ERVIN HEARINGS ON PRIVACY, III TESTIMONY OF JOHN M. O'BRIEN, EDWARD D. SOHIER, AND LAURENCE F. LANE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP73B00296R000200160001-2
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
6
Document Creation Date:
December 9, 2016
Document Release Date:
August 20, 2001
Sequence Number:
1
Case Number:
Publication Date:
May 19, 1971
Content Type:
OPEN
File:
Attachment | Size |
---|---|
![]() | 1.19 MB |
Body:
19, 1971
Approved F4;:?611tfis%?.(9g11/38/181tVDPs7M9116R000200160001-2
S 7313
with the letter and intent of the Voting
Rights Act, and
Whereas, recent judicial decisions have
raised the possibility of certain provisions of
the Voting Rights Act of 1965 being applied
so as to nullify past annexations;
Now, therefore, be it resolved that the
Municipal Association of South Carolina in
31st annual convention assembled pledge its
support to a bill to be introduced into the
United States House of Representatives by
Congressman Floyd Suence, which would
amend the Voting Rights Act of 1965 so as
to provide that failure on the part of the
State of South Carolina or any political sub-
division thereof to comply with any provision
of this section shall not have the effect of
interfering with, nullifying, terminating, or
rendering without force and effect any an-
nexation, on or before January 14, 1971, in
connection with any municipality in such
State;
Be it further resolved that copies of this
resolution be forwarded to each member of
the ? th (Ain; ? ? ? ?
,;arjorlf0
E TIN H ARINGS ON PRIVACY, III?
TESTIMONY OP JOHN M. O'BRIEN,
EDWARD D. SOHIER, AND LAT./-
. RENCE F. LANE
Mr; ERVIN. Mr. President, today I
would like to place in the CONGRESSIONAL
RECORD the prepared statements of three
former Army intelligence agents who tes-
tified this pist February at the Consti-
tutional Rights Subcommittee's hearings
into the Government's data collection
activities.
On December 16, 1970, I announced
here on the Senate floor that I had re-
ceived information which, if true, indi-
cated the Army has been extensively en-
gaged in the surveillance of civilian polit-
ical activities. My information at that
time was in the form of a letter which
I read to the Senate that day. Today,
I would like to place in the RECORD the
statement prepared for our hearings by
the author of that letter, former military
intelligence agent John M. O'Brien.
In addition to Mr. O'Brien's testimony
I think the statements of Mr. Edward D.
Sohier and Mr. Laurence F. Lane should
be printed in the CONGRESSIONAL RECORD
for all Americans to read. Mr. Sohier
spent 15 months on duty with the coun-
terintelligence analysis division. During
this time he served as the only enlisted
man on a task force created by the
Office of the Assistant Chief of Staff for
Intelligence?OASCI?to handle con-
gressional inquiries into the Army's civil
disturbance program.
Mr. Lane was an infantryman but was
detailed to the Intelligence and Security
Section of the 5th Infantry Division at
Fort Carson, Colo., from December 1968
to June 1970. His testimony gives us an
Insight into the intelligence activities of
the Continental Army Command?
CONARC. -
Mr. President, the statements of these
three men plus the statements of Chris-
topher H. Pyle and Ralph M. Stein which
I introduced earlier together give us a
clear picture of how widespread the
Army's involvement in surveillance pro-
grams actually was. I ask unanimous
consent that the statements of Mr.
O'Brien, Mr. Sohier and Mr. Lane be
printed in the RECORD at this point.
There being no objection. the state-
ments were ordered to be printed in the
RECORD, as follows:
STATEMENT OF JOHN M. O'BRIEN BEFORE THE
SUBCOMMITTEE ON CONSTITUTIONAL RIGHTS
OF THE SENATE COMMITTEE ON THE JUDICI-
ARY, FEBRUARY 24, 1971
Mr. Chairman, I thank you for the oppor-
tunity to appear before you and the Con-
stitutional Rights Subcom.mitee today. My
name is John O'Brien and I served in the
United States Army for almost five years.
My last four years on active duty were spent
as an Army Intelligence Agent, the first three
in Western Germany, where I was trained as
and performed the duties of an Army Intelli-
gence Case Officer. During these three years
I worked in the defensive counterespionage
field and most of my work was directed
against non-Americans, whose activities were
thought to be inimical to the national de-
fense interests of the United States. My last
year on active duty with the United States
Army was spent assigned to Region I, 113th
Military Intelligence Group, in Evanston,
Illinois. At Region I, I performed the duties
of an Army Intelligence Case Officer. My
duties at Region I were similar in nature to
my duties while assigned to Western Europe,
except that at Region I my activities were
directed almost exclusively against United
States citizens. I was honorably discharged
from the United States Army on June 8, 1970,
with the rank of staff Sergeant.
From June 1969 until approximately De-
cember 1969, I was assigned to the Special
Operations Section of Region I. During that
period, I worked primarily in undercover
operations. These undercover operations in-
cluded the recruitment, training and con-
trolling of undercover agents utilized by the
United States Army. On several occasions. I
personally performed as an undercover agent
as part of my assigned military duties. Spe-
cial Operations activities at Region I con-
sisted of the screening, investigation, recruit-
ment, training, targeting, and controlling of
individuals performing in an undercover
capacity for the United States Army. Such
activities were primarily directed against
civilian organizations and individuals. Spe-
cial Operations undercover activities were
controlled from Fort Holabird. Prior to the
initiation of an undercover operation, an
operations plan for the implementation of
the operation was written at either the
Region or Group level and forwarded to Fort
Holabird for approval. Once approval was
authorized by Fort Holabird, all aspects of
the operation were reported to Fort Holabird.
I also assisted the CONUS/Liaison Section
at Region I. The CONUS/Liaison Section
compiled personalfa information concerning
and monitored organizations and individuals
engaged in activities to oppose the United
States military involvement in Vietnam and
in other activities and associations thought
to be inimical to the national defense inter-
ests of the United States. Individuals in-
cluded within the sphere of interest of
CONUS included Adlai Stevenson III, Abner
Mikva, the individual plaintiffs in the trial
in Chicago, and many others including, news-
papermen, university professors, public offi-
cials and businessmen. At one period in late
1969, CONUS maintained dossiers concerning
approximately 800 civilian organizations
and individuals. These dossiers were com-
monly called the subversives files. The policy
throughout Region I was to obtain any in-
formation available concerning organizations
and individuals whose names were in a
CONUS dosier. The dossiers contained, among
other things, official military intelligence
reports concerning the activities of the target
organization or individual, copies of reports
from other federal and non-federal investi-
gative agencies, and copies of photographs
taken by either military intelligence agents
posing as members of the news media or as
free-lance photographers or by members of
the other investigative agencies. The CONUS
dossiers at Region I filled approximately
nine filing cabinets with four or five draw-
ers per cabinet. All the dossiers were stamped
confidential.
The CONUS/Liaison activities in which I
participated included the monitoring of
civilian organizations which was carried out
by military intelligence personnel who
Utilized radio cars, portable walkie-talkie
equipment, photographic equipment, partici-
pation in demonstrations, and the like. Pene-
tration was carried out by participation
(without disclosure) in public demonstra-
tions and activities.
In approximately January, 1970, my duties
were changed. I was then assigned to the
Special Investigations Branch of Region I.
However, I continued at the request of the
Region I Special Operations officer to partici-
pate in certain Special Operations activities
and in assistance to CONUS/Liaison until
approximately late May or early June, 1970.
