Back in 1978, the nation was enjoying a summer listening to Rod Stewart’s Do Ya Think I’m Sexy and getting down with A Taste of Honey’s Boogie Oogie Oogie. Vietnam and Watergate were over and President Carter was presiding over a sluggish economy and trying to push through intelliigence reforms.
The reforms were inspired not only by the revelations of Watergate but by the revelations of the Church Committee. Frank Church was a liberal Senator from Idaho (imagine!) who held extensive hearings throughout 1975 and 1976. At the time, Dick Cheney was Gerald Ford’s Chief of Staff, and Donald Rumsfeld (who was also Chief of Staff for a while) was the Defense Secretary.
The Church Committee had an entire report dedicated to the National Security Agency. It was called Volume 5: The National Security Agency and Fourth Amendment Rights. Does this all sound relevant to today? I wish every American would sit down and read the documents from that report.
But to make things simple, I will provide some shortcuts.
The Prepared Statement of Attorney General Edward H. Levi.
And here are the opening statements of the Chairman Church and Ranking Member John Tower of Texas.
This morning, the committee begins public hearings on the National Security Agency or, as it is more commonly known, the NSA. Actually, the Agency name is unknown to most Americans, either by its acronym or its full name. In contrast to the CIA, one has to search far and wide to find someone who has ever heard of the NSA. This is peculiar, because the National Security Agency is an immense installation. In its task of collecting intelligence by intercepting foreign communications, the NSA employs thousands of people and operates with an enormous budget. Its expansive computer facilities comprise some of the most complex and sophisticated electronic machinery in the world.
Just as the NSA is one of the largest and least known of the intelligence agencies, it is also the most reticent. While it sweeps in messages from around the world, it gives out precious little information about itself. Even the legal basis for the activities of NSA is different from other intelligence agencies. No statute establishes the NSA or defines the permissible scope of its responsibilities. Rather, Executive directives make up the sole “charter” for the Agency. Furthermore. these directives fail to define precisely what constitutes the “technical and intelligence information” which the NSA is authorized to collect. Since its establishment in 1952 as a part of the Defense Department, representatives of the NSA have never appeared before the Senate in a public hearing. Today we will bring the Agency from behind closed doors.
The committee has elected to hold public hearings on the NSA only after the most careful consideration. For 23 years this agency has provided the President and the other intelligence services with communications intelligence vital to decision-making within our Government
(1)
2
councils. The value of its work to our national security has been and will continue to be inestimable. We are determined not to impair the excellent contributions made by the NSA to the defense of our country. To make sure this committee does not interfere with ongoing intelligence activities, we have had to !be exceedingly careful, for the techniques of the NSA are of the most sensitive and fragile character. We have prepared ourselves exhaustively; we have circumscribed the area of inquiry to include only those which represent abuses of power; and ave have planned the format for today’s hearing with great care, so as not to venture beyond our stated objectives.
The delicate character of communications intelligence has convinced Congress in the past not to hold public hearings on NSA. While this committee shares the concern of earlier investigative committees, we occupy a different position than our predecessors. We are tasked, by Senate Resolution 21, to investigate “illegal, improper, or unethical activities” engaged in by intelligence agencies, and to decide on the “need for specific legislative authority to govern operations of * * * the National Security Agency.” Never before has a committee of Congress been better prepared, instructed, and authorized to make an informed and judicious decision as to what in the affairs of NSA should remain classified and what may be examined in a public forum.
Our staff has conducted an intensive 5-month investigation of NSA, and has been provided access to required Agency files and personnel. NSA has been cooperative with the committee, and a relationship of mutual trust has been developed. Committee members have received several briefings in executive session on the activities of the Agency, including a week of testimony from the most knowledgeable individuals, in an effort to determine what might be made public without damaging its effectiveness. Among others, we have met with the Directors of the NSA and the CIA, as well as the Secretary of Defense. Finally, once the decision was made to hold public hearings on then NSA, the committee worked diligently with the Agency to draw legitimate boundaries for the public discussion that would preserve the technical secrets of NSA, and also allow a thorough airing of Agency practices affecting American citizens.
