industry in Electronic Surveillance Mieke Eoyang* INTRODUCTION On a Sunday in September 1975, a young lawyer on the Church Committee named Britt Snider drove to Maryland for a meeting with Dr. Lou Tordella, the retired civilian head of the National Security Agency (NSA). The Committee was investigating an NSA program codenamed SHAMROCK, which collected copies of all telegrams entering and exiting the United States. Tordella told Snider how every day, an NSA courier would hand carry reels of tape from New York to the NSA headquarters at Fort Meade. According to Tordella, all of the big international telegram carriers cooper- ated out of a sense of patriotism; they were not paid for their service. Snider suggested that the companies should have known that the government might abuse the situation to spy on American citizens. Tordella warned that the Committee’s exposure of the companies’ involvement could discourage them and others from cooperating with the government in the future. The companies received assurances from the Attorney General that their conduct was legal. They were nevertheless concerned and sought immunity from prosecution.1 This episode replayed itself half a century later, when the administration of George W. Bush assured private industry that its involvement in a questionable government surveillance program was perfectly legal. Surveillance experts often describe the balancing act between the interests of government and the interests of individuals. Frequently left out are the interests of private industry, without which electronic surveillance in the twenty-first century would be impossible. Government intelligence agencies rely on compa- nies who compete in a global market.
    [Show full text]
  • Church Committee Report
    94TH CONGRESS SENATE J REPORT 2d Ssion f 1 No. 94-755 FOREIGN AN]) MILITARY INTELLIGENCE BOOK I FINAL REPORT OF THE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES UNITED STATES SENATE TOGETHER WITH ADDITIONAL, SUPPLEMENTAL, AND SEPARATE VIEWS APRIL 26 (legislative day, APRIL 14), 1976 U.S. GOVERNMENT PRINTING OFFICE 69-983 WASHINGTON : 1976 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C. 20402 - Price $5.35 Stock No. 052-071-00470-0 SENATE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES FRANK CHURCH, Idaho, Chairman JOHN G. TOWER, Texas, Vice Chairman PHILIP A. HART, Michigan HOWARD H. BAKER, JR., Tennessee WALTER F. MONDALE, Minnesota BARRY GOLDWATER, Arizona WALTER D. HUDDLESTON, Kentucky CHARLES MCC. MATHIAS, Ja., Maryland ROBERT MORGAN, North Carolina RICHARD S. SCHWEIKER, Pennsylvania GARY HART, Colorado WILLIAM G. MILLER, Staff Director FREDERICK A. 0. SCHWARZ, Jr., Chief Counsel CURTIs R. SMOTHERS, Counsel to the Minority AUDREY HATRY, Cler of the Committee (II) XVI. DISCLOSURE OF BUDGET INFORMATION ON THE INTELLIGENCE COMMUNITY At the present time the aggregate amount spent for the intelligence activities of the United States Government is classified. The individual budgets for the Central Intelligence Agency, the National Security Agency, and certain other units within the Department of Defense which gather national intelligence are likewise classified. The budgets for these agencies-which spend billions of dollars annually-are kept not only from the American people but also from most Members of Congress. This secrecy prevents the public and most Members of Congress from knowing how much is spent on national intelligence and from determining whether that amount is consistent with other national needs and priorities.
    [Show full text]
  • Cointelpro, Anatol Rapoport, and the Church Committee
    COINTELPRO, ANATOL RAPOPORT, AND THE CHURCH COMMITTEE: BALANCING SECURITY AND ACCOUNTABILITY An Honors Thesis Presented to the Honors Program of Angelo State University In Partial Fulfillment of the Requirements for Highest University Honors BACHELOR OF SECURITY STUDIES by JANE BACON May 2021 Major: Intelligence and Analysis COINTELPRO, ANATOL RAPOPORT, AND THE CHURCH COMMITTEE: BALANCING SECURITY AND ACCOUNTABILITY by JANE BACON APPROVED: Dr. Shirley Eoff Mark Jarmon May 5, 2021 APPROVED: Dr. Shirley M. Eoff Director of the Honors Program ACKNOWLEDGEMENTS Jane Bacon would like to thank the following people: her advisor, Dr. Shirley Eoff, for her tireless support and hundreds of edits that brought this thesis to its current level and her defense committee member, Mr. Mark Jarmon, for his assistance and willingness to take the time to make this a success. She would like to extend special thanks to Anthony Rapoport for sharing his time and memories of his father, FBI Historian John Fox for the idea for this thesis, and Dr. Loch K. Johnson for sharing his expertise and memories of the Church Committee. Finally, she would like to thank her family for their unwavering love and support. iii ABSTRACT In 1975, the Senate designated a Committee, generally referred to as the Church Committee, to investigate the unlawful actions of Intelligence Community member agencies such as the FBI and the CIA. During the preceding decade, the FBI had conducted several programs that infringed on American citizens’ rights, particularly in their Counterintelligence Program [COINTELPRO]. Although much research has been done into the effect that COINTELPRO had on the civil rights movement of the 1960s, the academics who were targeted due to their opposition to the Vietnam War have largely gone unnoticed.
    [Show full text]
  • GOVERNMENT SPONSORED BLACKMAIL? Mass Surveillance and the Threat to Personal Privacy Ben Woodfinden
    1st Place Essay Contest Winner Undergraduate Category GOVERNMENT SPONSORED BLACKMAIL? Mass Surveillance and the Threat to Personal Privacy Ben Woodfinden CANADIAN STUDENT REVIEW WINTER 2016 13 dward Snowden is a No. 755 at 227-230 (1976)). Every polarizing figure. Yet even presidential administration since his detractors must concede Franklin Roosevelt’s has made use of Ethat the information he disclosed the state apparatus to spy on political about the surveillance operations opponents (Downs, 2013, June 14). In of the US National Security Agency the early 1970s, a series of scandals (NSA) and other security agencies involving American intelligence worldwide have led to an important agencies shook public trust in the US public discussion on surveillance and government. Between 1968 and 1975, civil liberties in the post-9/11 world. public trust in government dropped from 61% to 36% (Pew Research Centre, 2014). As a result, Congress Snowden’s disclosures have initiated the Church Committee raised a series of important in 1975 to investigate American intelligence gathering in the wake of legal, philosophical, and political these revelations (Senate Historical questions. Office, 1975). Snowden’s disclosures have The final Church Committee raised a series of important report, published in 1976, revealed legal, philosophical, and political widespread and systematic abuses questions. Do mass surveillance of power (Senate Select Committee, programs actually keep us safer? No. 755 at 16-17 (1976)). On multiple More fundamentally, can we trust occasions, the CIA, FBI, and NSA the government not to misuse the violated the fundamental rights of information it gains through mass peaceful American citizens. One surveillance? In the United States, specific example is worth highlighting.
    [Show full text]
  • The USA PATRIOT Act and Punctuated Equilibrium
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2016 The SU A PATRIOT Act and Punctuated Equilibrium Michael Sanders Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Law Commons, Other History Commons, and the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Michael Sanders has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Mark Stallo, Committee Chairperson, Public Policy and Administration Faculty Dr. Ross Alexander, Committee Member, Public Policy and Administration Faculty Dr. Tanya Settles, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2016 Abstract The USA PATRIOT Act and Punctuated Equilibrium by Michael L. Sanders MS, Thomas A. Edison State College, 2012 BA, Thomas A. Edison State College, 2007 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University August 2016 Abstract Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law.
    [Show full text]