My new duties with the Special Investiga-
tions Branch included personnel background
investigations of individuals under consid-
eration for security clearance, participation
in sabotage and espionage investigations,
and the conduct of liaison with local investi-
gative agencies within the area of the
Evanston field office of Region I.
After my discharge from the United States
Army I visited Region I approximately twice
monthly until the first week of December,
1970. During these visits I learned from con-
versations with personnel assigned both to
Special Operations and CONUS that the col-
lection of information concerning the ac-
tivities of civilians was still taking place,
and that Special Operations continued to
conduct undercover operations directed
against civilian organizations.
My concern as to the legitimacy and neces-
sity of my activities while assigned to Re-
gion I began in September 1969, when I wit-
nessed the initiation of a file concerning
Adiai Stevenson III. I concluded that such
activities posed a threat to every American's
right to freedom of expression and to the
system of government under which we have
lived in the United States 'since the inception
of the United States Constitution. It is out
of concern for those rights guaranteed to
every American citizen that I sought on
December 7, 1970, by a letter to Senator Ervin,
to appear before you today, and I thank you
again for the opportunity to have done so.
STATVMENT OF EDWARD D. SOHEER
In August 1970 I was separated from the
Army, honorably, with the Army Com-
mendation Medal and the rank of Specialist
5, E-5. I had spent nearly three years on
active duty, 15 months of which on duty
with the Counterintelligence Analysis Divi-
sion (CIAD), Directorate of Counterintel-
ligence, Office of the Assistant Chief of Staff
for Intelligence (OACSI) . I had entered the
Army in October 1967, taken basic training
at Fort Bragg, N.C., and was trained as a
military stenographer at Fort Benjamin Har-
rison, Indiana. In May 1968, I joined the 902d
Military Intelligence Group, which then
had administrative control of CIAD. In
January 1970, when the 902d MI Group be-
came part of the U.S. Army Intelligence Com-
mand, CIAD remained under the control of
OACSI.
My first encounter with the so-called
CONUS intelligence program was in my first
job at CIAD. That was assisting in the prep-
aration of the two-volume publication,
Personalities, Organizations, and Cities of
Interest, called by CIAD, the Compendium.
This book, which was to be updated five
times in the period I was with CIAD, was a
compilation of information on individuals
and organizations in this country which
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2
S 7314 Approved For RelemM/08/15, ? riVaTAI, 281119?INEY?
ssi 0160001-2
May , '71
were regarded as potentially involved in
lomestic disturbances, in particular, in cone
aection with anti-war and civil rights activi-
les. (included in the lists were organizations
euoh as Women's Strike for Peace. Southern
neristian Leadership Conference, National
Association for the Advancement of Colored
'eople, American Civil Liberties Union,
quaiter Aetion Committee, National Mobili-
:ei.tion Committee (to End the War in Viet-
lam), American Friends Service Commit-
Re, and many other such peace and civil
,ighes groups, as well as more radical groups
euch as Students for a Democratic Society.
_dlack Panther Party. and Weathermen. In-
iiyiduals listed included the late Dr. Martin
'iutlier King, Dr. Benjamin Spook, Dr. Ralph
Isberiiathy. H. Rap Brown, and Eldridge
;leaver.
The Ccmpendium was very widely dis-
eibuted by OACSI. It was sent to elements
:e the armed forces in the continental U.S.
CONUS) and worldwide. It was sent to
,ither branches of the government iriclud-
mg the Justice Department (Federal Bureau
.4 Investigation), Treasury Department
Secret Service), and State Department. It
iniS Augmented five times with changes
addition!, and deletions of pages of in-
: arm:edam and, when the order was given
..0 destroy all copies of the Compendium in
,he summer of 1970. a sixth change was in
:he works. The Compendium was classified
,leeCleET.
CID a's!) provided the armed forces_and
,iranches of the government with other pub-
lications regarding this area of interest. One
vas what was called an estimate, which pro-
dded an analysis of past events in the na-
Sion and an estimate of the potential for
iotnestic disorders for the upcoming period.
believe this publication was prepared an-
wally. Its purpose was to inform the Army
eomifeende of the potential need for Army
upport required to keep the order in the
nation in ease of disorders.
OACSI, and in particular, MAD, was tasked
-vith the responsibility of providing the Army
erith information regarding potentially die-
uptmgsiaeations in the United States. Since
.he army has the responsibility of respond-
:ng to a national call for aid in restoring
erder, it needs an agency to keep It informed
the potential for that call for aid, and
:hus, the Potential for civil disturbances. In
loing. so CAC& kept a sharp eye and ear
:el potential "trouble-makers" both inclivitt-
eals and organizations, and their activities_
Much of the information was gathered by
,HAD from the press. Most of the rest of the
:a-done:lathe) was supplied by direct liaison
.11th the Federal Bureau of Investigation,
end, to a lesser extent, some other govern-
ment investigative-type agencies. By far the
lergeet sueplier of information report; was
:he FBI, from whom CIAD almost daily
received root-high stacks of information
reports. Naturally, the FBI was a re-
- intent co' CIAD report, too. but CLAD
:eceived much more than it' supplied.
Another channel of information to the MAD
analysts was through the U.S. Army Intelli-
gence Command's teletype, which would, sup-
- ey as many as 100 "spot reports" daily. These
,eports were forwarded to the Command at
Fort Holabird, Maryland, for teletype dis-
"ribution to other "interested" Army intelli-
eence and investigative agencies. In almost
ell cases, the reports concerned meetings and
minor incidents all over the country. Many
.4 them were like the one which comes to
-eine', regarding simply a meeting of 200
people in a church in Philadelphia. The re-
port would state that 200 people attended a
meeting today in such-and-such church, and,
3 hat there were no incidents. Almost all re-
ports were read and discarded by CLAD ana-
eiests, anti were generally regarded as worth-
less.
CIAD analysts working in the domestic
neld maintained voluminous files. They were
files of clippings from the press. PSI reports,
and other information from other agencies,
within and without the Army. A computer-
ized index had been prepared for the files,
though there were no computer at CIAD's
office in Alexandria, Virginia. The computer
experts at CIAD used card-pnnching and
other facilities of OAOSI in the Pentagon to
prepare the index. Dossiers were frequently
received by CIAD analysts from the U.S.
Army Investigative Records Repository at
Port Holabirci.
During the time I was at CIAD the domes-
tic intelligence program grew immensely.
When I joined the group, there were perhaps
ten members of the domestic section. When
I left there were about twice that number.
In that period the computerized index was
developed. Daring that period the number
of publications in this field produced by
?PAD grew, and the number of reports re-
ceived by CLAD analysts probably tripled.
In January 1070, OACSI was shocked by
the publication of an article in Washington
Monthly magazine by former Army Captain
-Christopher H. Pyle. OACSI put together
what it called a "Task Group" in one of its
offices at the Pentagon to work on problems
that stemmed from sudden disclosure of
Army activities in this field. The Task Group
originally numbered about eight persons,
several of whom were from CIAD. I was one,
the only enlisted member, and I joined them
originally as a typist and administrative man.
The Task Group, over the next few months,
was responsible for formulating new Army
policy to appease critics of the domestic in-
telligence program, and for replying to let-
ters from Senators, Congressmen, and citi-
zens. Although letters went out over the
signatures of Major General McChristian,
Aesistant Chief of Staff for Intelligence, and
others, nearly all wore produced by this small
group, put together for just this purpose.