In short, the committee has proceeded cautiously. We are keenly aware of the sensitivity of the NSA, and wish to maintain its important role in our defense system. Still, we recognize our responsibility to the American people to conduct a thorough and objective investigation of each of the intelligence services. We would be derelict in our duties if we were to exempt NSA from public accountability. The committee must act with the highest sense of responsibility during its inquiry into the intelligence services. But it cannot sweep improper activities under the rug — at least not if we are to remain true to our oath to uphold the Constitution and the laws of the land.
We have a particular obligation to examine the NSA, in light of its tremendous potential for abuse. It has the capacity to monitor the private communications of American citizens without the use of a “bug” or “tap.” The interception of international communications signals sent through the air is the job of NSA; and, thanks to modern technological developments, it does its job very well. The danger lies in the ability of the NSA to turn its awesome technology against domestic communications. Indeed, as our hearing into the Huston plan demonstrated,
3
a previous administration and a former NSA Director favored using this potential against certain U.S. citizens for domestic intelligence purposes. While the Huston plan was never fully put into effect, our investigation has revealed that the NSA had in fact been intentionally monitoring the overseas communications of certain U.S. citizens long before the Huston plan was proposed-and continued to do so after it was revoked. This incident illustrates how the NSA could be turned inward and used against our own people. It has been the difficult task of the committee to find a way through the tangled webs of classification and the claims of national security — however valid they may be — to inform the American public of deficiencies in their intelligence services. It is not, of course, a task without risks. but it is the course we have set for ourselves. The discussions which will be held this morning are efforts to identify publicly certain activities undertaken by the NSA which are of questionable propriety and dubious legality.
General Allen, Director of the NSA, will provide for us today the background on these activities, and he will be questioned on their origins and objectives by the committee members. Like the CIA and the IRS, the NSA, too, had a “watch list” containing the names of U.S. citizens. This list will be of particular interest to us this morning, though we will take up another important subject as well. The dominant concern of this committee is the intrusion by the Federal Government into the inalienable rights guaranteed Americans by the Constitution. In previous hearings, ave have seen how these rights have been violated by the intelligence services of the CIA, the FBI, and the IRS. As the present hearings will reveal, the NSA has not escaped the temptation to have its operations expanded into provinces protected by the law.
While the committee has found the work of the NSA on the whole to be of a high caliber and properly restrained and has tremendous respect for the professional caliber of the people who work there, the topics we shall explore today do illustrate excesses and suggest areas where legislative action is desirable. That is why we are here.
Senator Tower would like to make an opening statement.
John Tower’s opening statement:
Mr. Chairman, I shall be brief. From the very beginning, I have opposed the concept of public hearings on the activities of the NSA. That opposition continues, and I should like to briefly focus on the reasons I believe these open hearings represent a serious departure from our heretofore responsible and restrained course in the process of our investigation.
To begin with, this complex and sophisticated electronic capability is the most fragile weapon in our arsenal; and unfortunately, I cannot elaborate on that, because that would not be proper. Public inquiry on NSA, I believe, serves no legitimate legislative purpose, while exposing this vital element of our intelligence capability to unnecessary risk, a risk acknowledged in the chairman’s own opening statement.
S. Res. 21 does authorize the NSA inquiry, and this has been done very thoroughly in closed session. But that same resolution also picks up a recurring theme of the floor debate upon the establishment of this committee. Specifically, we were admonished not to disclose outside
4
the committee information which would adversely affect intelligence activities. In my view, the public pursuit of this matter does adversely affect our intelligence-gathering capability.
Even if the risks were minimal — and I do not believe they are minimal — the NSA is the wrong target. The real quarry is not largely mechanical response of military organizations to orders. The real issues of who told them to take actions now alleged to be questionable should be addressed to the policy level. It is more important to know why names were placed on a watch list than to know what the NSA did after being ordered to do so.
