HEARINGS BEFORE THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON FBI STATUTORY CHARTER PART 1 APRIL 20 AND 25 1978

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80S01268A000500020027-8
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
187
Document Creation Date: 
December 19, 2016
Document Release Date: 
October 17, 2005
Sequence Number: 
27
Case Number: 
Publication Date: 
April 20, 1978
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP80S01268A000500020027-8.pdf11.71 MB
Body: 
FBI STATUTORY CHARTER?Part 1 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 FBI STATUTORY CHARTER HEARINGS BEFORE THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON FBI STATUTORY CHARTER Approved F PART 1 APRIL 20 and 25, 197S Printed for the use of the Committee on the Judiciary r Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 APPPErr FSTATUT20114FPCITARTER??27-8 HEARINGS BEFORE THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE NINETY-FIFTII CONGRESS SECOND SESSION ON F.I3I STATUTORY CHARTER PART 1 APRIL 20 and 25, 1078 Printed for the use of the Committee on the Judiciary U.S. GOVERNMENT PRINTING OFFICE 29-211 0 WASHINGTON 1978 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 COMMITTEE ON THE JUDICIARY JAMES 0. EASTLAND, EDWARD M. KENNEDY, Massachusetts BIRCH BAYH, Indiana ROBERT C. BYRD, West Virginia JAMES ABOUREZK, South Dakota JAMES B. ALLEN, Alabama JOSEPH R. BIDEN, JR., Delaware JOHN C. CULVER, Iowa HOWARD M. METZENBAUM, Ohio DENNIS DECONCINI, Arizona PAUL HATFIELD, Montana Mississippi, Chairman STROM THURMOND, South Carolina CHARLES McC. MATHIAS, JR., Maryland WILLIAM L. SCOTT, Virginia PAUL LAXALT, Nevada ORRIN G. HATCH, Utah MALCOLM WALLOP, Wyoming FRANCIS C. ROSENBERGER, Chief Counsel and Staff Director (n) Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 CONTENT S THURSDAY, APRIL 20, 1978 STATEMENT Page Opening statement of Senator Kennedy 1 TESTIMONY Bell, Hon. Griffin B., Attorney General, U.S. Department of Justice, accom- panied by Mary Lawton, Deputy Assistant Attorney General, Office of Legal Counsel 3 Webster, William H., Director, Federal Bureau of Investigation, accom- panied by James B. Adams, Associate Director, and John J. McDermott, assistant to the Director, Deputy Associate Director of Administration 35 TUESDAY, APRIL 25, 1978 STATEMENT Opening statement of Senator Kennedy TESTIMONY 56 Adams, James B., Associate Director, Federal Bureau of Investigation, accompanied by John S. McDermott, Deputy Associate Director of Ad- ministration, and James 0. Ingram, Deputy Assistant Director, Criminal Investigative Division 51 Shattuck, John H. F., director, American Civil Liberties Union 97 Halperin, Morton H., American Civil Liberties Union 98 Berman, Jerry J., American Civil Liberties Union 99 PREPARED STATEMENT American Civil Liberties Union 117 APPENDIX ADDITIONAL SUBMISSIONS FOR THE RECORD Letter from Patricia Wald, Assistant Attorney General, Office of Legis- lative Affairs re investigative standards used by other executive branch agencies, May 19, 1978 139 Domestic Security Investigation Guidelines for the Drug Enforcement Ad- ministration from Attorney General Levi to Peter Bensinger, Admin- istrator, DEA 162 MISCELLANEOUS Biography of James B. Adams, Associate Director, FBI 179 Letter to Senator Kennedy from Ms. Patricia Wald, Department of Jus- tice, in response to question of Senator Metzenbaum re percentage of adult Americans represented in the FBI's fingerprint files, Sept. 7, 1978 181 Organizational chart of FBI 184 (In) Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 FBI STATUTORY CHARTER THURSDAY, APRIL 20, 1978 U.S. SENATE, COMMIITEE ON THE JUDICIARY, Wash.ington, D.C. The committee met, pursuant to notice, at 9:30 a.m., in room 2228, Dirksen Senate Office Building, Senator Edward M. Kennedy (act- ing chairman of the committee) presiding. Staff present: Robert M. McNamara, Jr., .counsel. OPENING STATEMENT OF SENATOR KENNEDY Senator KENNEDY. The committee will come to order. This morning the Senate Judiciary Committee opens hearings to lay the foundation for development of a statutory charter for the Federal Bureau of Investigation. Such a charter must clearly define the scope of the Bureau's responsibilities and the extent of its au- thority. This task is a challenging one for all involved: the Con- gress, the Bureau, and the interested public. But it is one whose dif- ficulty cannot be underestimated and whose importance cannot be denied. For the past half century, the Federal Bureau of Investigation has been not only the primary, ?but also the premier, Federal law en- forcement agency in this country. Its history is replete with individual heroism, signal accomplishments, and investigatory excellence, to the point where these qualities have become the accepted benchmark for judging any work undertaken by the Bureau. The FBI has not achieved this stature and gained the confidence and respect of the American people through historic accident. It has earned its well-deserved place in both history and present society because thousands of talented, dedicated, and exceptional men and women have for over five decades, devoted their lives to making this country safe and free for the rest of us. But while we cannot and should not lose sight of the stature, repu- tation, and respect that has been hard-earned and remains well- deserved by the FBI, we also cannot ignore or excuse the too-large numbers of instances where the awesome power of the Bureau ?has been seriously abused. Each week brings new revelations of how agents of the FBI not only may have abused their authority, but also may have broken the very law they were sworn to defend and enforce. Just last week, indictments were handed down against three of the highest ranking former Bureau officials for having allegedly engaged in illegal activities. (1) Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 2 I do not think that we can gage the devastating effect those indict- ments may have had on the confidence and respect which the American people have had for the Bureau. But while the indictments stand as a clear and unequivocal statement that no one is above the law, they might never have been needed had there been a clear statutory charter which defined the parameters of legal authority and proper procedures for the Bureau. Congress and the executive branch must share responsibility with the Bureau for the fact that the FBI has never before been truly ac- countable to anyone for anything. The Bureau, for decades, operated with independence from any day-to-day accountability within the Justice Department or the executive branch. Congress only recently has exercised its own responsibility to ques- tion the overall directions, the underlying policies, and the basic pro- gram decisions of the Bureau. This committee has only this year begun to evaluate and analyze the budget for the entire Department of Justice. This is the first time that we have attempted to ensure that the Department's priorities and focus were in line with those of the Congress. A collateral?and beneficial? effect of this process has been our increased appreciation of the tre- mendous responsibilities the Department has, and of the complexity and difficulty of its efforts to discharge them. Last week, this committee held hearings on the portion of the budget which related to the Federal Bureau of Investigation. In those hear- ings, I sensed a subtle but nonetheless perceptible new attitude within the Bureau: An attitude of 'candor about itself and its own shortcom- ings; an attitude of heightened concern for the rights of Americans; and an attitude of determination to rebuild itself and learn from past mistakes. I hope this vision is not clouded or distorted by my own ex- pectations and hopes. The Bureau has begun a new era. Judge Webster is its first 10-year director, and he has brought to that post an essential sense of integrity and justice. The Bureau has begun to define gradually its new prior- ities and to focus its emphasis on complex areas of national concern. The highly skilled and dedicated men and women of the Bureau are determined to restore it to its rightful position of national respect and confidence. . The responsibility for the success of this endeavor must be a shared one. A statutory charter for the Bureau is an indispensible component of the calculus for success. The Bureau, its agents, and the American people have a right to demand that there be a clear mandate from Congress defining what the Bureau is to do in the future and how it is to accomplish its objectives. The multifaceted responsibility which the Bureau has, and the di- verse tasks which it performs, must be clearly spelled out. Rather than relying on a gradual evolution of authority?which ordinarily occurs on the basis of practical convenience, political whim, or personal bias? the FBI should justify its activity on the basis of legislative and executive priorities and within strict statutory limitations. Agents in the field and personnel at headquarters have a right to know what they can do and how they should do it. Never again should fear of the known or unknown justify illegal activities; never again should the Constitution give way to expedi- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : 61A-RDP80S01268A000500020027-8 ency ; never again should fundamental rights be sacrificed for instant results; never again should the people of this country wonder whether those who are enforcing the law are also obeying it; and never again should the pride of an agent be replaced by a shared feeling of shame. The principled leadership which Attorney General Bell has brought to the Justice Department and Director Webster has brought to the Bureau give us cause for optimism. Both men have called for a charter, and both men have committed themselves and their resources to the task. This effort to develop a charter is not an attempt to hamstring or harass or investigate the Bureau. We are not here to right the wrongs of the past decade; we are here to ensure that the darker moments of the Bureau's past will not come back to repeat themselves or haunt us in the future. The work which we are beginning was discussed by James Madison when he wrote: If men were angels, no government would be necessary. If angels were to govern men, neither external nor internal controls on government would be necessary. In framing a government which is to be administered by men over men, the great difficulty lies in this: You must first enable the government to control the governed, and in the next place oblige it to control itself. A dependence on the people is, no doubt, the primary control on the government; but experience has taught mankind the necessity for auxiliary precautions. It is these "auxiliary precautions" which we must formulate and codify. The fundamental and cherished values which over 200 years ago we fought to ensure are fragile and must be protected. The basic constitu- tional rights and civil liberties which we hold so dear are our greatest national resources. Any erosion, however gradual, is tragic and often irreversible. Mr. Attorney General, we welcome you and Director Webster and your associates here this morning. We look forward to your testimony. STATEMENT OF HON. GRIFFIN B. BELL, ATTORNEY GENERAL, U.S. DEPARTMENT OF JUSTICE, ACCOMPANIED BY MARY LAWTON, DEPUTY ASSISTANT ATTORNEY GENERAL, OFFICE OF LEGAL COUNSEL Attorney General BELL. Thank you, Mr. Chairman, and members of the subcommittee. I am pleased to meet with you today to discuss, in general terms, the outline of a charter for the Federal Bureau of Investigation. I think it is important that we begin with exploratory discussions, ? such as you have outlined for this hearing, before attempting to draft specific legislative proposals. Since I first appeared before this subcommittee during my confirmation hearings, I have been com- mitted to the idea of a legislative charter for the FBI. I must admit candidly that at that time I did not appreciate the complexity of the issues which must be resolved before such a charter can be drafted. As you know, we began almost immediately working with this subcommittee, the Select Committee on Intelligence, as well as with the House of Representatives on legislation to provide judicial war- rants for electronic surveillance in the field of foreign intelligence and counterintelligence. We have reason to hope the Foreign Intel- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2i : CIA-RDP80S01268A000500020027-8 ligence Surveillance Act will become law this year. In addition, we have begun discussions with the Intelligence Committee on the prep- aration of charters for the intelligence community, including the intelligence components of the FBI. Much work remains to be done on those charters, but it is impor- tant that we move ahead at the same time developing charters for the nonintelligence functions of the FBI. It is these functions I want to discuss with you today. Despite its long history, the Bureau has received very little statutory guidance. There, are, basically, only three provisions defining its duties: 28 U.S.C. 533, 28 U.S.C. 534, and 42 U.S.C. 3744. In only the most general terms, these provisions authorize the FBI to detect and prosecute offenses against the United States, assist in the ,protection of the person of thet'President, inves- tigate matters under the control of the Department of Justice and the Department of State collect crime records and exchange them with Federal, State, and local agencies, and provide training for State and local law enforcement. These limited provisions provide little assistance