The first reaction by CIAD to the Pyle ar-'
tiele was, in typical fashion, to sit down and
write a -paragraph-by paragraph refutation of
every charge that Mr. Pyle made, regardless
whether charges were factual, founded in
fact, or whatever. This went on for about
two weeks, but there was no end result, for
meanwhile, the Task Group had been formed
In the Pentagon to assume this function.
The Task Group answered Congressional in-
quiries and press inquiries on this area of
interest, and proceeded from the start to
deny any and all charges, funnel or other-
wise. Eventually, with more and more Sena-
tors and Congressmen interested and in-
formed, the group found it necessary to be-
gin admitting some of the charges, but the
Task Group, assumedly under orders from
above, never admitted any more than It ab-
solutely had to. It even went so far as to
provide the Army's own General Counsel with
misinformation at one point, so bent on
denial was this group. Time and time again
replies that were prepared by the group to
respond to Congressional and citizens' atilt-
Mem admitted -and denied charges at will,
disregarding considerations concerning the
truth of their statements.
This was, I believe, a natural reaction of
members of what is referred to by its mem-
bers as the "intelligence community." There
is a definite feeling of privilege among mem-
bers of this "corrununity"?privilege in re-
spect to access to information and immunity
to probing questions not only from citizens
but also from the Congress and other de-
partments-of the government. There is, with-
in the Army, a general distrust of Congress
anyway, for Congress, a body of civilians,
holds the power of funds over the military;
professional military men feel their job
would be easier without civilian interference
in military matters; this feeling is much
magnified in the military intelligence com-
munity, where it is coupled with the feeling
of privilege and immunity.
By the time of my separation from active
duty, several directives had been issued to try
to solve problems that arose out of what the
Task Group referred to as the "Pyle Case,"
because of its origins in Mr. Pyle's first arti-
cle. First. the Compendium was ordered de-
stroyed, and destruction certificates were di-
rected to be forwarded to the Task Group. I
was responsible for checking the list of Com-
pendium recipients against the growing stack
of destruction certificates, but it was gener-
ally understood that, because of a faulty
system of accounting for that particular
SECRET dooument, we were probably never
to account for all the Compendia. In addi-
tion to this problem, many recipients of the
Compendium had difficulty locating and ac-
counting for the document in their own of-
fices. It is likely that OACSI will never guar-
antee that all copies distributed have been
destroyed. Also, because the directive only
ordered the destruction of those two volumes.
not the information contained therein, I
found that at least one recipient Xeroxed its
copy of the book in order to be able to de-
stroy its one official copy noted in OACSI
records, while retaining a copy for further
use. I have little doubt that this was done
more than once. In fact, it was known at the
time that the originating office for the Com-
pendium, CIAD, had, in fact, microfilmed its
own copy of the book for the same reason
as above.
Other directives were issued during the
summer, which restricted the kinds of re-
ports that could be sent over the Port Hola-
bird teletype, the kinds of activities agents
in the field could be dispatched to cover,
restrictions on the use of covert and "under-
cover" agents, and the kinds of flies and filing
techniques that could and could not be
used for storing domestic intelligence infor-
mation.
The restrictions on the use of covert, agents
were interesting, for, each time the Army
was questioned on this subject, it immedi-
ately stated that it had express orders for-
bidding that type of activity. However, when
the press finally was able to specify some
incidents of this type of activity (for in-
stance, 116th MI Group agents in Washing-
ton. D.C., posing as newsmen with a van
marked "Midwest News," covering anti-wax
demonstrations), official Army replies stated
simply that covert agent activities had been
banned, except with the express permission
of the Secretary of the Army.
Probably the moat agile defensive moves
were made by the Army concerning its com-
puters. Replies to initial press and Congres-
sional inquiries concerning Army computers
were that there were none. period. This, of
course, was done with full knowledge that
there were computers, but without knowledge
of, or, it appears, curiosity about, the kinds
of work they were doing in the Army. Again,
after heated exchanges with members of
Congress and the press. the Army spokesmen
(again, Task Group) were forced to go out
and do some investigating on their own. The
results were as surprising to Army brass in
the Pentagon as to civilians, and shortly
thereafter, orders were issued that computer-
ized files may no longer be maintained or
initiated on domestic intelligence activities,
without the express permission of the Chief
of Staff. Again, however, there were few re-
strictions on the type of information that
may be kept in the computerized file.
Despite assurances by Array spokesmen
that improper activities have been halted
and will not begin again, my personal feel-
ing is that a careful and constant watch will
have to be maintained on the Army and
other branches of the government which
continue to harass and intimidate citizens
with irresponsibly and clumsily constructed
files. One of the most amazing discoveries I
made during this period was concerning the
nature of many of the files, and the cri-
teria used to select those individuals and
organizations "of interest" to Army intelli-
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2
AppetatkpfsesiaktkOpaii5RDpgimp6R000200160001-2
lecer19 roved F
, 1971 S 7315
gence. There were, in fact, no guidelines is-
sued by the Army concerning persons and
organizations of interest. Each office and
command of the Army which had flies in this
area was responsible for determining for it-.
self who and what would be included. There
were, prior to the "Pyle Case," no Pentagon-
issued directives giving criteria to be used
in limiting files. Consequently, the program
grew unchecked. With the increase in the
number of civil disturbances and demon-
strations in the nation beginning about the
time of the assassination of Dr. Martin
Luther King, the Army likewise felt it neces-
sary to expand its files and information-
gathering activities. With no overall super-
vision, the agents and analysts could, in ef-
fect, expand the program as much as, and in
whatever direction, they wished.
Even after some guidelines had finally been
laid down, it was questionable how long they
would be adhered to. A career officer, a mem-
ber of the Task Group when I left, and long
an intelligence officer, told me that he did
not think the restrictions in effect at that
time would last long. He said that it is only
natural for the domestic intelligence com-
munity to want to continue expanding the
scope of its activities in order to ensure that
it is carrying out its duties effectively.
In view of the blatant lying an unceas-
ing string of mis-statements made by Army
spokesmen to Congressmen, members of the
press, and citizens during 1970. I find it dif-
ficult to believe that we can take the official
Army assurances at face value. The intelli-
gence establishment and program are too
powerful and too special to be left to their
own devices. This can be seen in the way they
have conducted themselves, essentially with-
out supervision, over the past several years.
In my estimation, some kind of civilian in-
telligence review board is needed, to watch
over all the intelligence agencies of the U.S.
government, including those within and
without the military. This could prevent the
kind of incursions into the civilian sector by
the military we have witnessed, and would
serve to make more efficient the intelligence
operations that are necessary by eliminating
duplication of efforts. Indeed, this is an im-
portant area of consideration, for it is doubt-
ful that the Army's domestic intelligence
program held any information not already
held by other organizations, such as the
F.B.I., and State and local law enforcement
agencies.
TESTIMONY OF LAURENCE F. LANE BEFORE THE
SUBCOMMITTEE OF CONSTITUTIONAL RIGHTS
01" THE SENATE .JUDICIARY COMMITTEE
- Mr. Chairman. My name is Laurence F.
Lane. I am currently employed ori the legis-
lative staff of Congressman Robert N. Giaimo
of Connecticut. Also, I am a full-time grad-
uate student at the George Washington Uni-
versity, Washington, D.C.
I served in the United States Army on ac-
tive duty from June, 1968, until June, 1970.