In summary, Mr. Chairman, I believe we have fallen prey to our own fascination with the technological advances of the computer age. We have invited a three-star military officer to come before us to explain the awesome technology and the potential abuses of a huge vacuum cleaner. We have done this despite the fact that our exhaustive investigation has established only two major abuses in 23 years, both of which have been terminated: And despite the obvious risks of this sensitive component of the Nation’s intelligence-gathering capacity, I am opposed to a procedure which creates an unnecessary risk of irreparable injury to the public’s right to be secure: even if offered under the umbrella of the acknowledged presumption of a citizen’s right to know.
In taking such risks we both fail to advance the general legislative purpose and, I believe, transgress the clearly expressed concerns of the Senate requiring us to, if we err at all, err on the side of caution. It is my view that there comes a point when the people’s right to know must of necessity be subordinated to the people’s right to be secure, to the extent that a sophisticated and effective intelligence-gathering capability makes them secure.
I do not think that any of us here, for example, would want us to sacrifice our capability for verification of Soviet strategic weapons capability. And whether or not that capability was thought posture in a first-strike configuration, I cite it only as an example. Hence, my opposition to the conduct of these public hearings.
I am aware, Mr. Chairman, that through the democratic process, the committee has, by a majority vote, voted to go this route. But I felt a compulsion to state my own reasons for being in opposition.
The CHAIRMAN. Senator Tower, I appreciate your statement, and I might say that there are two levels of concern in the committee, and relating to the two different practices that are of questionable legality. And so, we have divided this hearing into two parts, proceeding with the portion that has least objection from members of the committee who feel as Senator Tower does. And then we will have an opportunity to discuss further the second part. after General Allen has left the witness stand. And that is the procedure, that is satisfactory with you?
Senator TOWER. I accept the procedure, and it is totally satisfactory to me.
The CHAIRMAN. Very well.
In 1978, these abuses were finally addressed in the Foreign Intelligence Surveillance Act (FISA). It is ironic that Cheney and Rumsfeld are again a part of a government under investigation for illegally spying on Americans. But, given John Tower’s attitude back in 1975, it is not surprising that these people have no respect for the FISA reforms.
Back when the Church hearings on the NSA began, the American people had never heard of the top secret agency.
But on June 26th, 1978, the U.S. News and World Report did a big expose on the NSA. Here are some tidbits from that article:
In Moscow at the end of May, American agents discovered a secret shaft with Russian electronic devices in the U.S. Embassy. The Soviets insisted that they planted the devices as a defense against embassy’s sophisticated electronic eavesdropping operation, presumably run by the National Security Agency.
In Zaire in mid-May, Katangese rebels staged an invasion from neighboring Angola. President Carter maintains that he has conclusive evidence of Cuban involvement. The evidence includes messages intercepted by the National Security Agency.
What is this agency, and how does it operate? How has it managed to emerge unscathed – in fact, almost unmentioned – while the other U.S. intelligence arms were being pummeled by congressional investigations or the press over the past two years?
Actually, NSA, with its extraordinary skill at electronic snooping, is rated as Washington’s single most important source of intelligence, an importance that has been increased substantially by the recent sharp cutback in secret operations of the Central Intelligence Agency.
With listening posts around the world, in space, air and on land and sea, NSA not only monitors the communications of other governments but gathers and analyzes the radar transmissions of potentially hostile ships, planes and land stations. It tries to crack the codes of other nations and also devises the codes that protect American secrets.
Information gathered by NSA has warned Presidents of impending war, prevented a major terrorist attack in this country and headed off at least one assassination attempt.
Secret shafts in the America’s Moscow Embassy? Kinda makes me nostalgic for the Cold War.
NSA has been described as a giant electronic vacuum cleaner, scooping up all sorts of radio and wire communications, pouring them into the computers at Fort Meade, 15 miles north of Washington and spewing out the world’s secrets for the use of the President, other top government officials and military commanders in the field.