in understanding the role that the FBI performs today. Accordingly, it may be helpful if I review the work presently done by the Bureau, outside the intel- ligence area. The FBI is, of course, our premier law enforcement agency. It has responsibility for investigating most of the offenses defined in our Federal criminal code, but, as you are well aware, some specific offenses are t;he responsibility of other Federal agencies. In some cases, the dividing line between Federal investigative agen- cies is clear, the Secret Service investigates counterfeiting and the FBI does not. In other instances, jurisdiction is less precise, the Bureau of Alcohol, Tobacco and Firearms investigates most bombing matters, but those relating to terrorism are within the jurisdiction of the FBI. FBI jurisdiction also overlaps that of the States. In many instances conduct prohibited by Federal law is also proscribed by the States. In addition, flight to avoid prosecution under State law is a Federal offense and the FBI investigates to locate fugitives who have fled across State lines. In the past, the investigative efforts of the FBI were directed primarily at identifying and apprehending those who commited specific violations of Federal law. Increasingly, in modern times, the FBI has been asked to determine the existence of Federal law violations in the first instance, as well as identifying those responsi - ble for criminal acts. Complex organized crime, political corruption and fraud cases often require extensive investigation to determine whether, in fact, a Federal law has been violated and who is ultimately rseponsible for directing the criminal enterprise. Since it is less clear at the outset what the dimension of the criminal conduct may be, the investigation may range more widely in scope than in, for example, a clear-cut bank robbery case. This presents unique problems for the FBI, since it will involve collecting information on a larger number of citizens, and initiating an investigation without nec- essarily having probable cause to believe a specific crime has been com- mitted. Similar problems arise in connection with the investigation of terrorist groups which may be involved in a pattern of conduct, some of which is legal, some of which violates State law, and some of which violates Federal law. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : WA-RDP80S01268A000500020027-8 Determining when activities of these groups fall within Federal jurisdiction and identifying who is ultimately responsible for direct- ing the terrorist acts, without exceeding FBI jurisdiction or branch- ing too far afield, and investigating legitimate protest groups who speak of violence in the abstract but do not engage in it, is a problem with which both the FBI and the Department have been grappling for the. past .4 years. Difficult as the problems of criminal investigative jurisdiction may be, they are at least grounded in the criminal code, a code which this committee has made great strides in clarifying. The other functions which the FBI performs have even less specific guidance. At the request and direction of the Department of Justice, the FBI undertakes a variety of civil investigations both of an enforce- ment nature, and for the purpose of defending suits against the Government. Civil rights statutes, economic regulatory provisions. civil. fraud, antitrust and general civil enforcement provisions fall within the jurisdiction of the Department of Justice. Some of these laws are both criminal and civil in nature; others are purely civil. Many of them require complex factual showings in order to bring en- forcement proceedings. When necessary, the Department calls upon the FBI to collect the facts needed to bring action to enforce these laws. On occasion, the Department also asks the FBI to provide facts required for the defense of suits against the United States. While we believe these functions fall within the broad mandate of 28 U.S.C. 533(3), it would be helpful to have this responsibility of the FBI clarified. Senator KENNEDY. Would these functions be better carried out by the investigators hired by the Civil Division? Attorney General BELL. I do not know. The FBI agents are such good investigators I would like them to be able to do this. I find that everybody you get on a job like this in one of the litigating divisions wants to be a lawyer. They want to try cases, so you can hardly keel) them in place. The investigator is a profession of its own. I would like to keep this in the Bureau, but I think it needs to be said they can do it. Senator KENNEDY. Excuse me, Mr. Attorney General. On the top of your previous page, you point out: Since it is less clear at the outset what the dimension of the criminal conduct may be, the investigation may range more widely in scope than in, for example. . . . Are there investigative standards now being used which protect the privacy of citizens? Attorney General BELL. Yes. We have guidelines, but we also have a general approach on these domestic security investigations. I might say that in recent days there has been a lot of confusion amongst the American people between foreign intelligence investigations and domestic security investiga- tions. We have fallen into the habit of saying "national security," and that would indicate that we are running them together. On domestic security where you involve American citizens, we have a strict approach that Attorney General Levi started. We have been following that. There has to be a nexus to crime or otherwise we do not do it. That is why we have cut down sharply on the nun:- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :6 CIA-RDP80S01268A000500020027-8 ber of these kinds of investigations that we have had going on. In addition to that, we have guidelines. Senator KENNEDY. That is what I wanted to ask you. You say later in the paragraph: This presents unique problems for the FBI, since it will involve collecting information on a larger number of citizens and initiating an investigation without necessarily having probable cause to believe a specific crime has been committed. What is "the investigative standard?" Attorney General BELL. The investigative standard? Senator KENNEDY. Yes. Attorney General BELL. In addition to the guidelines which. are too detailed to recite, there has to be an investigation of the crime. It is under the section of the Code, sec. 533, which says that . the duty of the Attorney General is to investigate and prosecute crime. That is the FBI's same authority; that is the authority I have. The difference is, and the point I was trying to make at that point is this: It is one thing to say somebody has committed a crime and to find out who did it. It is another to say: "Has a crime been committed ?" That is where we are having the added responsibility. In the old days if a crime was committed, life was simplier, and we would find the person who committed it. Now we are trying to find, by not only surveillance, but .in many other ways, whether a crime has been committed. The Bureau is told to find out whether these people or this person has committed a crime. That means that you are keeping up with more people just as my statement says there. Senator KENNEDY. Does that apply in domestic security cases? Attorney General BELL. Yes; I think in the next paragraph I deal with that. I am talking about Federal jurisdiction. What do these people do? Are they violating laws? If so, are they Federal violations? Or, are they State violations? This is a difficult area. You would be interested in the process, I think. Last year we were going to review every domestic security investigation we had going on as the allowed time expired. Jim Adams and some of his other people came over one day in Justice Department's conference room. We sat down. I had some of my people there. We said: "Let us run through two or three of these investigations. Let us see if we ought to continue them or cancel them. Is there a nexus to criminal investigation ?" Well, we ran through two or three that day, and we all got a feel for it. I do not think I have been through another one, the FBI, as they have come up, assessed them themselves. They have discontinued some of those that they had not discontinued under Attorney General Levi. So, I think we are focusing right now on the jurisdictional question, that it: "Is it investigating crime ?" Senator KENNEDY. All right. Please continue. Attorney General BELL. The resources of the FBI are also called upon increasingly to provide background investigations for persons under consideration for a variety of Government offices. In a few cases this is expressly authorized by statute or by Executive order, but for the most part these investigations are conducted as a matter of tradition or custom. That is something we need to discuss? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :,p1A-RDP80S01268A000500020027-8 should we cut back on that? For example, there is no statute or Execu- tive order directing the FBI to conduct background investigations for Presidential appointees, but, as you know, this is done routinely. Nor is there any statutory authority for the FBI to conduct investigations on behalf of congressional committees in connection with appointments to their staffs. In this Congress, however, the FBI is conducting such investigations at the request of 12 separate committees. It is time that we consider whether this is a proper role for the FBI and, if it is, we should expressly confer this responsibility by statute. To a limited extent the role that the FBI performs in furnishing both information and training to State and local law enforcement is conferred by statute: 28 U.S.C. 534, and 42 U.S.C. 3744. The statutes, however, do not specify the manner in which crime information may be exchanged with the States or whether the exchange of information may cover such other matters as missing person information. I would say that one of the most interesting concepts that I have faced since I have been in Washington is what has been, or what is now known as message switching. About every 3 months, there is a great story in the paper that we have been caught trying to message switch. I have never understood message switching, but I have made it clear to the Congress and to the FBI that we will never engage in that un- less I sign, and I never have. Someday I am going to find out what it means and all the ramifications of it. It is a glamorous thing when you see it in the headlines: "FBI Seeks Money for Message Switching." As I understand it, it is giving information to Scotland Yard or to the Canadian Mounties. They sometimes want to get information from the FBI. It may also be giving it to State police. But we would need to get into that because it sounds as though we are doing something wrong when we have not done anything wrong. Senator KENNEDY. Let me ask this: Before that, on the same page, you indicate the FBI supplies 12 separate committees of Congress with background investigation reports on congressional staff personnel. Would you provide us a list of the committees involved? Attorney General BELL. Yes; we will submit those. Senator KENNEDY. Without objection, so ordered. [The list of congressional committees requesting FBI background investigations of congressional staff employees referred to above follows:] The following Senate Committees requested 341 background investigations dur- ing the 94th Congress and 158 background investigations during the 95th Congress (up to March 6, 1978) for a total of 499 background investigations: Senate Com- mittee on Armed Services; Senate Committee on Foreign Relations; Senate Com- mittee on the Judiciary; Senate Select Committee on Intelligence, and Senate Select Committee on Ethics. The following House Committees (and subcommittees) requested 58 back- ground investigations during the 94th Congress and 225 background investi- gations during the 95th Congress (up to March 6, 1978) for a total of 283 background investigations: House Committee on Appropriations; House Select Committee on Assassinations; House Select Committee on Narcotics Abuse and Control; House Committee on Judiciary; House Committee on Standards of Official Conduct; House Permanent Select Committee on Intelligence (House Select Committee on Intelligence Activities), and House Subcommittee on In- ternational Organizations. Senator KENNEDY. Can someone get a top secret clearance if another agency does the check ? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 8 Mr. ADAMS Yes; the military do some of the investigations. The State Department conducts certain investigations, and the Civil Serv- ice Commission conducts some. Senator KENNEDY. Do they have top security clearance? Mr. ADAMS. Yes; the standards basically require a full field in- vestigation and then based upon the results of that, the agency itself Senator KENNEDY. Do they have top security clearance? Attorney General BELL. The CIA does their own clearance and investigations. Mr. ADAMS. Yes. Senator KENNEDY. Thank you. Attorney General BELL. As I will discuss later, the provision of crime information to State authorities by the FBI has been criticized, and it is time that we reexamine whether we want the FBI .to con- tinue to perform these services and, if so, under what conditions. It is unfair to give the FBI a broad general mandate in terms so vague as to permit a variety of interpretations and then to criticize it for its interpretation. I have briefly reviewed the varied functions that the FBI performs today beca.use I believe that the underlying issue in any charter is whether the FBI should continue to perform some or all of its functions that it now undertakes. A charter is, by definition, a statement of functions, powers and duties. Before such a statement can be drafted in legislative form, we must decide precisely what the basic functions, powers, and duties of the FBI should be. In the area of criminal investigations, there are several basic decisions which must be made. Should the FBI be responsible for all Federal criminal law enforcement or should it continue to share the responsibility with other Federal agencies such as the Drug Enforcement Administration and Secret Service. I might also add the Alcohol, Tobacco and Firearms agency which has about 4,000 people. These are questions now under study by the President's Reorganiza- tion Project Law Enforcement Study Team. They present difficult policy issues. Centralization of functions promises greater efficiency and coordination but it also inevitably leads to a concentration of power which our constitutional scheme has sought to avoid. Decen- trahzation, on the other hand, inevitably results in overlapping juris- diction, sometimes destructive competition, and lack of coordination. We must carefully weigh these concerns in deciding whether to ex- pand FBI criminal investigative jurisdiction or leave it essentially in its present form. We face equally difficult choices in determining whether the FBI should confine itself to the classic detective role?apprehending the individual responsible for committing a specific criminal act?or should also be responsible for detecting the existence of criminal activity and preventing its continuance or reoccurrence. Because of abuses which occurred in the past in connection with so-called domes- tic security .cases, some have suggested that the Bureau should never play a role in detecting the existence of crime or in preventing crime. I disagree. Surely the investigative forces of the Federal Govern- ment should not .be monitoring the legitimate first amendment ac- tivities.of our citizens because the views they are expressing are con- troversial or even antithetical to our constitutional system. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :1A-RDP80S01268A000500020027-8 But just as surely, the FBI should not stand idly by while terrorist groups seize hostages or set off bombs merely because the terrorists purport to act in the interests of a "cause." If we have information that a group is preparing to commit a violation of law or is engaged in a continuing pattern of Federal law violation, I believe it is in- cumbent upon us to protect our citizens by preventing violations if we can. Similarly, the FBI should continue to work with our organized crime strike forces in determining where criminal enterprises are engaged in or planning violations of Federal law rather than concen- trating exclusively on each specific violation as an isolated act. In my judgment, the mandate to "detect and prosecute" violations of Federal law extends to determining when such violations are occurring as well as identifying the individual criminals. Because these questions have been raised, however, it becomes im- portant that a charter spell out clearly whether the FBI is to be responsible for detecting and preventing crime as well as detecting and prosecuting criminals. We must also decide whether the Bureau should be a criminal investigative agency exclusively, or whether it should continue to investigate civil matters for the Department of Justice. I am inclined to believe that civil enforcement is as important as criminal, and that the Department of Justice should be able to call upon the FBI to develop cases for civil fraud or civil rights enforcement. as well as for prosecution. If this work is to continue, however, Congress should make clear that it expects the Bureau to perform these duties. More difficult issues are posed in connection with the background investigation of Federal officers and employees. As you are aware, the Executive orders covering this matter are mit of date, and the statutes seem to have been passed on a hit-or-miss basis. Moreover, many of the investigations now conducted by the Bureau are based entirely on custom and have no clear statutory authorization. If this work is to continue, the. FBI should be given a clear mandate, and should not be asked to exceed that mandate as a matter of comity to other agencies, the Congress, or the judicial branch. While Congress has directed the FBI to engage in various support services to State and local law enforcement, it has also criticized the FBI for the manner in which it does so. One example is the National Crime Information Center, particularly the computerized criminal history portion of that system. Attorneys General have, in the past. been asked to delay approval of the decentralization of this system until Congress has had an opportunity to address the issues, but no legislation has been forthcoming. We have now begun discussions with interested congressional representatives on the issue. As with all of the charter issues, we will work closely with Congress to ensure clear policy direction to the FBI and the States which use the system. The primary role of a charter is to define the functions, powers, and duties of an organization. A new charter for the FBI should also con- tain limitations and restrictions on the exercise of those duties to in- sure that the mistakes of the past will not be repeated. Senator KENNEDY. What types of limitations or restrictions are you referring to here? Attorney General BELL. The main one I have seen, which I would fa,vor, would do away with some of the background investigation Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23th CIA-RDP80S01268A000500020027-8 work that we now engage in. I really have not thought of anything else I would want the FBI not to do. I am concerned that the charter is beyond this, and the charter is hard to write, but I am thinking more of a system where we have all the Federal investigations on the domes- tic side under one head. We have the A.T. & F. over at the Treasury De- partment and the DEA in the Justice Department. I look at the wiretaps every month, that is, the wiretaps under title 3. You ought to look at that sometime. You would be surprised at the agencies that do wiretaps, and that have these investigative powers and engage in this sort of thing. This is under court order. Senator KENNEDY. Will you make some recommendations on the need for domestic wiretaps based on our concern for privacy of the individual? Attorney General BELL. What I would like to do is to get, all of these agencies, to the extent possible, under one head. After that, we can start finding out whether we are doing a good job or whether we need to amend title 3, the wiretap law. But I am not planning on doing that right now. The President's reorganization of law enforcement would go some in this direction. But, of course, you know they have this border study, which is something else again. This would have customs and the border patrol considered there. But I think the answer to your question spe- cifically is that I do not know of anything that I do not want the FBI to do. However, I would want them to cut down on the background investigation work. As I see it, what we need in the FBI is to have their duties spelled out in statute. The little statutory power that we have right now is rather vague, although we do operate under it. It is important, however, that the drafting of restrictions to meet particu- lar problems not evolve into the statutory enactment of an operating manual. As this committee is aware, the Department of Justice has promul- gated various guidelines and policy statements governing the conduct of particular types of investigations and the use of certain sensitive investigative techniques. In addition, the FBI has its own comprehensive manual setting policy for investigative activities. These are very detailed in some respects and require case-by-case determinations to be, made on the con- duct of particular investigations. I do not dispute the desirability of exerting this type of control over FBI activities. I suggest., however, that it is a degree of control more appropriate to internal directives than to permanent legislation. It is my view that legislation should establish the fundamental limitations which are to be applied, provide adequate legislative over- sight, and fix executive responsibility. It should not attempt to dictate the day-to-day functioning of an executive agency with diverse responsibilities. Senator KENNEDY. You point out in your own testimony, "the exer- cise of those duties to insure that the mistakes of the past will not be repeated." How do you hope to prevent a recurrance of those abuses in your charter? Attorney General BELL. What I have said to the agents when I have. spoken to them over the 15 months I have been Attorney General? and I have spoken to a lot of agents in a lot of different tow' rns?is : "If Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : ClAtFDP80S01268A000500020027-8 it is not in the manual, do not do it." If it is not in the charter I tell them not to do it. It cannot be in the manual if it is not in the charter. You have to tie that to the charter. Everything that could be said to be a violation of the law is some- thing that can be avoided if it is in foreign intelligence, and that I sign, and that Director Webster signs. If it is in a crime area, which would include domestic security, then you get court orders. That is about as simple as you can put it. I realize it is difficult on an agent out in the field when he is told to do something to run back up the line to see if everything is in writing. But that is just the way it, has to be. We have systems. Insofar as I know, we are following the systems very well indeed. The things that I have seen in the past that went wrong were things where the system was not followed. Senator KENNEDY. You mentioned "* * * the Department of Jus- tice has promulgated various guidelines and policy statements gov- erning the conduct of particular types of investigations and the use of certain sensitive investigative techniques." Can you make those guidelines and policy statements available to us ? Attorney General BELL. Oh, yes. Senator KENNEDY. Thank you. Without objection, that material will be entered into the record at this point. [The following responses were received by the subcommittee to Senator Kennedy's request for additional information:] Question. What Departmental or FBI guideline procedures or policies are available that govern conduct of criminal investigations? Answer. FBI investigative jurisdiction in criminal cases is based on specific violations of Federal laws. Investigations are conducted when information is received indicating a violation of Federal law, over which the FBI has been given investigative jurisdiction, has or may have occurred. The function of a Special Agent of the FBI is to conduct thorough investigations of cases in a legal and ethical manner and to carry each of these cases through to a logical conclusion. Criminal investigations conducted by the FBI are not "fishing ex- peditions" since each investigation must have as its basis an allegation that violation of a Federal law under FBI investigative jurisdiction has occurred. FBI Special Agents may not engage in entrapment or conduct considered illegal in connection with carrying out these investigations. We are mindful of the constitutional rights of all parties involved in one of our criminal investigations. Special Agents of the FBI must identify themselves by name, title, and a display of credentials in connection with interviews conducted. All employees of the FBI are guided by the provisions of Departmental Order 350-65 dated Decem- ber 28, 1965, which sets forth regulations concerning the conduct and activities of our employees. All FBI employees are expected to obey not only the letter of the law, but the spirit of the law as well, whether they be engaged in activities of a personal or official matter. Question. What Departmental or FBI guideline procedures or policies are available that govern the conduct. of criminal, civil, applicant, or civil rights investigations? Answer. This response pertains to civil investigations only. Investigations iri civil matters are instituted at the request of the Department of Justice or the U.S. Attorney on a case by case basis which contain instruc- tions ranging from limited and specific to broad and general, depending on the Department's or U.S. Attorney's desire. FBI investigation is conducted in ac- cordance with tlise instructions. The FBI's Manual of Investigative Operations and Guidelines contains FBI procedures and policies as to the various civil investigations. FBI guidelines governing investigative procedures of Civil Rights, Election Laws, and Involuntary Servitude and Slavery cases are set forth in the Manual Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/223 : CIA-RDP80S01268A000500020027-8 1 of investigative Operations and Guidelines. In most cases, these FBI guidelines have been developed through DOJ instruction or DOJ approval of FBI recom- mendations modifying prior procedures. Frequently, initial and/or additional investigation in these areas is conducted pursuant to instructions by either the Civil Rights or Criminal Divisions of the Department of justice. Also, the results of all Civil Rights, Election Laws, and Involuntary Servitude and Slavery cases are provided to the Civil Rights or Criminal Divisions of the Department. Que8tion. What Departmental or FBI guideline procedures or policies are available that govern the conduct of applicant investigations? Answer. Concerning applicant investigations, Departmental Order 1732.1 establishes the personnel security regulations of the Department of Justice which require security investigations to develop information as to whether employ- ment or retention in employment by the Department is consistent with the in- terests of national security. Departmental Order 1732.2 specifies positions within the Department of Justiee which shall be subject to full field background in- vestigations by the FBI. Such investigations are conducted on specific requests received from the Office of the Associate Attorney General. Departmental Order 288-62 sets forth the rules concerning applications for executive clemency and provides for the FBI to conduct these investigations at the request of the Pardon Attorney. By letter dated January 16, 1973, the Attorney General authorized the FBI to accept requests for background investigations directly from the Administra- tive Office of the U.S. Courts and to furnish results directly to that agency. Various agreements setting forth criteria for background-type investigations have been developed through the Attorney General which govern the conduct of inquiries for the White House and certain congressional committees. The FBI's Manual of Investigative Operations and Guidelines sets forth in detail in Part II, section 17, the objective and scope of applicant-type background investigations. Part I of this manual also contains specific instructions which apply to investigations conducted under individual classifications (e.g. 77, De- partmental Applicants and 161, Special Inquiries). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 i1A-RDP80S01268A000500020027-8 TO: COLT of tip _Moroni Omani LnEli1tginn,Th (1. 203311 DEC 1 9.1976 Clarence M. Kelley Director Federal Bureau of Investigation .0:40 PROM: Edward H. Levi 1 Attorney General SUBJECT: USE OF INFORMANTS IN DOMESTIC SECURITY, ORGANIZED CRIME, AND OTHER CRIMINAL INVESTIGATIONS ? 'Courts have recognized that the government's use of informants is lawful and may often be essential to the effectiveness of properly authorized law enforcement inves- tigations. However, the technique of using informants to - -assist in the investigation of criminal activity, since it may involve an element of deception and intrusion into the privacy of individuals or may require government cooperation with persons whose reliability and motivation may be open to question, should be carefully limited. Thus, while it is proper for the FBI to use informants in appropriate investigations, it is imperative that special case be taken .not only to minimize their use but also to ensure that individual rights are not infringed and that the government itself does not become a violator of the law. Informants as such are not employees of the FBI, but the relationship of an informant to the FBI imposes a special responsibility ? upon the FBI when the informant engages in activity where he has received, or reasonably thinks he has received, encouragement or direction for that activity from the FBI. To fulfill this responsibility, it is useful to formulate in a single document the limitations on the . activities of informants and the duties of the FBI with respect to informants, even though many of these limitation: and duties are set forth in individual instructions or recognized in existing practice. As a fundamental. principle, it must be recognized tha' an informant is merely one technique used in the course cf authorized investigations. The FBI may not use informants Approved-Fa kblease 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 14 where it is not authorized to conduct dn investigation nor may informants be used for acts or encouraged to commit acts which the FBI could not authorize for its undercover Agents. When an FBI informant provides information concerning planned criminal activity which is not within the investigative juris diction, of the FBI., the FBI shall advise the law enforcement agency having investigative jurisdiction. If the circumstanc are such that it is inadvisable to have the informant report directly to the agency having investigative jurisdiction, the FBI, in cooperation with that agency, may continue to operate ,the informant. A. Use of Informants In considering the use of informants in an authorized investigation, the FBI should .weigh the following factors . . . . : 1. the risk that use of an informant in a particular investigation or' the conduct of a particular informant may, contrary to instructions, violate individual rights, intrudJ upon privileged communications, unlawfully inhibit the free association of individuals or the expression of ideas, or compromise in any way the investigation.or subsequent pro- secution. 2. the nature and seriousness of the matter under investigation, and the likelihood that information which an informant could provide is not readily available through' other source's or by more direct means. . 3. the character and motivation of the informant him- self; 'his past or potential involvement in the matter under investigation or in related criminal activity; his proven reliability and truthfulness or the availability of means to verify Information. which he provides. . A. the measure of the ability of the FBI to control ti informant's activities insofar as he is acting on behalf of the Bureau.and ensure that his conduct will be consistent with applicable law and instructions. 5. the potential value of the information he may be . able to furnish in relation to the consideration he may be seeking from the government for his .cooperation. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : ql#-RDP80S01268A000500020027-8 B. Instructions to Informants The FBI shall instruct all informants it uses in domestic security, organized crime, and other criminal investigations that in carrying out their assignments they shall not: 1. participate in acts of violence; or 2. use Unlawful techniques (e.g., breaking and entering, electronic surveillance, opening or otherwise tamper- ing with the mail) to obtain information for the FBI; or 3. initiate a plan to commit criminal acts; or 4. participate in criminal activities of persons under investigation, except insofar as the FBI determines that such participation is necessaryto obtain information needed for purposes of federal prepecution. ? Whenever the FBg learns that persons under investiga- tion intend to commit a violent crime informants used in . connection with the investigation shall be instructed to try to discourage the violence. C. Violations of Instructions and Law ? 1. Under no circumstances shall the FBI take any action to conceal a crime by one of its informants. 2. Whenever the FBI learns that an informant used in investigating criminal activity has violated the instructions set forth above in furtherance of his assignment, it shall ordinarily notify the appropriate law enforcement or prose, cutive authorities promptly of any violation of law, And make a determination whether continued use of the informant is justified. In those exceptional circumstances in which notification to local authorities may be inadvisable, the FBI shall immediately notify the Department of Justice of the facts and circumstances concerning the investigation and the informant's law violation, and provide its recommendation on reporting the violation and on continued use of the informa: The Department shall determine: a. when law enforcement or prosecutive authorities . should be notified of the law violation; Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 16 b. what use, if any, should be made-of the informa- tion gathered through the violation of law, as well as the disposition and retention of such information; and c. whether continued use should be made of the informant by the FBI: 3: Whenever the FBI has knowledge of the actual coral, sion of a serious crimeby.one of its informants unconnecte: with his FBI assignment', it shall'ordibarilY notify the app: priate law enforcement or prosecutive authorities promptly a- make a determination whether continued use of the informant justified.. In those exceptional circumstances in which - notification to local authorities may be inadvisable, the F: shall promptly advise the Department of Justice of the fact: and circumstances concerning the investigation and the informant's law violation, and provide its recommendation Cr reporting the violation and on continued use of the inforaa:- The Department of Justice shall determine:. a. when law enforcement or prosecutive authorities should be notified of the law violation; and b. whether continued use should be made of the informant by the FBI. 4. /n determining the advisability of notifying appro- priate law enforcement and prosecutive authorities of crizina activity by FBI informants the FBI and the Department of Justice shall consider the following, factors: a. whether the crime is completed, imminent or -.inchoate; b. seriousness of the crime in terms of danger to , life and property; Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 491A-RDP80S01268A000500020027-8 .c. whether the crime is a violation of federal or .state law, and whether a felony, misdemeanor or lesser offense; ? ? .. d. the degree of certainty of the information ? regarding the criminal Activity; e. whether the appropriate authorities already knew of the criminal activity and the informant's - identity; and the significance of the information the informant is providing, or will provide, and the effect cn the FBI investigative activity of notification to the other law enforcement agency. . . Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/1238 : CIA-RDP80S01268A000500020027-8 OffirenftWAtturniT.6enald 113 nsiiingtun, . 2115311 November 4, 1976 Clarence M. Kelley Director . Federal Bureau of Investigation . n FROM: Edward H. Levi Attorney Generaiii. SUBJECT: Domestic Security Investigation Guidelines As a result of our continuing consultation during the initial implementation of the domestic security guide- lines several questions have arisen regarding the means of implementing specific techniques used to collect information about groups or individuals under investigation. Taking into account your experience with the guidelines to date, as well as the complex factual situations in which these provisions must be applied, I think it would be useful to supplement the initial guidelines with more specific instructions in applying these sensitive techniques.? The guidelines on domestic security investigations provide that in conducting preliminary and limited investigations, the FBI may make inquiry of existing sources of information and use of previously established informants, but informants may not be recruited or placed in groups. In this context "previously established informants" are those currently used in an active status. These proVisions do not preclude: 1. Asking an informant, or any other-source, including a potential criminal informant: a. What knowledge he already has concerning a group under preliminary or limited investi- gation, or b. To make inquiries concerning such a group, without attending the group's meetings or joining in its activities; 2. Directing a previously established informant to attend and report on open meetings of a group under preliminary or limited investigation. This direction to attend meetings does not require ? prior approval of FBI Headquarters. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CO-RDP80S01268A000500020027-8 3. Directing a previously established informant to attend and report on closed meetings of a group under the following limited circumstances; a. The group is a faction or splinter group of a parent organization which is already under full investigation; or b. The invitation to attend is initiated solely by the group itself, and that group is already under preliminary or limited investigation. Provided, direction of an informant to attend closed meetings pursuant to this paragraph requires prior approval of the SAC. Prompt subsequent notification shall be furnished to FBI Headquarters whenever an informant attends a closed meeting under these circumstances, either at the direction of the FBI or on his own initiative. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 20 DOMESTIC SECURITY INVESTIGATIONS I. BASES OF INVESTIGATION A. Domestic security investigations are conducted, when authorized under Section II(C), II(F), or II(I), to ascertain information on the activities of individuals, or the activities of groups, which involve or will involve the use of force or violence and which involve or will involve the violation of federal law, for the purpose of: (1) overthrowing the government of the United States or the.government of a State; ? ? (2) substantially interfering, in the United States, with the activities of a foreign government or its authorized representatives; -(3) substantially impairing for the purpose of influencing U.S. government policies or decisions: ? (a) the functioning of the governMent of the United StateS;. ? . (b) the functioning of the government of.a State; or (e) interstate commerce. (4) depriving persons of their civil rights under the Constitution, laws, or treaties of the United States. . ? 'I INITIATION AND SCOPE OF INVESTIGATIONS A. Domestic security investigations are conducted at three levels,-- preliminary investigations, limited investi- gations, and full investigations -- differing in scope and in investigative techniques which may be used. B. All investigations undertaken through these guidelines shall be designed and conducted so as not to limit the full exercise of rights protected by the Constitution and laws of the United States. Preliminary Investigations C. Preliminary investigations may be undertaken on the . basis of allegations or other 'information that an ' individual or a group may be engaged in activities- which involve or will involve the use of force or vio/ence and which involve or will involve the F?11/1:10.1 ? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 2t1A-RDP80S01268A000500020027-8 violation of federal law fur one or mura of Lilo purposes enumerated in IA(1)-1A4). Masa investigations shall be confined to Ocarmining ? whether there is a factual basla for o2ening full investigation. D. Information gathered by the FBI during preltminary investigations shall be pertinent to vt,rrifylag refuting the allegations or information c:oncerni-an activities described in paragraph IA. E. FBI field offices may, on their own initiative, -;:nder- take preliminary 'investigations limited to: . 1, examination of FBI indices and files; 2. examination of public records and other public sources of information; ? 3. examination of federal, state, and local records; 4. .inquiry of existing sources of information and use of previously established informants; and 5. physical Surveillance and interviews or persons not mentioned in E(1)-E(4) for the limited purpose of identifying the subject of an investigation. Limited Investigations F. A limited investigation must be authorized in writing by a Special Agent in Charge orFBI Headquarters when ' the techniques listed in paragraph E are inadequate . to determine if there is a factual basis for a full investigation. In addition to the techniques set' ? forth in E(1)-E(4) the following techniques also may be used in a limited investigation: 1. physical surveillance for purposes other than identifying the subject of the investigation; - ? -- ? . 2:* interviews of persons not mentioned in E(1)-E(4) for purposes other than identifying the subject of the investigation, but only when authorized by the Special Agent in Charge after full consideration of such factors as the-,seriousness ? of the allegation, the need, for the interview, and the consequences Of using the technique. ? When there is a 'question whether an interview should -De undertaken, the Special Agent in ? Charge shall seek approval of FB/ Headquarters. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/N : CIA-RDP80S01268A000500020027-8 B. Techniques r.uch as recruitment, or placement of informants in groups, "mail.cove:s, or electronic surveillance, may not be used as part of.a preliminary or a limited investigation. H. All preliminary and limited investigations shall be closed within 90 days of the date upon which the ? preliminary investigation was initiated. Howeve::, FBI Headquarters may authorize in writing extension of a preliminary or limitad investigation for periods of not more than 90 days when facts or information obtained in the original period justify such .an extension, The authorization shall include a state? ment of the circumstances justifying the extension. Full Investigation /. Full investigations must be authorized by .FBI Head- quarters. They may only be authorized on the basis. of specific and articulable facts giving reason to ? believe that an individual or a g-zoup is or may be engaged in activities whichinvolve the use of force or violence and which involve or will involve the violation of federal law for one or more of the purposes enumerated in IA(1)-IA(4). The following factors must be considered in determining whether a. full investigation should be undertaken: (1) the magnitude of the threatened harm; (2) the likelihood it will occur;. . (3) the immediacy of the threat; and (4) the danger to privacy and free expression posed by a full investigation. ? Investigative Techniques ? _ _ 3. yhenever use of the following investigative techniques are permitted by these guidelines, they, shall he implemented as limited herein: (1) use of informants to gather information; when approved by FBI Headquarters, and subject to review at intervals not longer than 180 days; provided, (a) when persons have been arrested or charged with a crime, and criminal proceedings are ? still pending, informants 'shall not be used to gather information concerning that crime" from the person(s) charged; and Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : 014-RDP80S01268A000500020027-8 (2) (3) (b) informants shall not be used to obtain privileged information; and where such information is obtained by-an informant on his own initiative no record or use shall be made of the information. "mail covers," pursuant to postal regulations, when approved by the Attorney General or his designee, initially or upon request for extension; and electronic surveillance in accordance with the requirement of Title III of the Omnibus 'Crime. Control and Safe Streets Act of 1968. Provided that whenever it becomes known that person(s) under Surveillance are engaged in *privileged conversation (e.g.; with attorney),, interception equipment shall be immediately shut off and the Justice Department advised as soon as practicable. Where such a conversation is recorded it shall not be transcribed, and a Department attorney shall determine if such conversation is privileged. NOTE:. These techniques have been the subject of strong concern. The committee is not yet satisfied that all sensitive areas have been covered (e.g., inquiries made under "pretext;" "trash covers," photographic or other surveillance techniques.) . III. TERMINATING INVESTIGATIONS A. Preliminary, limited, and full investigations may :be terminated at any time by the Attorney General, his designee, or FBI Headquarters. B. FBI Headquarters shall periodically reVieW the results of full investigations, 'and-at such time -as it appears that-the standard for.a full ihVestigation under II(I) can no longer be ' satisfied and all logical leads have been exhausted or are not likely to be productive, FBI Headquarters shall terminate the full investigation. ? The Department of Justice shall review the results of full domestic intelligence investigations at ? least annually, and shall determine in writing whether Continued investigation is warranted. Tull investi- gations shall not continue beyond one year without the written approval of the Department. However; in.the absence of such notification the investigation ,may tont: for an additional 30 day period pending response by the Department. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 24 1V. REPORTING, DISSEHINATION..AM) RETENTION. A. Reporting 1. Preliminary investigations which involve a 90-day extension under TIN and limited investigaions under IIF,- shall be reported periodicallv to the - Departa:ent of Jin.tice. -aeports of preli.,ii'.1ary and limited investigations shall inulude the identity of the subject of the.investig;,tioa, the identity of zne person interviewed or the person or place surveilled, and thi:11 which investigations involved A 90-jay e-.ctunsion. FBI Headquarters-shall maintain, and provide to the Department of. Justice .upon request, statistics on the number of preliminary investigations instituted by each field. office, the number of limited investigations under IIF, the number of preliminary investigations that involved 90-day . extensions under. IIH, and th number of preliminary or limited investigations that resulted in the -opening of a full investigation. 2. Upon opening a full domestic security investigation. the FBI shall, within one week, advise the Attorney General or his designee thereof, setting forth the basis for undertaking the investigation. . _3. The,FBI.shall report the progress of full domestic security investigations to the Department of - Justice not later than 90 days after the initiation thereof, and the results at the end of each year the investigation continues. 4. Where the identity of the source of information is not disclosed in a domestic security report, an ansessment of the reliability of the source shall be provided. B. .Dissemination 1. Other Federal Authorities The FBI may disseminate. facts or information obtained .during a domestic security investigation - to other federal authorities when such information: (a) falls within their investigative jurisdiction; (h) may assist in preventing the use of 'force or violence; or Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 2CIA-RDP80S01268A000500020027-8 (c) may be required by statute, _interagency agreement approved by the Attorney General, or Presidential directive.. Al] such :agreements and directives shall be published in the Federal Register. 2: State and Local Authorities The FBI may disseminate facts or information relative to activities described in paragrao:a 'A. to state and local law enforcement authorities when such information:. -(a) falls within their investigative jurisdiction: (b) may assist in preventing the use of force or violence; or (c) may protect the integrity of a law enforcement agency. B.. When information relating to . . crimes not covered by paragraph IA is obtained during a domestic .security investigation, the.FBI . refer the information to the appropriate lawful authorities if it is within the jurisdiction of state and local agencies. 4. Nothing in these guidelines shall limit the authority of the FBI to inform any individual(s) whose safety or property isdirectly threatened by planned force or violence, so that they may take appropriate protective safeguards. 5, The FBI shall maintain records, As required by law, 'of all disseminations made outside the bepartment of Justice, of information obtained during domestic security investigations. Retention El. The FBI shall; in accordance with a Records Retention Plan approved by the National Archive's and Records Service, within years after closing domestic service investigations, destroy all information obtained during the investigation, as well as all index references thereto, or transfer all information and index references to the National Archives, and Records Service. 3 IINOTE: We are not yet certain whether empirical data exists to help define a period of retention for information gathered in preliminary or full investigations. Whatever period is Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/236: CIA-RDP80S01268A000500020027-8 determined should take into acCount the retention period for other categories of information (e.g., general crimlnal, organized crime, and background Checks): since we have not yet considered. these - areas we cannot fix a period for retention at this time.:3 . C . NOTE: It may also be possible to establish a ' sealing procedure to preserve.investigatiPe records ...or an interim period prior to destruction. After being sealed. access would be permitted only under controlled conditions.21 e...-Information relating to activities not covered by . paragraph IA obtained during; domestic security investigations, which may be maintained by the FB/ : under other parts of these guidelines, shall:be retained in accordance with such other provisions.) The provisions of paragraphs one (1),. and:two (2) above apply to all domestic security investigations completed after the promulgation of these guidelines; and apply to investigations completed prior to . promulgation of these guidelines when use of these files serves to identify them as subject to destruction or transfer to the National Archives and Records Service..5 . ift When an individual's request pursuant to law for access to FBI records identifies the records as being subject to destruction or transfer under- paragraph one (1), the individual shall be furnished all information to .which he is entitled prior to destruction or transfer. C3- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : MA-RDP80S01268A000500020027-8 REPORTING ON CIVIL DISORDERS AND DEMONSTRATIONS INVOLVING A FEDERAL INTEREST I. Basis for Reports and Investigations The Federal Bureau of Investigation is responsible for reporting information on civil disturbances or demonstrations in four categories: A. Investigating -- 1) violations of federal criminal law directed explicitly at civil disorders (e.g. 18 U.S.C. 231, 2101); and 2) violations of federal criminal law of general appli- cability occuring during civil disorders. Providing information and assistance, upon request of the Secret Service, to aid in carrying out its protective responsibilities under 18 U.S.C. 112, 970, 3056 and P.L. 90-.331. NOTE: Under 18 U.S.C. 112 and 3056 the Secret Service is assigned responsibility to provide protection to certain U.S. Government officials and foreign officials and visitors. P.L. 90-331 provides Secret Service protection for candidates for office and authorizes Secret Service to call on any federal agency to assist in this regard. Responsibility for protection of foreign missions is assigned to the Executive Protection Service under the direction of the Secret Service. This accounts for the reference to 18 U.S.C. 970 dealing with damage to foreign missions. C. Providing information concerning actual or threatened civil disorders which may require the presence of federal troops to enforce federal law or federal court orders (10 U.S.C. 332, 333) or which may result in a request by State authorities to provide federal troops in order to restore order (10 U.S.C. 331). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/231A-RDP80S01268A000500020027-8 NOTE: The statutes cited provide three bases for the use of troops in connection with civil disorders. Section 332 authorizes troops, at Presidential initiative, to enforce federal law and was the basis for the use of troops to protect the mail in the Pullman strike. Section 333 deals with the use of troops to protect civil rights and enforce court orders and was the basis for using troops at Little Rock and Oxford. Section 331 permits the President to send troops at the request of a State when State authorities cannot restore order, e.g. the Detroit Riot. D. Providing information relating to demonstration activities which are likely to require the federal government to take action to facilitate the activities and provide public health and safety measures with respect to those activities. NOTE: While there is no specific statutory authority for collection of information in these circumstances, the Second Circuit recognized in Fifth Avenue Peace Parade Committee V. Kelley, 480 F.2d 326, cert. denied, 415 U.S. 948, that the federal government has a legitimate need for information concerning demonstrations planned at federal facilities in order to provide services in connection with the demonstration. For example, considerable information was needed in order to fashion an appropriate permit for the November 1971 moratorium march in Washington, D.C. II. Criminal Offenses . A. Investigation of criminal offenses referred to in paragraph I.A. shall be undertaken in the manner pro- vided for in guidelines relating to criminal investi- gations generally. ? B. Information concerning criminal offenses within the investigative jurisdiction of the FBI which is acquired incidentally in the course of implementing parts III through V, shall be handled in the manner provided for in guidelines relating to criminal investigations generally. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : Wk-RDP80S01268A000500020027-8 C. Information concerning criminal offenses within the investigative jurisdiction of another federal agency which is acquired incidentally in the course of imple- menting parts II through V, shall be reported to the agency having jurisdiction. D. Information concerning serious criminal offenses within the investigative jurisdiction of State or local agencies which is acquired incidentally in the course of imple- menting parts II through V shall be reported to the appropriate lawful authorities. NOTE: Using the criteria now amilied by NCIC, the reference to serious offenses would exclude such matters as: drunkeness, vagrancy, loitering, disturbing the . peace, disorderly conduct, adultery, fornication, and consensual homosexual acts, false fire alarm, non-specific chages of suspicion or investigation, traffic violations, and juvenile delinquency. E. Information relating to criminal offenses acquired in the course of implementing parts II through V shall be retained and indexed as provided for in guidelines relating to criminal investigations generally. Assisting the Secret Service A. Information relating to the protective responsibilities of the Secret Service described in Paragraph LB, which is acquired incidentally by the FBI in the course of carrying out its responsibilities, shall be,reported to the Secret Service. The FBI shall not undertake specific investigations for the purpose of assisting the Secret Service in its protective responsibilities without a specific request from the Director of the Secret Service or his designee, made or confirmed in writing. NOTE: The Department should undertake to review with the Secret Service existing agreements on the dissemination of information from the FBI to the Secret Service. The draft report 4A the General Accounting Office indicates that very little information reported by the FBI is actually retained by Secret Service. Approved-rocr-kerease 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2330 ? CIA-RDP80S01268A000500020027-8 B. A record shall, be made of all information reported to the Secret Service pursuant to paragraph III.A. and the record shall be retained by the FBI for five years. NOTE: This is the standard Privacy Act accounting requirement. C. Information reported to the Secret Service may be retained by the FBI for a period of years. NOTE: The retention period for this information will be considered in a general review of retention under all the guidelines. IV. Civil Disorders A. Information relating to actual or threatened civil disorders acquired by the FBI from public officials or other public sources, shall be reported to the Department'? of Justice. B. The FBI shall not undertake investigations to collect information relating to actual or threatened civil disorders except upon specific request of the Attorney General or his designee. Investigations will be authorized only for a period of 30 days but the authorization may be renewed, in writing, for subsequent periods of 30 days. C. Information shall be collected and reported pursuant to paragraphs A and B above for the limited purpose of assisting the President in determining whether federal troops are required and determining how a decision to commit troops shall be implemented. The information shall be based on such factors as: 1) The size of the actual or threatened disorder -- both in number of people involved or affected and in geographic area; 2) The potential for violence; 3) The potential for expansion of the disorder in light of community conditions and underlying causes of the disorder; . Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 3cIA-RDP80S01268A000500020027-8 4) The relationship of the actual or threatened disorder to the enforcement of federal laws or court orders and the likelihood that State or local authorities will assist in enforcing those laws or orders; 5) The extent of State or local resources available to handle the disorder. D. Investigations undertaken, at the request of the Attorney ? General or his designee, to collect information relating to actual or threatened civil disorders shall be limited to inquiries of: 1) FBI files and indices; 2) Public records and other public sources of information; 3) Federal, State and local records and officials; 4) Established informants or other established sources of information. ? Interviews' of individuals other than those listed above, and physical or photographic surveillance shall not be undertaken as part of such an investigation except when expressly authorized by the Attorney General or his designee. Information relating to civil disorders, described in paragraph C above, shall be reported to the Department of Justice and may also be reported to federal, state or local officials at the location of the.actual or threatened disorder who have a need for the information In order to carry out their official responsibilities in connection with such a disorder. F. Information acquired or collected pursuant to paragraphs A through D above may be retained by the FBI for a period of years but may not be indexed in a manner which permits retrieval of information by reference to a specific individual unless the individual himself is the subject of an authorized law enforcement investigation. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2CIA-RDP80S01268A000500020027-8 NOTE: Retention period to be fixed later: indexing to be implemented immediately'. V. Public Demonstrations A. Information relating to demonstration activities which are likely to require the federal government to take action to facilitate the activities and provide public health and safety measures with respect to those activities, which is acquired incidentally by the FBI in the course of carrying out its responsibilities, shall be reported to the Department of Justice. B. The FBI shall not undertake investigations to collect information with respect to such demonstrations except upon specific request of the Attorney General or his designee. C. Information collected and reported pursuant to paragraphs A and B above shall be limited to that which is necessary to determine: 1) The date, time, place and type of activities planned; 2) The number of persons expected to participate; 3) The intended mode of transportation to the intended site or sites and the interided routes of travel; 4) The date of.arrival in the vicinity of the intended site and housing plans, if pertinent; 5) Similar information 'necessary to provide an adequate federal response to insure public health and safety and the protection of First Amendment rights. NOTE: Clause 5 above is intented to encompass such additional facts affecting the federal responsibility as unusual health needs of participants, counter- demonstrations planned which may increase safety needs, or possible inability of participants to arrange return transportation. D. Investigations undertaken to collect information relating to demonstrations pursuant to paragraph B above shall be limited to determining the information. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : 9A-RDP80S01268A000500020027-8 described in paragraph C. Such information shall be collected only by inquiries of: 1) FBI files and indices, 2) Public records and other public sources of information,. 3) Federal, state and local records and officials, 4) Persons involved in the planning of the demonstration, provided that in conducting interviews with such persons the FBI shall initially advise them specifi- cally of the authority to make the inquiry and the limited purpose for which it is made. E. The FBI shag not undertake to photograph any demonstra- tion or the preparation therefor in carrying out its responsibilities. under paragraph V. F. Information acquired or collected pursuant to paragraphs A through D above may be retained by the FBI for a period of .years but may not be indexed in a manner which permits identification of an individual with a particular demonstration or retrieval of information by reference to a specific individual, unless the individual himself is the subject of an authorized law enforCement investigation. ? NOTE: Retention period to be fixed later; indexing limit to be-implemented immediately. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 CIA-RDP80S01268A000500020027-8 Senator KENNEDY. The subcommittee will need those to see how this issue is being addressed in the charter. Attorney General BELL. You will be involved, but we will make it clear that we do not need too many specifies in the statute because you ought to have the statute and the guidelines both, with the manual. Going back to what I would take away from the Bureau, I think we miss a point if we do not have in mind that the Bureau. is constantly reassessing what they ought to be doing. For example, this year we are getting out of the business of apprehending military deserters. We did that by letter to the Department of Defense. We are getting out of that business. We are not out of it all together, but we are in the process of getting out of it. We are trying, for example, to shift bank robberies to the States wherever we can. We find that we are having some success in urban areas. But the Bureau for 2 or 3 years has been reassessing its role. That is what they call the "quality over quantity program." So, that has not got to do with jurisdiction, but it has to do with the mission, I would call it. I have described in very broad terms issues which we are considering in relation to an FBI charter. Senator KENNEDY. When can we expect to see the draft charter? Attorney General BELL. They have been working on the charter since the first day I got here. They always tell me how hard it is. My assistant tells me we have a long way to go. They need decisions from me. But I will get with them and ive will get it out. I think we have worked on it long enough. We can do it, or else it is impossible. I will tell you about one or the other. [Laughter.] I suspect it is possible. Senator KENNEDY. When can we expect that, toward late summer or early fail? Attorney General BELL. Let me ask my assistant about July 1. Let us say July 1. Senator KENNEDY. All right. Attorney General BELL. My assistant, Mary Lawton, is not in agree- ment with that, but we will say July 1 for the record. Senator KENNEDY. It would be enormously helpful to see it by that time. That would give us an opportunity to review it before we begin preparing a committee draft. Attorney General BELL. Just a moment, Senator. Let me check that July 1 date. They tell me that we can give it to you by July 1, but I do not have specific proposals to make to you today. Indeed, I have not resolved many of the questions in my own mind, that is because they have not rolled up all the questions to me. I know we have to take great care not to overlook something. It is important to begin thinking about these matters now, how- ever, and to develop a dialog between the legislative and executive branches. We must not underestimate the complexity of drafting a proper, fair, and effective charter for the FBI. It will take some time to reach decisions in all of the areas in which statutory guidance is needed and to draft language to implement those decisions effec- tively. Perhaps it will be necessary to legislate in stages, taking a few pressing issues at a time and attempting to find legislative resolutions for them. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :MA-RDP80S01268A000500020027-8 In my judgment, you have made a wise decision in undertaking to assess the full dimensions of charter legislation in exploratory hearings such as this before attempting to draft any specific proposal. I pledge the full cooperation of the Department of Justice and the FBI in working with you to develop a lasting and comprehensive charter. Mr. Chairman, that is all I have by way of a prepared statement. Judge Webster is here, too. Senator KENNEDY. All right, let us hear from Judge Webster. STATEMENT OF WILLIAM H. WEBSTER, DIRECTOR, FEDERAL BUREAU OF INVESTIGATION, ACCOMPANIED BY JAMES B. ADAMS, ASSOCIATE DIRECTOR, AND JOHN J. McDERMOTT, ASSISTANT TO THE DIRECTOR, DEPUTY ASSOCIATE DIRECTOR OF ADMINISTRA- TION ' Director WEBSTER. I have a brief statement before starting. I would like to say that I listened very attentively to the Chair- man's opening remarks. I was very much impressed by the one which you set for these proceedings. I want you to know that you will have the full cooperation of the FBI. Senator KENNEDY. Thank you. Director WEBSTER. Mr. Chairman, and members of the committee, I welcome this opportunity to meet with you and to discuss a matter of vital concern to all of us: a charter for the Federal Bureau of Investigation that will delineate the nonintelligence functions of our work. I need not repeat what Attorney General Bell has testified about this morning, namely, the statutes upon which the FBI presently relies for its investigative and service activities. Neither is it necessary to re- state the varied functions presently being performed by the FBI. These are well known to the committee and its staff. However, I do wish to reemphasize some of the concerns noted by the Attorney General. The FBI urgently needs a clear and workable statement of its responsibilities, power, and duties. The men and women of the __Bureau need a charter that will allow them to act with confidence that what they are doing is lawful. It should be one that does not allow for any future misunderstanding of authority. The present statutory sources that establish our jurisdiction are not suffi- ciently definitive. There are not sufficient benchmarks to permit our agents to act or refuse to act with certainty that their conduct is correct. History tells us that reliance on inherent authority has been a major contributor to some of the sad events tlutt have been fully chronicled. As I have stated previously before this committee, any- one asked to go out on the point ought to know that the order is based upon law and clear authority. Reliance on inherent authority presents the all-too-possible risk that legal authority may not, in fact, be there. But while a 'charter for the FBI demands specificity, it cannot be inflexible. It should not be so rigid that it denies the FBI an ability effectively to carry out its mission of combating crime and violence in our Nation. It should not reach down so far into our activities that it becomes a substitute for Attorney General guidelines. It should not confuse Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/96: CIA-RDP80S01268A000500020027-8 a definition of fundamental functions with a manual of investigative procedures that properly remain with the FBI. Obviously, there is no simple formula that will permit this com- mittee, the Department of Justice or the FBI to identify and com- partmentalize material that should be in a charter, Attorney Gen- eral guidelines, or an FBI operating manual. Yet, this is a matter of great and practical importances. Times change, emergencies ap- pear, and investigative priorities change. Perhaps operational guide- lines of the Department of Justice can be changed to meet the un- expected. But how readily can a charter of Congress change? Senator KENNEDY. That is part of the dilemma; if the guidelines keep changing, then we will be back where we were. How can we strike a balance here? Director WEBSTER. In answer to that question, Mr. Chairman, I think we have to decide what types of areas should remain clearly flexible. I think the charter, itself, could provide for specific types of guidelines and if the Congress chooses, it could provide certain types of oversight of those guidelines. I think that would be the best test to be followed. Good. analogs, I think, can be found in the Truth-in-Lending Act with regulation Z; in 10(b) (5) regulations for the Securities and Exchange Act; and even possibly, the rules of criminal procedure. I just suggest those as possible analogs, but I recognize there is a genuine concern by this committee. The concerns are mutual; so, too, should the task of creating a meaningful charter be mutual. To this end, I pledge the continued cooperation of the FBI in assisting the Department of Justice and the Congress in this endeavor. So, too, do I pledge my allegiance and that of the FBI to both the letter and the spirit of the legislation that Congress enacts. If I may be of further assistance to the committee, or Associate Director James B. Adams?who is present here today?or Mr. Mc- Dermott as well, I would be happy to answer additional questions at any time. Mr. Chairman' I hope that from time to time you will invite me back to express departmental views as we proceed to resolve these problems. I hope we will be able to submit specific proposals for in- clusion in the charter, and perhaps be able to submit, through the Attorney General, some model forms which might be worthy of consideration. At this time, I would like to submit for the record a biography of James B. Adams, my Associate Director. Senator KENNEDY. Fine, thank you. Without objection, so ordered. [See appendix for biography of James Adams.] Senator KENNEDY. I want to thank you very much, Judge Webster. We will look forward to taking advantage of that opportunity. I think this will be an evolutionary process and it should be a creative one which will take the best minds of the Department, the FBI, this subcommittee' and other interested Members of Congress. We will look forward to working closely with you. Let me review with you some problem areas, and I would like to invite your response to these. Maybe Attorney General Bell or you Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : C3Ifk-RDP80S01268A000500020027-8 yourself could respond to them. We understand the importance and need for a charter, and think it is extremely reassuring to hear your comments. I would like to hear the scope you think the charter ought to have, and what specificity it should have. The first is Attorney General Bell talked about the role of the Bureau in conducting the domestic security investigations? You have commented on this in your formal presentation, then you expanded on this in your informal remarks. Is there any other agency beside the FBI which should be involved in work on domestic security investigations? Attorney General BELL. The Secret Service, I would say. Yes; I would say the Secret Service. Senator KENNEDY. But should it be limited to those two agencies? Attorney General BELL. Well, that is one of the interagency prob- lems I was alluding to. The A.T. & F., for example, has jurisdiction over bombings. To give you a good example of that, we have had a .number of bombings in the Miami area. The A.T. 86 F. was there in charge. Senator Stone telephoned me a number of times and said he wanted to get the FBI in. I said: "Well, we do not have jurisdiction. That statute is left to the A.T. & F." I finally did get the FBI into Miami, but it was only after we found a violation of civil rights. There was a very severe violation where the bombings blew the legs off of a newspaper editor. On that basis, we sent in the FBI. So we have both. Then you have a problem of who is in charge. That is a domestic security matter. There are various types of these domestic security matters. Senator KENNEDY. What criteria does the A.T. & F. use and what is the investigative standard? Mr. ADAMS. They handle explosives basically. Senator KENNEDY. But in investigations, do they use the "nexus of crime," or "probable cause," or what? Do all of the Federal inves- tigative agencies involved in domestic security investigations use the same standards? Attorney General BELL. I doubt it. I do not think Secret Service would. I do not want to speak for them, but they have a different role to protect. They are trying to +protect the President and other high Government officials. They are really not investigating crimes, as such. Is that not a fair statement? Mr. ADAMS. Yes. Senator KENNEDY. Outside of the Secret Service,, would they all have the same standard? Attorney General BELL. I think so, yes. Insofar as I know, they do. I notice sometimes on the wiretap list they will have some of these unusual agencies, like the Department of Agriculture. They have en- forcement people checking violations of law themselves. This is quite a long list, but they are all trying. to find violations of the law, and they would refer to us. for prosecution, anything they find. Senator KENNEDY. That certainly would be understood. But the ouestion is this: What criteria are all the various investigative agen- cies using in domestic investigations, outside the jurisdiction of the Secret Service. Do they have different criteria? Attorney General BELL. I think I spoke too fast, because I really do not know that. I know about the FBI and the DEA. That is all I Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 38 have jurisdiction over. So I would not want to speak for the others. I think, though, that might well be what the committee wants to know. Senator KENNEDY. It seems we ought to have some definitive com- ment on this. Obviously we would need your help and assistance in defining what that ought to be. Attorney General BELL. I was just talking with Mary Lawton. We will try to get that up to the committee. Senator KENNEDY. Very well. Without objection, so ordered. [ See appendix for material cited above.] Senator KENNEDY. Does the standard differ from that used in the foreign counterintelligence investigations? Attorney General BILL. Oh, yes; just as we have a different standard in the Surveillance Act, which you will be voting on today. Senator KENNEDY. Yes; we start at 11 :30. Attorney General BELL. The standard would be different; yes. In the Surveillance Act, we are now encompassed in a criminal standard, that is, there are shades or variations in the standard, but it is still a crimi- nal standard. I guess in that sense we are fretting ready to say that everythingis going to be on a criminal standard. Senato;KENNEDY. Are you getting ready to say Lt? Attorney General BELL. We do not say it now. As you know, we have had quite a debate about that. Senator KENNEDY. That is right. Attorney General BELL. It has been with you and others. We finally decided that we could do it within the parameters of the criminal standard. Senator KENNEDY. I think that was a very constructive and, quite frankly, an indispensible addition to the legislation. Director WEBSTER. May I interject, Mr. Chairman? Senator KENNEDY. Certainly. Director WEBSTER. The distinction has to be made throughout the charter as to the difference between foreign counterintelligence respon- sibilities and domestic security investigations, both of which are intel- ligence gathering, and both of which may ultimately require a Federal standard for the basis for investigation. But our responsibilities in foreign counterintelligence go beyond those of domestic security in- vestigations in that we have a responsibility there to neutralize the impact of foreign efforts to gather intelligence in this country, where- as we have no such responsibility to neutralize activities in domestic security. Senator KENNEDY. You had better elaborate on your meaning; of "neutralize." Director WEBSTER. Yes; we do not engage in other than investiga- tive actiyities in connection with domestic security investigations. It is our responsibility to minimize the impact of foreign counter- intelligence by confusion, by any type of activity which will, in effect, destroy the spy effort of foreign nations. It is a different function. That is why they are very carefully separated. Senator KENNEDY. You previously took preventive action; but you do not at the present time. Is that correct? Director WEBSTER. Preventive action in domestic security would be legitimate in the sense that if we identified a conspiracy to do some- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : VA-RDP80S01268A000500020027-8 thing, then we would take action to stop it. But we would not be diffusing the organization with fictitious mail or taking any other steps of that type. It is sometimes called "dirty tricks." In foreign counterintelligence, we do engage in legitimate efforts to confuse for- eign activities, and to make them consume substantial amounts of their available time wondering about the effectiveness of their operation. Senator KENNEDY. Can you tell us how the charter should define the FBI's responsibility in this area? I do not expect you to define it totally here, but can you tell us what you think the charter ought to. say in this area, and how it ought to define the FBI's responsibility? Director WEBSTER. Are we talking about foreign counter- intelligence? Senator KENNEDY. I would be interested in both domestic and foreign counterintelligence. Director WEBSTER. The preamble portions to the. Attorney General guidelines would be tt good beginning point. Those responsibilities could be defined in terms of what our purpose, that is, our legitimate interest in intelligence gathering would be in domestic security, for instance, and what types of organizations we could legitimately in- vestigate for intelligence-gathering purposes. The. guidelines them- selves might very well deal with the types of investigations that would be permitted against a given backdrop or parameter of circumstance or level of proof. I find it very difficult to try to articulate something in this area. We are going to have to submit drafts to you, then we can discuss the drafts. Senator KENNEDY. All right: that is fine. [At press time, the material requested from the Department had not been received by the subcommittee.] Senator KENNEDY. Should the FBI have statutory