I was trained as an 11B, light-weapons in-
fantry soldier at Fort Dix, New Jersey, and
assigned to the 6th Infantry Division, Fort
Carson, Colorado in early November, 1968.
Soon after my arrival at Fort Carson, Decem-
ber, 1968, I was successful in my efforts to be
detailed to the 02 (Intelligence and Secur-
ity) Section of the 5th Infantry Division.
Although my records were retained by in-
fantry units?first the 2nd Battalion of the
61st Infantry and then the 3rd Battalion of
the 10th Infantry?and "on paper" I was a
member of those infoantry units, I lived in
the 5th Military Intelligence Detachment's*
* The 5th Military Intelligence Detach-
ment merged with the 241st Military In-
telligence Detachment in May, 1969. After
the 241st M.I. was deactivated in September
1969, the 5th mi. was reactivated.
quarters, and I worked in various positions
in the office of the G2, 5th Infantry Division,
Fort Carson, for the duration of my service,
i.e. December 1968-June 1970.
Being sort of a "special case," i.e. an infan-
try soldier in an intelligence unit, I per-
formed a number of functions, all closely re-
lated to the civil disturbance mission which
was levied upon the 5th Division. Under the
agreement which brought me from an in-
fantry unit to the headquarters element, I
was an intelligence analyst. Besides analyz-
ing incoming information, during the eight-
een months that I worked for G2, I per-
formed a host of related tasks including
agent and undercover duties; coordinator of
agent reports; author of special intelligence
projects; liaison vists with the 113th Mili-
tary Intelligence Group, Region IV, and law
enforcement agencies; and advisor to 02's
and other members of the Division's hier-
archy. Although the highest rank I obtained
in my tour of active duty was Sergeant, E-5,
the length of tenure at Fort Carson with the
G2 staff, the interest and' knowledge I de-
veloped, and the flexibility of my "special"
status allowed me a broad base to observe
the intelligence structure of that command
and its relationship with other commands.
I wish to share with this Committee
what I observed and a few of my experiences.
I have divided my presentation into four
parts: First, I will attempt to explain, briefly,
the historical perspective of my activities. To
indict the military's intrusion into domes-,
tic civilian affairs without attempting to de-
fine a frame of reference would be an in-
justice. Second, I will review the intelligence
gathering structure as viewed from a di-
visional headquarters. I am certain a few of
my observations from the divisional level
will conflict with information presented
from Army area commands and nationwide
commands. My third section, discussing the
phases of duty I experienced may account
for the discrepancy of information concern-
ing the intelligence gathering structure, i.e.
the structure and direction of activities were
directly related to the personalities in com-
mand. Fourth, I present a chronology of my
activities to illustrate the workings of mili-
tary intelligence.
Before I proceed, I want to make it per-
fectly clear to the Committee members that
I do not have any "grudges to bear," nor a
"cross to burn" against the United States
Army. My purpose in testifying before this
august body is to help make sure that our
Constitution is observed by all. I am deeply
concerned that serious errors in judgment
were made which led to encroachment on
the liberties of many Americans. I have of-
fered my limited information not only to this
Committee, but also to the investigators for
the Department of Defense in order to help
discover the depth of the intrusion and the
causes. Underscoring this principle, I have re-
frained from naming superior officers and
fellow workers to avoid misinterpretation
and charges of character assassination.
I am certain the testimony by officials of
the Department of Defense will document
the rise of urban and campus violence as the
impetus that thrusted the military into es-
tablishing an intelligence network monitor-
ing the activities of civilian organizations
and maintaining dossiers on private individ-
uals. I will not belabor that point; however,
allow me to specifically address the nation-
wide trend to the Perspective from Fort
Carson, Colorado. October, 1968. was an un-
usual month for Fort Carson. The Command-
ing General of the 5th Infantry Division was
relatively new to the fort, and his G2, a
Lieutenant Colonel, had recently returned
from overseas. Media news reports and trans-
mitted messages from intelligence commands
forecasted rising violence. Demonstrators
were organizing to storm the gates of the
fort, or so it was reported. The National
Students for a Democratic Society conducted
a National Council meeting at the Boulder
campus of the University of Colorado, and
urged an offensive against the military. Dem-
onstrations followed the National Council
meeting on the campuses of Colorado Col-
lege, Denver University, Colorado State Uni-
versity, and the University of Colorado. Con-
fronted with these reports, officials at Fort
Carson over-reacted. The development of an
intelligence gathering network tailored to
the needs of the 5th Infantry Division en-
sued. This intelligence system was designed
to supply the headquarters with information
pertinent to the protection of Fort Carson,
the protection of servicemen within the sur-
rounding communities?defined as the State
of Colorado, and to supply adequate in-
formation to fulfill the civil disturbance mis-
sion of the 5th infantry Division.
The intelligence function of the 5th In-
fantry Division was the responsibility of the
02 (Intelligence and Security) Office of the
General's Staff. At the disposal of the 02
was a small office staff for operations and
the 5th Military Intelligence Detachment.
The 5th Military Intelligence Detachment,
with an average strength of forty men, was
divided into sections by skills. Two of these
sections were directly utilized by the 02 in
the intelligence gathering function?the Or-
der of Battle Section was utilized to augment
the G2 Operations staff in analysing, dissemi-
nating and filing intelligence, and the Coun-
ter-Intelligence Section was utilized to gath-
er raw intelligence.
Part of the recent investigation by the De-
partment of Defense centered on the use of
personnel of the 5th Military Intelligence
Counter-Intelligence Section to obtain raw
intelligence on civilians. Guidelines report-
edly were established which prevented the
use of tactical units from interfering with
the areas of operations of non-tactical in-
telligence commands. The intelligence gath-
ering mission in Colorado by the military
reportedly was the responsibility of the Den-
ver based Region IV Headquarters of the
113th Military Intelligence Group. Field of-
fices of the 113th M.1. were maintained in
Colorado Springs and Fort Collins, besides
the Denver headquarters. Whether the 5th
M.I. was in violation of standing orders or
whether it was not is a mute point. The
Counter-intelligence Section actively en-
gaged in off-post, civilian oriented intelli-
gence collection. I will comment further on
this point in a few minutes.
In addition to the information developed
by counter-intelligence operations, intel-
ligence was gathered through other military
channels, media reports, liaison with law en-
forcement agencies, research, and personal
observations. The 5th Infantry Division was
linked to intelligence commands by teletype.
Nationwide reports were transmitted as
events occurred and summarized periodically.
Classified reports were received through the
facilities of the communications center.
Weekly and monthly reports of civil dis-
turbances and related intelligence were re-
ceived from the Headquarters of the major
Army areas. Liaison was maintained between
the 02 and the offices of the 113th M.I., Re-
gion IV. The 5th Division was only a phone
call away from Fort Holabird, and it utilized
the services of Fort Holabird to obtain spe-
cial reports, classified dossiers, and computer
readouts as the need arose. I might point out,
that often the special reports and dossiers
were received by the G2 Section unsolicited.
A major source of information for the pub-
lications of 02 was the news media. Newspa-
pers were received from over twenty cities.
These papers were read, clipped, and classi-
fied. Television and radio news specials were
often monitored as an important source. An
informal liaison?sanctioned but not or-
dered?was maintained with the local law
enforcement agencies to include the Colorado
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2
Approved For Release 2001/08/28 :.CIA-RDP731300296R000200160001-2
A. 7316 CONGRESSIONAL RECORD? SENATE /Way 19, 971
aprings Seederal Bureau of Investigation
eleld Office, the Colorado Springs Police De-
oartment, and the El Paso County Sheriff's
Ince. The other two inputs in the intelligence
orocess, research and personal observation.
tare related to the interests of the individ-
?els performing the analysis.