Sources of information for NSA range from simple little wiretap or electronic bugging devices to multimillion-dollar satellites that monitor the telementary signals sent out during other countries’ missile tests. Airplanes, ships and submarines constantly listen in others’ communications and record their radar signals. Technicians in ground stations collect the same type of information.
With this kind of worldwide intelligence-gathering network, largely shrouded in secrecy, questions have been raised as to whether the agency is spying on Americans as well as foreigners Congressional investigators learned, in fact, that NSA had obtained and distributed information about Americans in two operations. In one, code-named Shamrock, NSA received copies of overseas telegrams handled by three telegraph companies over period of nearly 30 years. In the other, code-named Minaret, NSA used lists of names supplied by other government agencies to screen international messages for information about Americans.
These documents abuses by NSA plus the secrecy with which it surrounds itself have helped to feed suspicions about other questionable activities it may be conducting. One of the most persistent rumors is that the agency routinely eavesdrop on telephone calls within this country.
The rumor is largely false. But there is just enough basis in fact to lend it credibility.
The deja vu is astounding. Here is a list of the NSA’s known accomplishments in 1978.
In the mid-1950s, the CIA tunneled under the border dividing West from East Berlin and tapped into three underground communications cables carrying 158 circuits. For months, NSA listened in on the line going from the Soviet military headquarters in East Germany to Moscow.
NSA got wind of a major terrorist attack and tipped off the FBI in time to prevent the operation.
An attempt on the life of a prominent American in a foreign country was thwarted because of information intercepted by the agency.
Just before the Arab-Israeli war of 1973, NSA came up with hard information that an attack by the Arabs was with hard information than an attack by the Arabs was imminent, but the information was discounted because such an attack did not make military sense.
The agency reportedly learned the Soviet bargaining position in the first strategic-arms-limitation talks, giving American negotiators an enviable advantage.
For years, NSA eavesdropped on the conversations of Premier Nikita Khrushchev and other Soviet leaders as they chatted with each other and with the Kremlin over the radiotelephones in their cars.
Keep all of this in mind (both the good and the bad) while we watch these hearings. One thing is for sure: Cheney and Rumsfeld never wanted FISA passed in the first place. It should surprise no one that they chose not to abide by the law.
xlent history lesson, professor. are the hearings being televised on cspan again today? if so, when?
I’ve added a separate scrollbox for Tower’s opening statement. It was all the same rhetoric we are hearing from the administration today.
In D.C. they call it No Such Agency. I almost got a job there as a translator in the 1970s. Incredibly scary place, Ft. Meade between Baltimore and D.C. Armed Marine guards at all the corridor intersections INSIDE the building.
Yesterday’s hearing with Gonzalez was demoralizing. What will it take before we get really genuine probing hearings?
I’ve always thought Gonzalez was an ignorant, fork-tongued minion, not fit to be hired as a junior associate. And he’s just like Bush, with a perpetual condescending smirk. Watching hours of him yesterday did not change these impressions. However, I was impressed by how many details of unreasonable legal interpretations he had memorized. I don’t think he’s very smart, but it’s obvious he works hard. I sure hope to see him get tagged with a perjury charge.
Scary indeed. The part of the CIA that liased with the NSA for years was called, simply, “Staff D”. Staff D was also the unit where assassination plots against Castro, Lumumba, Sukarno and other world leaders were hatched. Very scary.
Well, there you go again, Booman! Impressing me to the hilt! Thanks for the every good diary about what is being repeated for us again yesterday, and always, from the same crowd of evil doers.
I sort of remember this happening. I was way to busy with my job and raising a family to pay tooo much attention to them..but now look at where we are again…same ol feces. I wonder if we will ever be free of them..it is like a virus growing and becoming immune to the treatment of said virus.
It is like a necessary evil that we seem to have to have but without any check and balances on it. Scary!!! to say the least.