The ire-riming information was processed
in the Ger Operations Section reinforced by
be members of the 5th Military Intelligence
r ceder of Battle Section. The combined op-
eration was divided by Army Areas, with a
eeecitic section devoted to special group
enalvsis. This operation produced a civil
ilisturbanise summary which was circulated
seroesth the headquarters staffs, major com-
mands of the Division, had disseminated to
lith Army Headquarters, 113th MI. offices and
tt.her units with a civil disturbance mission.
ehe summary was produced weekly, with
:rariations of daily and tri-weekly publics-
lion depending upon the demands of the
readquarters. Special reports, analyzing ape-
rifle civilian organizations or reviewing the
eetivities of individuals or studying events,
were occasionally disseminated.
A comelex filing system was established
-0 store intelligence for future reference.
Stud cross-tiles were maintained on inch-
eiduals. reties, and organizations. Each card
indicated where source material was stored,
J_e. spot reports, newspaner clipnings, agent
ssports, eva Clippings and teletype reports
acirmally were categorized chronologically.
enereas, agent reports, dossiers, and other
:developed information were filed by sub-
nut. The maintenance of the file systems
iieearne a major task. The disinterest of the
elerks to tabor at file maintenance led to a
large backlog and eventually to the dee-true-
ion of the cross-file system. I might inter-
_rent, the cross-file system was developed by
e Lieutenant and he persisted in his interest
'e maintaining it. Soon after his discharge.
e'en 1969_ the system was re-evaluated in
ight of the burdens of maintaining it, and
s was eliminated. In place of the complex
.iroes-die index, the new officer-in-charge in-
eeituted a work-book system where incoming
inteltigence was categorized by Army Areas
tabloid work-books.
The collecting, processing and dissemina-
seen of intelligence went through numerous
phases during my eighteen months with G2.
harries in direction and interests were re-
lated to tee civil disturbance mission of the
_eh Infantry Division, but, they were even
inose directly related to the nersonnel in
euthority Simnly stated, the operations of
e-a eth tseilitary Intelligence Detachment
end the .42 Operations Section of the 5th
infantry Division were an extension of its
iseclershin personnel and not a part of any
nyramiceo national military conspiracy.
Hoi h conmanders of the 5th Infantry DM-
ton and Fort Carson under whom I Served
eare ambitious Generals with successful
nilleary careers. A civil disturbance mission
eas levied on the division and these men
-sere responsible for accomplishing that rids-
-eon Their determination to be totally pre-
tared plaecel a major burden on the G2 (In-
ie.:lige:nee and Security) Section of the Gen-
:runs Staff. Faced with the resnonsibility to
r_cop the commander informed, the intent-
;once seatern including linkage with the
.lational intelligence system and the gather-
ng if raw intelligence developed.
If served under four G2's, each a Lieutenant
iolonel filling his requirement for staff duty,
'rho attitude of these men was fundamental
in moldier the intelligence operation of the
42 Operations section and the 5th MI. I
../aS brought to the 02 staff by a very driv-
ing, deeply concerned and dedicated Lieu-
anent Colonel, Recently returned from Viet-
-am, this gentleman was attempting to se-
are the greatest amount of intelligence
ihat he could in order to be an effective ad-
elsor to the Division Commander. He worked
lee staff hard, but he worked harder. His
initiative prompted the build-up of an intel-
ligence structure designed to analyze na-
tionwide events an.d to monitor local activ-
ities. The second 02 inherited the informal
structure developed under the first, and he
attempted to institutionalize it. Versed in
counter-intelligence operations in foreign
countries. the second 02 showed displeasure
with the diverse opinions which flourished
under his predecessor and he immediately
took steps to purge dissent within the staff
and to limit the excess to raw intelligence
on a need to know basis. Mistrust was evident
in relationships with other intelligence
agenices and with law enforcement agencies:
Under the second G2, who served from
March 1969 to September 1969, the intelli-
gence gathering mechanism reached its
zenith. Agents were placed in Colorado
Springs for extended periods, agents fol-
lowed agents from other military intelligence
operations, and ari agent was even placed
undercover in the officers' housing area of
the fort. The command of 02 changed in
late September. The incoming G2 was prob-
ably best characterized by his own quote?
"You don't seem to understand. Larry, I
don't want to be 02!" During his tenure
which extended to January 1970, intelligence
operations were cutback. In January. 1970,
the 02 position again changed. The incoming
03 shared the concern of many of us on the
staff that intelligence operations had vio-
lated basic civil liberties. Programs were con-
solidated with a direction on military af-
fairs and the specific civil disturbance mis-
sion levied on the Division.
As much as the direction of the intelli-
gence structure relied on the leadership of
the 02, it also paralleled the initiative of
junior officers who oversaw specific intelli-
gence functions. Por instance, I have al-
ready mentioned that the cross-file index
system was maintained under order of the
Lieutenant who instituted it. The work
hook system and the investigation of relay-
ing incoming information into a computer
system (which was never done, but seriously
studied) were projects favored by the Cap-
tain who commanded the 5th Military In-
telligence Detachment. The informal liaison
with the offices of the 113th MI. and law
enforcement agencies was established and
maintained by an experienced counterintel-
ligence agent, The need-to-know limitations
imposed under the second G2 and the cloak
of mistrust surrounding agent activities were
acceptable to the officer who commanded
counter-intelLigence during this period. At
the same time, the scaling down of the in-
telligence operations under the third and
fourth, 02's was encouraged by the almost
fetal turnover of junior officers in the G2
Operations Section but impeded and fought
by the 'ambitious commander of the 5th MI.
Thus far in this presentation, I have at-
tempted to inform you of the analytical
framework of intellieence operations in Col-
orado. However. if I share with you a chronol-
ogy of my activities and a discussion of a
few select operations, I believe that you will
have a better understanding of the func-
tional nature of the operation.
When I joined the 02 Operations staff in
mid-December, 1968, two officers and two
men had just started molding the intelli-
gence machine which we affectionately called
the "monster." The month before, a Brigade
of troops had been placed on full alert to
cope with a demonstration of several hun-
dred outside of the gates to the Fort. Rumors
of violence magnified by the rise of student,
Chicano and Black groups laid heavy de-
mands on the G2 to provide timely intelli-
gence to the Commanding General. Promi-
nent in the 'news yras the trouble at the San
Francisco Stete College. Two questions asked
were, what is happening and will Federal
troops be needed? Based?on the intelligence
reports transmitted across the teletype hook-
up, 6th Army summaries, and newspaper ac-
counts. I *rote a paper analysing the vio-
lence. Although the sources were rather in-
adequate, I attempted to be analytical and
to develop a Model of campus violence that
could be applicable to other situations. My
effort was appreciated. the G2 was pleased,
and the Commanding General was convinced
that we were on top of the situation.
Colorado College sponsored a "Symposium
on Violence." The Symposium attracted many
leading spokesmen for the New Left in-
cluding Mike Klonsky, National Secretary,
MS; Jon Sunstrom, spokesman for the East
Side New York Service Organization; Arnold
Kaufman, a founder of the teach-in move-
ment; John Sack, an outspokesn critic of the
war in Vietnam and author; Ivanhoe Donald-
son, a founder of SNCC; Richard (Dick)
Gregory, comedian and civil rights activist;
Andrew Kopkind, staff writer for the "New
Republic"; Richard Flair ke, an early anti-war
critic; Sidney Peck, co-chairman of the Na-
tional Mobilization Committee to End the
War in Vietnam; Joe Boyd, reportedly a
member of the Denver Black Panther orga-
nization; and numerous other spokesmen on
violence as a tactic. An elaborate intelligence
operation was instituted to cover the event.
Agents from the 113th MI field office in Col-
orado Springs and the headquarters in Den-
ver covered the event for the purpose of
feeding information to the intelligence com-
mand. The 02 at Port Carson mobilized the
few agents of the 5th Military Intelligence
Detachment and of the then separate 241st
Military Intelligence Detachment to monitor
the activities of the Symposium in order that
the Commanding General be forewarned of
possible violence. Another analyst, a Harvard
graduate who was a reservist called to active
duty, and I, were asked to attend the sym-
posium not as undercover agents, but as ob-
servers. Our mission was to interpret the
week of lectures, panels, and performances
within the perspective of national and state-
wide trends.
Viewed as an intelligence operation, the
symposium coverage WAS excellent. The in-
formation transmitted to Port Holabird in-
cluded daily summaries of activities and
rumors of upcoming demonstrations. A vol-
ume of information was compiled to include
agent reports, pictures and the two inde-
pendent appraisals of tee symposium. This
report was forwarded up the intelligence
chain of command and most likely made its
way to Fort Holabird.
Two quick sidelights come to mind. Dos-
siers were ordered on the participants of the
symposium from Fort Holabird. I forget
which dossiers were received and which ones
were not, however, one dossier which we did
receive summarized the intelligence back-
ground material on civil rights leader Dick
Gregory. The dossier eves So tainted that it
was unusable. I was amazed that the dossier
from Fort Holabird was completely subjec-
tive, based on unsubstantiated infor-
mation and unreliable sources with no at-
tempt to be objective. Attempts were made
to link individuals to rommunist organiza-
tions through a process of guilt by associa-
tion, whether association was a fact or not.
The pattern set by the summaries of infor-
mation utilized for the Colorado College
Symposium, i.e., unreliable and unusable in..
formation, continued throughout the period
that I was with G2. Most of the information
contained in the printed dossiers from Fort
Holabird lacked any intelligence value.
Secondly, the Colorado College Tiger
proudly displayed a Picture of the agent
from the 113th M.I field office in Colorado
Springs the week following the Symoosium.
In the subsequent editions, there were com-
ments from the editorial staff of the paper
and from students questioning the role of
the military intelligence on campus. The de-
bate culminated in an article written by
someone from the Fort Carson headquarters
documenting monitoring of campus events.
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2
711971 ApprovectrugdfftsgpoginOftWo?WRINR3gtin296R000200160001-2 s 7317
January was a month of rising publicity
'or the Students for a Democratic Society.
rhe small chapter at Colorado College at-
racted a number of state and national SDS
milers. The G2 was concerned about the
mild-up. I was asked to research the Stu-
tents for a Democratic Society and to write
study of the organization, nationwide and
tatewide. Several agents were assigned to
nonitor the activities of student activists
,t Colorado College. Their reports, which
ncluded summaries of SDS activities as well
S other campus groups?including one re-
tort on a debate conducted at the school
rith the Young Republicans participating,
,ere' forwarded through the intelligence corn-
sand with a copy normally being made
.vallable for my use. I was encouraged to
ttend functions at the school and to main-
am n friendships with student activists. Be-
ng an infantry soldier by assignment, I did
rot need to establish a false identity or justi-
[cation for attending functions. A few serv-
cemen normally attend campus functions. In
act, the presence of these servicemen has
een cited as the reason for military intern-
ence surveillance. As for the counter-intelli-
ence agents who attended these functions,
ome used a "cover" such as students from
ther campuses, free-lance photographer, or
'hippie" Special attention was given to
unctions which attracted nationwide spokes-
nen for various causes, especially anti-war
.auses. Keeping track of the whereabouts of
tational SDS leaders and local radical stu-
tents was extremely important. The emerg-
ng racial and Mexican-American movements,
specially campus organizations of Blacks
lid Chicanos, received great attention. Anti-
var elements in the commuoity were viewed
vith great suspicion. During this period of
ncreasing activism in Colorado, at least twice
: was questioned by agents from the Federal
3ureau of Investigation regarding individuals
>bout whom they were concerned.
In late February, the first of my research
nojects was completed. I had compiled a
:ixty-nine page review of the National Stu-
lents for a Democratic Society. Copies of
the publication were sent through the in-
;elligence command. Four months later, Fort
iolabird published a similar document?
>lagiarized in part?not only reviewing the
>ackground of the Students for a Democratic
3ociaty, but also listing known (unsubstan-
lated) members of SDS chapters through-
mt the nation. The Fort Holabird document
vas cross indexed by state and school.
Preparation and research for my second
uport, an in depth view of the Students
!or a Democratic Society as it related to Colo-
ado included a week of "liaison" in Denver
>nd a week of "liaison" in Fort Collins. 0111-
dally, I was sent on temporary duty to the
.13th M.I. Group, Region IV headquarters
tnd field office. However, my visitations not
mly included utilization of the files of these
>ffices but also meetings with police and
:ampus officials in Boulder, Denver, and Fort
Yollins, Colorado. Both weeks, with a rent-
-car paid for at Army expense, I was en-
ouraged to visit campuses and rekindle my
riendship with activists. The result of my
esearch was a book, approximately 115
>ages in length, detailing the growth of the
mganization in the state, activists involved,
ailed organizations, and a chronology of
notest meetings and demonstrations in the
tate from 1965 on. This publication was
iso forwarded through the intelligence corn-
nand. It is my understanding that both of
the publications were santized (de-classi-
led by removal of any reference to the mill-
ary or to the author) and made available
u a Congressional Committee investigating
3ampus violence.
A third paper was written summarizing the
.nforrnation developed in the two previous
mblications and attempting to analyze the
movement. Several of the conclusions were
objectionable to the political views of the
G2. I refused to accept the criticisms espe-
cially those which the evidence I gathered
disproved. Many of my recommendations
paralleled the conclusions Of the National
Commission on the Causes and Prevention
of Violence. The third paper was never fi-
nalized.
As I mentioned earlier in this presenta-
tion, the second G2 for whom I worked was
suspicious of dissent, and mistrustful of oth-
er intelligence-gathering activities. During
his term of service as 02, the counter-intelli-
gence section grew to over thirty men. The
tactical responsibilities on the on-post coun-
ter intelligence operation were minimal while
the section was extremely overstrength. The
answer was to use these men to monitor the
activities of activists in the community.
Deep concern was expressed in particular in
a family extremely active in the anti-war
movement in Colorado Springs. Files were
maintained on the family as well as a pho-
tograph book to make sure they were easily
identified. Individuals who attended SDS
meetings or Radical Education Programs
meeting were of great interest. The small, but
vocal anti-war faction within the commu-
nity Was viewed as a major threat.
It was about this time, that the jurisdic-
tional battle between the 113th MI, and the
02, 5th M.I. broke into the open. Two agents
from the 5th M.I. Counter-intelligence Sec-
tion attended the state SDS Convention, Col-
orado State College, Greeley, Colorado, in
mid-April. The 113th MI. commander had
cautioned the G2 that having personnel there
would be a violation of an informal agree-
ment between the two intelligence units.