Thanks again for your integrity and for doing such a good job for us here as always….hugs
Here is another snippet from the Church Committee:
The major facts regarding CIA domestic mail opening may be summarized as follows:
a. The CIA conducted four mail opening programs in four cities within the United States for varying lengths of time between 1953 and 1973: New York (1953-1973) ; San Francisco (four separate occasions, each of one to three weeks duration, between 1969 and 1971) ; New Orleans (three weeks in 1957) ; and Hawaii (late 1954 — late 1955). The mail of twelve individuals in the United States, some of whom were American citizens unconnected with the Agency, was also opened by the CIA in regard to particular cases.
b. The stated purpose of all of the mail opening programs was to obtain useful foreign intelligence and counterintelligence information. At least one of the programs produced no such information, however, and the continuing value of the major program in New York was discounted by many Agency officials.
c. Despite the stated purpose of the programs, numerous domestic dissidents, including peace and civil rights activists, were specifically targeted for mail opening.
d. The random selection of mail for opening, by CIA employees untrained in foreign intelligence objectives and without substantial guidance from their superiors, also resulted in the interception of communications to or from high-ranking United States government officials, as well as journalists, authors, educators, and businessmen.
e. All of the mail opening programs were initiated without the prior approval of any government official outside of the Agency.
f. Only five Cabinet level officials, and possibly one President, were briefed in varying degrees of detail about the New York program during the twenty years it continued, and there is no conclusive evidence that any of these officials ever authorized — or knew of — the mail opening aspect of the project. The evidence suggests that in the cases of some of these officials, their professed lack of knowledge about mail opening was due to a stated desire to remain ignorant of the details of the program.
g. No high-ranking government official was ever briefed about three of the four mail opening programs.
h. Postal officials whose cooperation was necessary to effect the programs were purposefully misled as to the purpose of the projects, the question of custody of the letters, and the fact of mail opening itself.
i. One President of the United States, whether through design or negligence, was given false and misleading information about the existence of CIA mail opening programs. In 1970, the Director of Central Intelligence signed a document for submission to the President which stated that all mail opening programs by federal agencies had been discontinued. This Director knew that at that time the most extensive CIA mail opening program continued to operate in New York.
j. Within the Agency itself, two former Directors of Central Intelligence did not authorize and apparently did not even know about any of the mail opening programs that were conducted during their tenure. Another former Director was unaware of at least one mail opening project during his term.
k. Some senior Agency officials whose approvals were sought in connection to one mail opening program were apparently deceived as to its true nature by middle-level officers. The senior officials were requested to authorize a mail cover operation only, but mail opening was both contemplated at the time of the requests and did in fact occur.
l. None of the programs was ever subjected to formal internal evaluation. Such review as did occur concluded that the largest of the programs were poorly administered and without substantial benefit to the CIA. These conclusions were ignored and the project continued.
m. Because of the extreme sensitivity of the projects and the internal pattern of compartmentation, many of those CIA components which could have derived the greatest foreign intelligence value from the product were not even aware of the mail opening programs.
n. Most of the major participants in the mail opening programs believed that the Agency’s activities in this area were unlawful. No definitive legal opinion was ever sought from the CIA’s General Counsel, and the evidence suggests that knowledge of the programs was purposefully withheld from him for security reasons.
o. The general reaction among Agency officials to the perceived illegality of mail opening was to fabricate “cover stories” for public consumption and to agree on a public denial of CIA domestic mail opening activity in the event such activity were exposed.
p. During periods of active Congressional investigation into invasions of privacy by federal agencies, and when persons knowledgeable of CIA mail openings were in a position to be called to testify before Congress, security precautions for mail opening programs were tightened to reduce the risk of exposure.
q. In part because of his “secrecy agreement” with the Agency, a former CIA employee who was in a position at the Postal Service to force the termination of a mail opening program was inhibited from doing so for several years. His loyalty to the CIA, even after he left its service, prevented him from informing the Postmaster General of its existence.
r. The largest of the mail opening projects was not terminated until 1973, when, in the charged political climate of the times, it was considered too great a “political risk” to continue. It was not terminated because it was perceived to be illegal per se.