The 02 sanctioned the mission of the two
agents, and upon their return a report was
filed by the 02 of the intelligence command
listing the source as "two reliable sources,
no further identification." The squabble de-
veloped into a game similar to two kids
throwing mud at each other. The passing
of information through liaison all but
ceased. The G2 authorized the semi-perma-
nent off-post activities of at least two
agents. Their job became one of beating the
113th MI. to the information and the mon-
itoring of the activities of 113th MI. per-
sonnel.
The classic illustration of the "spy versus
spy" activities occurred at a demonstration
in Colorado Springs?Fort Carson area, in
mid-September 1969. Rumors of a huge dem-
onstration bringing as many as 5.000-10,000
participants spurred the fort to an unusual
state of preparedness. Elaborate preparations
were made to monitor events. A newly in-
stalled Citizens' Band radio setup to in-
clude mobile car units and walking units
was used. The demonstration, which had na-
tionwide billing, attracted intelligence per-
sonnel from neighboring Air Force installa-
tions, NORAD, law enforcement agencies,
1113th mi. Region IV, and even two Navy
intelligence officials from somewhere on the
West Coast. The preparation included a spe-
cial assignment crew with the mission to
monitor the activities of the other intelli-
gence personnel and, in particular, the per-
sonnel of the 113th M.I. To make a long
story short, 119 demonstrators participated
in the protest. Of the 119 individuals at the
B Street Gate to Fort Carson, almost one-
half (53) were intelligence gathering per-
sonnel or representatives of the press. At-
tempts to tape the speeches of well-known
activists produced 45 minutes of the best
sound effects of helicopters?at least six were
airborne. The commander of the 113th M.I.
walked into the 02 Operations Command
Post just in time to hear one of the special
assignment crew caution the headquarters
that he was headed that way.
The following story may add another light
touch to this testimony, but it further sub-
stantiates my conclusion that individual
commanders forced the active role of military
intelligence: Torn Hayden, founder of SDS
and a new left activist, made a comment in
a speech in Chicago, I believe September
1969, that 400 escapees from the Fort Carson
stockade were battling infantry troops from
the 5th Infantry Division in the Pike Na-
tional Forest in the vicinity of Pike's Peak.
The only reason the Army did not use na-
palm against the escapees, according to Hay-
den, was that the battle was too close to
tourist areas. The Commanding General was
made aware of Hayden's statement?prob-
ably through the media?and immediately
called the G2's office and wanted to know
who the 400 escapees were!!!
The activities of the G2 Operations staff
shifted with greater emphasis on civil dis-
turbance target areas, rather than the ob-
session with Colorado activists. However,
during the Fall, 1969, the Counter-Intelli-
gence Section of the 5th MI. remained inter-
ested in local, off-post issues. There was great
interest in rumors that efforts were being
made to establish an anti-war coffee house in
Colorado Springs. Also, during the Fall, an
"underground" newspaper, aboveground, ap-
peared on the fort and throughout the local
community. Counter-Intelligence operations
were particularly interested in military per-
sonnel participating in these reportedly
"anti-military" programs, but concern was
also expressed about civilians involved.
It was reported that a bar which had re-
cently come under new management was the
rumored coffee house. Counter-intelligence
agents were directed to check it. I was in
the area that evening and stopped out of
curiosity. There sat six counter-intelligence
agents, the owner and myself in this dingily
lighted dive making small talk but attempt-
ing not to let on that you knew who the guy
next to you really was and what he was doing
there.
Eventually, a coffee house did get estab-
lished in Colorado Springs. Once established,
the coffee house became a center of interest
for the counter-intelligence personnel. The
interest continued until after I left the fort.
Rather than attracting numerous dissident
soldiers, I might add, the coffee house be-
came a home for many high-school aged
aativists. The appeal of the coffee house was
undermined less from the constant surveil-
lance than from an on-post experiment by
a Chaplain who used part of one of the serv-
ice clubs as a controlled "coffee house."
The massive nationwide Moratorium Day
activities caused a flurry of activity for the
staff of 02. The 02 Operations personnel
worked overtime to monitor the thousands
of teletype reports documenting all aspects
of the nationwide anti-war observances. Lo-
cally, the counter-intelligence personnel
monitored events in Colorado Springs, to
include a rally at Acacias Park and an indoor
program at Shrove Chapel on the campus of
Colorado College. I attended the evening pro-
gram at Shrove Chapel as an observer not
as a member of military intelligence. How-
ever, the counter-intelligence personnel were
there on assignment. They monitored speak-
ers, relaying information back to Fort Car-
son via the mobile unit's Citizens' Band ra-
dio. Emphasis was placed on interpretation
of speeches, especially if anti-draft policies
were advocated. Attending servicemen were
identified for further questioning on their
motives for being at the anti-war rally. One
of the counter-intelligence agents had his
camera equipment in an attempt to take pic-
tures. His efforts were prevented by an ener-
getic cameraman from the local college news-
paper who almost blew the agent's cover in
a snapshot which appeared in the paper's
next edition. The picture missed the agent's
face--he was hiding behind me and another
member of the 02 Operations staff?but the
caption properly identified him as falsely us-
ing an identification card from another uni-
versity. I was debriefed the next morning by
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2
S 7318 CONGRESSIONAL RECORD--- SENATE May i., 1971
counter-intelligence personnel to ascertain
if I had additional information to that which
they had collected.
The intelligence gathering effort lost mo-
mentum during the last six months of my
military duty. Counter-intelligence person-
nel with whom I maintained closed ties were
coming east for additional intelligence
courses end the direction of counter-intern-
e:Race operations was turned to on-post prob-
lems. The 02 Operations duties underwent
a reorganization tailored to target cities for
civil disturbances rather than a macrocosmic
view M activism. Combat intelligence train-
ing, a normal function of an Order of Battle
Section of Military Intelligence, was stressed.
The arriving 02 had doubts about the need
.for wide-ranging, large-scale intelligence op-
crations and many of the personnel were
new replacements who did not care for office
work or veterans counting the days until
discharge from active duty.
attempts were made to have the men cir-
cumvent the January 1970 order to dispose
of unnecessary and untimely intelligence on
-civilian activities. One Captain, the ambi-
tious officer whom I have described above,
instructed the analyst to copy the informa-
hon from spot reports verbatim and place
it in the work-books thus, the requirement
that spot reports be destroyed within 90 days
would be followed, but the information
would still be available. This suggestion was
ignoreci more out of slack leadership than
out of c oncern for violation of regulations.
As for :.:nyself, I inherited the Boy Scout
troop for dependents operated on the post--
I had been an assistant scoutmaster?and de-
voted most of my full-time efforts to keep-
ing the -roop running with little concern for
the intelligence operation.
In preparing this testimony, I have at-
tempted to highlight many of the activities
of a divisional level military intelligence unit.
Several candid observations can be drawn:
First, the system was very inefficient. The
carelessness and haphazard manner of gath-
ering intelligence should arouse grave con-
cern. The characterization of military in-
telligence as a "keystone cop" operation
would be acceptable if it were not for the
fact that the information gathered, stored
and utilized violated individual privacy and
it was undertaken in complete seriousness.
The agent recording information might have
been hopelessly inept at his job, but the ma-
terial he gathered whether reliable or not,
was forwarded to higher command. The in-
formation sent to Fort Holabird might have
been totally erroneous, but it Was trans-
mitted to units with a civil disturbance mis-
:dofl and placed into the computer system as
eubstantiated facts. As I mentioned, the units
with a civil disturbance mission would rely
on the teletype reports, along with Oplans
end intelligence estimates based on computer
;alliterate to develop procedures to quell dis-
turbances within given target communities.
Thus, the careless gathering of intelligence
seriously threatened the performance of
troops m actual civil disturbance operations.
Strain e the carefree, covert intelligence
operation encroached on the rights of many
Americans. No recourse or right of challenge
was available to the individuals upon whom
reports were gathered. erroneous reports
were not only misleading for military com-
manders, but they were a serious threat to
many civilians. There is no assurance that
any of es may not have been falsely Identi-
fied and therefore suspected of disloyal ac-
tivities. One cannot laugh-off as "keystone
cop" an Intelligence gathering system upon
which actual "combat" missions relied and
which encroached on our Constitutional
rights.
Third, the individuals who directed the in-
telligence gathering operation and those who
had the need for the intelligence were most
instrumental in determining the extent of
intrusion on civil liberties. As noted, local
commanders over-reacted to having insuffi-
cient information, to perform their domestic
responsibilities. Volumn instead of quality
reportedly impressed officers in command
and thus, the intrusion on civil liberties
prospered. The need for quantity increased
the number of reports containing erroneous
information. The need for quantity sparked
mistrust and jurisdictional squabbles be-
tween units engaged in the intelligence
operation. I even, venture to say, that the
need for quantity instead of quality?more
than any other single factor?gave the sys-
tem its particular character.
In closing, I want to reiterate that I come
before this committee today not to cast
atones at the military, but instead, to shed
light on an intelligence gathering operation
which expanded beyond its needs and its
controls. As the encroachment upon the
domestic sector soared, the intelligence net-
work was flooded with useless information.
lerroneaus information forced additional in-
trusion of civilian privacy as military units
preferred to develop their own intelligence
rather than rely upon the developed informa-
tion of other commands. Thus, a vicious cycle
ensued. Attempts to limit the intelligence
+system led to jurisdictional squabbles
similar to the one I have described between
the 5th MI. and the 113th M.I. Region IV
headquarters. Controls were poorly enforced
and thus, they were often ignored.
Hopefully, the :public disclosure of the in-
telligence gathering operation will break
the cycle of intrusion. These hearings will
point out to the military the folly of main-
naming a domestic intelligence operation us-
ing untrained personnel, unsubstantiated in-
:formation and ill-suited regulations to assist
in civil disturbance missions. Furthermore, I
am hopeful that these hearings will point out
no all Americans the serious dangers of com-
promising our Constitutional rights in the
name of false security. Covert intelligence
operations, military or civilian, must cease
if the Constitution is to be upheld. In-
dividuals must have the right to challenge
Information collected by government
agencies to Insure that we are innocent until
proven guilty; instead of suspect until
proven otherwise.
Thank you, Mr. Chairman.
FORMER SENATOR TAFT SPEAKS ON
FOREIGN POLICY
Mr. HATFIELD. Mr. President, I ask
unanimous consent to have printed in the
:RECORD at this point an address delivered
by the former Senator from Ohio Mr.
'Daft in the Senate on January 5, 1951.
There being no objection, the address
was ordered to be printed in the RECORD,
as follows:
,JONSTRUCTTJE CRITICISM OF FOREIGN POLICY IS
ESSENTIAL TO TILE SAFETY OF THE NATION
Mr. Term Mr. President, I ask unanimous
consent that I may address the Senate.
The VICE :PRESIDENT. If there are no further
requests for insertions in the RECORD or for
submission of other routine matters, the Sen-
:ator from Ohio is recognized.
Mr. Tear. Mr. President. I wish to thank
the majority leader for his action in opening
the floor of the Senate for debate before the
President's State of the Union's message.
In view of the crisis in which we find our-
selves today, the President may well take
:longer for the preparation of his message, but
certainly that should not prevent disoussion
of vital national issues on the floor of the
Senate.
During recent years a theory has devel-
oped that there than be no oreticism of the
foreign pokey of the administration, that
any such entices= is an attack on the unity
of the Nation, that is gives aid and com-
fort to the enemy, and that it sabotages
any :idea of a bipartisan foreign policy for
the national benefit. i venture to state that
this proposition is a fallacy and a very dan-
gerous fallacy threatening the .very exist-
ence of the Nation.
In very recent days we have heard appeals
for unity from the ad rainietration and from
Its supporters. I suggest that these appeals
are an attempt to cover up -the past faults
and failures of the administration and en-
able it to maintain iite secrecy which has
largely enveloped our foreign policy since
the days of Franklin I). Roosevelt. It was a
distinguished Deanocrat, President Woodrow
Wilson, who denounced secret diplomacy and
demanded open convene= openly arrived at.
The administrations if President Roosevelt
and President Truman have repudiated that
wise democratic doctrine and assumed com-
plete anthoritty to melee in secret the most
vital decisions and commit this country to
the most important MCI dangerous obliga-
tions. As I see it, Members of Congress, and
particularly Members of the Senate, have a
constitutional obligateen to reexamine con-
stantly and discuss the foreign polity of the
United States. If we permit appeals to unity
to bring an end to that criticism, we en-
danger not only the eonstitutionel liberties
of the country, but even its future exist-
ence.
I may say that I hope the debate will oc-
cur on the floor of the Senate. I was in-
vited to speak over the radio tonight fol-
lowing the speeches by former President
Hoover and Mr. Dulles, and I declined be-
cause I fele that a statement of flereitgn policy
by a Senator ought to be made on the floor
of the Senate. I think there ought to be a
continuous discussion of that policy during
this session of the Senate.
Certainly When policies have been de-
termined, unity in execution is highly de-
sirable, and in the preparation for and the
conduct of War it is essential. During recent
months, the Republican minority has joined
in granting to the President those powers
which may be necetssary to deal with the
situation. We have not heeatated to pass a
draft law, a law grarreng extensive powers of
economic control, and almost unlimited ap-
propriations for the Armed Forces. No ac-
tion of the minority can be pointed to as in
any way blocking or delaying the mobiliza-
tion of our resources and our Armed Forces.
If there has been any delay in the rearming,
it has been in the adnainistsative branch of
the Government.
But it is part of our American system that
basic elements of foreign policy shall be
openly debated. It Is said that such debate
and the differences that may occur give aid
and comfort to our possible enemies. I nuns
that the value of such aid and comfort is
grossly exaggerated. The only thing that can
give real aid and comfort to the enemy is
the adoption of a policy which plays into
their hands as has OUT policy in the Pair
East. Such aid and comfort can only be pre-
vented by frank criticism before such a
policy is adopted.
Whatever the value of unity, it is also
true that unity carried to unreasonable ex-
tremes can destroy a country. The Kaiser
achieved unity in Germany. Hitler again
achieved the same unity at the cost of free-
dom many years later. Mussolini achieved
unity in Italy. The leaders of Japan through
a method of do-called thought control
achieved unity in Japan. In every case, poli-
cies adopted by these enforcers of unity led
to the destruction of their own country. We
have regarded ourselves as safe and a prob-
able victor in every war. Today it is just as
easy for us to adopt a false foreign policy
leading to the destruction of our people as
for any other nation to do so. The best safe-
guard against fatal error lies in continuous
criticism and discussion to bring out the
truth and develop the best program.
I have referred to the general tendency
Approved For Release 2001/08/28 : CIA-RDP73600296R000200160001-2