The general reaction among Agency officials to the perceived illegality of mail opening was to fabricate “cover stories” for public consumption and to agree on a public denial of CIA domestic mail opening activity in the event such activity were exposed.
Amusing as Kennedy’s Hoover anecdote was, this finding deserves to be remembered as we listen to the various stories emerging from administration officials.
There are also greater obstacles in place to prevent discovering what surveillance is being (& has been) done:
spying on anti-Vietnam War protesters and protest groups.
Nixon seems to have shared Bush’s belief that the President can do as he pleases. This from Landmark Cases of the Supreme Court:
The “Frost” is, of course, David Frost and we could use some interviewers like him today.
May I ask a question? I know it sounds silly, but has any of our intel agencys evesdropped on on any of our presidents?….especailly the NSA…and maybe the CIA…well just about any letter in the alphabet
Not eavesdropping per se, but the Joint Chiefs got caught spying on Kissinger & Nixon.
The White House internal email system was installed in the waning days of the Carter Administration by the NSA.
Apparently, none of the Reaganauts realised that the “delete” function only wiped their access, for when Ollie North deleted all his Iran/Contra/Cocaine messages, and shredded the hardcopies with the assistance of Fawn Hall, the “deleted” messages turned up in the hands of the Congressional investigating committees.
I assume that if any of the Reagan crew knew the “delete” was incomplete, they’d all have eventually picked it up via cafeteria gossip.
do you think america cares about this?
i just dont see it.
this is just more depressing
however i did read that firedoglake article today and my spirits rose.
How many examples has the White House given of terrorist attacks on the USA that were foiled by NSA domestic spying? I think there was one that was debunked. How many detailed, clear-cut examples do they have?
Nice piece! We really are seeing a rehash today, only some of the characters have been stewing over the ‘diminution’ of executive power for 30 years now. That’s why tehya re fighting so aggressively now. While I doubt they want this battle, now that two likely pro-executive power justices sit on the supreme court, they must be feeling more cocky.
Aprops of nothing, the son of AG Edward Levi sits on the federal bench today in Sacramenot. Pretty conservative.
The NYT ran a piece similar to yours on Monday, For Some, Spying Controversy Recalls a Past Drama, by Scott Shane which hda this from Mondale:
“…the nation was enjoying a summer listening to Rod Stewart’s Do Ya Think I’m Sexy…”
Umm, in 1978 this citizen wasn’t enjoying a single goddamn song that had been recorded in the previous five years, especially that one.
If you didn’t live the horror of the disco years, I guess you can’t know…
So, you decided to write them in numerical order?
This brings back a lot of memories, although I was really too young to appreciate the immensity of Frank Church taking on the NSA. So its like seeing it through a haze.
It was a different time back then. The Democrats had a solid majority and the Republicans were in disarray over Watergate. Liberal wasn’t a dirty word although people made fun of the tree hugging far left; conservative was a dirty word, or at least a Goldwater conservative was.
I don’t think you should underestimate the importance of Watergate in the equation though. It was watergate and its investigation that emboldened the Democrats in congress. Even with a solid majority it may not have been possible for Church to have held these type of hearings unless the world was already being turned upside down by Watergate. And without Watergate and a weak replacement Republican president, the hearings might have been swept under the carpet rather than eventually leading to FISA.
It IS depressing to see that we are going over the same ground, albeit in a weaker position. But, while recognizing the similarities between then and now, it also helps to focus on the differences too, especially the differences in the leverage people like Church had then versus the lack of leverage ANY Democrat has now.
Even though you didn’t say it, that is a huge compliment, because that is exactly the sentiment that I wanted to elicit.
say what?
oh
great piece Booman.
How’s that for massaging your ego 🙂