authority to in- vestigate civil disorders at the request of the Attorney General or the President? Director WEBSTER. Are, you asking whether we should have that? Senator KENNEDY. Do you have that authority now? Director WEBSTER. T think we do have, it, but it is the kind of au- thorization that, as the Attorney General has said, and as I tried to indicate is sometimes not clear and is very general. We. have had to bootstrap lift in order to carry out our assigned responsibilities in those areas. Attorney General BELL. We do not have it unless it is a Federal crime, being committed, or has been committed, or is about to be committed, or that we expect will be committed. As Judge Webster knows, and Jim Adams knows, we are asked to send the FBI. Contrary to the things you might believe, Senator, the FBI is a very popular organiza- tion. If something happens bad somewhere, then people immediately want to get the FBI in. We spent a lot of our time wondering if we can send the FBI somewhere. We cannot always send them. Of course, we try to follow the law. Civil disorder is where there is disorder in the eye of the beholder. We had a civil disorder, I guess, when Iranian demonstrations were going on. That was not handled by the FBI. It was handled by the Park Police, but it was serving the Government here. The President directed me to take over. I got Mr. Adams to start observing the Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/U : CIA-RDP80S01268A000500020027-8 situation to see just what was going on and to see what could be. done which had not been done. But by the time we got into it, it was over with. We never really did have to do anything about it. In the Hanafi Muslim case, that itself could certainly be called a disorder, but it was a crime also, so there was no problem. In that case, we assisted the District of Columbia Police. They handled it and we assisted them and stood by and did everything we could help them. When these cases come up, each stands on his own feet, and you have to decide what you can do. We had a problem in the coal strike with people blocking rail- roads. There are different kinds of disorders like that going on. They are crimes, in some instances. We only observed. We never really did anything beyond that because the State police were there. Most every- thing that came up was in the province of the State police rather than in our jurisdiction. Senator KENNEDY. Obviously, this is an extremely important and enormously sensitive area. Are you saying there ought to be only general guidelines for civil disorder cases? Attorney General BELL. I would say, and I guess we have done this, we would take all the statutory jurisdictions that we have, which are very sparse. Then there are a lot of things and duties that are bestowed upon the Bureau by other statutes. We get all that together. We could, I suppose, sit down with the top management of the Bureau, and try to think of all the things that we have been asked to do over the years and see how they fit into this charter. I think we can come up with a charter. Senator KENNEDY. An important area in civil disorder cases is what limitations on collection and dissemination of information you have. What standard do you use at the present time? Director WEBSTER. We are presently using a need-to-know standard. If it is within the legitimate area of local law enforcement respon- sibility, then, we, in a cooperative way, have disseminated that infor- mation to the local enforcement officers. But we have always satisfied ourselves that it fell within their jurisdiction and was of legitimate interest to them. Senator KENNEDY. What standard is used for election of informa- tion on a domestic group? Director WEnsma. If I can complete my answer on dissemination, we are also accountable to the Privacy Act, which has certain limita- tions. With respect to your second question, the present guidelines Provide: The domestic security investigations are conducted to ascertain informa- tion on activities of individuals or activities of groups which involve, or will involve, the use of force or violence or which involve, or will involve, a viola- tion of the Federal law. Then four categories are set forth. First is overthrowing the U.S. Government or a State government.. Second is substantially interfering in the United States with activi- ties of a foreign government or its authorized representatives. Third is a series of categories which summarize substantially im- pairing for the purposes of influencing U.S. Government policy decisions. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : glek-RDP80S01268A000500020027-8 Fourth is depriving persons of their civil rights under the Con- stitution, or laws or treaties of the United States. Those are the activities which, under the guidelines, we have a legitimate interest in investigating. Then there are it series under the guidelines, and I think probably they should stay under there, of threshold information, that is, in other words, how far and in what way can we investigate. These depend upon the amount of information that we have at that time. For example, we are not presently authorized to penetrate an organization by putting an in- formant in place for the purpose of conducting a preliminary investi- gation to see what they are up to. We have to have formal information of the likelihood of criminal activity before we are ?authorized to engage in that type of activity. If we get a hearsay report that they are up to no good, we can initially conduct a record check, which is essentially a record check of our own records to see what we know about them. Senator KENNEDY. Is that the same criteria you use in domestic security cases ? Director ? WEBSTER. Yes. Senator KENNEDY. I am specifically interested in the criteria for just civil disorder cases not related to just domestic security. Do you make a, distinction ? Mr. ADAMS. Senator, in civil disorders, the main obstacle that is encountered to the collection and retention of information is the Privacy Act, which prohibits the collection or maintenance of any in- formation which would be first amendment protected activity, unless it is directly related to an investigative activity. The civil disturbance area is an example of what Judge Bell was talking about as to how we have had to sit around and decide whether we can get in or can we not. The only time that we have conducted a civil disorder or dis- turbance investigation, since the guidelines were established in 1976, was the Bicentennial celebration in Philadelphia where we did have information that groups, which we had under full investigation, were planning to commit violence. In fact, the information was such that the State of Pennsylvania had requested Federal troops. That was not honored because it was our considered opinion that there 'was not a likelihood, based on information available to us, that the situation was so serious as to warrant it. But in the other situation where we had the Iranian demonstration, although we did not conduct a civil disorder or demonstration investi- gation, we did have certain groups under investigation which were participating. We disseminated that information to the Park Police because we had indications that violations of law were about to take place, and, in fact, did take place. This comes under our general dis- semination policies whereby if, during the conduct of any domestic se- curity investigation or foreign counterintelligence information, we develop information which is within the investigative jurisdiction of another law enforcement agency or which would indicate the imma- nance of an act or completed criminal act. Then we do have the au- thority to disseminate that information. Director WEBSTER. Mr. Chairman, there are three areas I think tilt, committee might want to be concerned with, with respect to civil disorder chartering. First, of course, to make clear our jurisdiction is Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/34: CIA-RDP80S01268A000500020027-8 an important consideration. Then you might want to set up a require- ment that these investigations be under the authority of the Attorney General. The committee may then want to set out provisions for reporting requirements so that you have a clear record of oversight, but I think these are obvious areas that you may want to look into. Senator KENNEDY. All right. Are these the April 1976 guidelines? Director WEBSTER. Yes. Senator KENNEDY. But that was for conducting domestic security investigations. Why have not there been similar guidelines for civil rights and applicant investigations? Attorney General BELL. We have been drawing guidelines, as I understand it, for about 2 years, as fast as we can draw them. We may not have (rotten to that. Doubtless we will have a guideline on every- thing we ''do. Senator KENNEDY. Is it your intention that they will be covered by new guidelines? Attorney General BELL. Oh, yes. We want. to get a general charter provision. Then we will use guidelines. Let me say something I meant to say earlier. We have an operating agreement now with your com- mittee. We file these guidelines 2 weeks in advance of their taking effect. That gives the committee a chance to work them over. We can work out a better system than that, maybe. Senator KENNEDY. Having drafted those guidelines and having begun to comply with them, do you and them unduly restrictive or troublesome? Mr. ADAMS. In domestic security? Senator KENNEDY. Yes. Mr. ADAMS. From an investigative standpoint, we find that the guidelines are adequate. We feel that they do provide, the basis for conducting the hard-core type investigation which we feel is necessary for the purpose of domestic security. We have had discussions with the Attorney General in terms that there are areas that trouble us at some point which we cannot overcome. 'Phis is something like a, constitutional problem or a sensitivity prob- lem. Yet, it still does present some sort of a problem to us. For instance, there are organizations which intend to overthrow the Government by force and violence. We have recognized that intent. We have commented upon that intent. But yet, their actions have not moved from the first amendment protected activity of advocating such. Therefore, we are not in a position under the guidelines, and, we see no way to bring it under the guidelines to conduct an investigation of that organization or maintain any information on that organization because of these restrictions. There are some who say this is unwise because of the fact if you know when someone intends to overthrow the Govern- ment, you may not be in a position to even prevent him from even hay- mug access to employment in sensitive positions in the Government. Yet, on the other hand, we have to consider the immediacy of that threat and the magnitude of the harm and the likelihood. In our opin- ion, we reach a conclusion that it does not meet these tests, and, there- fore, we do not conduct the investigation. I merely point that out from the standpoint that in proceeding, as we have, and as far as we have, Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : ack-RDP80S01268A000500020027-8 we certainly do not want to give any false assurances that we may be able to prevent certain types of activity which could be prevented under broader guidelines. But we have no problems with the guidelines we feel are adequate as drawn. Senator KENNEDY. What problems do you see in codifying these guidelines? Mr. ADAMS. We do see a problem from an investigative standpoint in that, as alluded to in Judge Webster's statement, there is the fact that when something is written into law, the ability to change that promptly in order to react to the demonstrated need is limited. We feel that investigative guidelines?which get down to the level of actually conducting the behavior of our agents on the streets who do not walk around with manuals in their pockets?that that type of specific definition should be retained in the form of guidelines which can constantly be reviewed and subjected to congressional oversight to be sure that we are accommodating Congress and the executive branch. Senator KENNEDY. Part of our dilemma is how can we be sure the guidelines will not be changed when we have changes of administra- tions, or officials at the agencies involved? This is part of the dilemma we face. Attorney General BELL. On the other side, Senator, let me give you a, good hypothetical situation: A person goes to an unfriendly foreign power and takes terrorist training. He takes training in terrorism and how to conduct terrorism. Let us say he does that in an extreme form. Let us say he comes back to this country and tends to his business and is law-abiding. He is just here. He has all the training but has not done anything. There is nothing we can do about that under our constitution, Senator KENNEDY. Yes. Director WEBSTER. I do not think this is going to be as much a prob- lem as it might appear at first blush. Congress always has the final say. It has the privilege of preemption. The oversight committee is going to be aware of these guidelines. If there is dissatisfaction with them, the Congress always has the power to step in and be more precise in its charter. Senator KENNEDY. That is giving us a lot of credit which is not wholly deserved. [Laughter.] Senator KENNEDY. I was a member of this committee when we had an FBI oversight committee which never met. We had a Director who never appeared. I think all of us have enormous confidence in you, Judge Webster, as well as Attorney General Bell. But this is an obvious concern that we have had. Now is the time to deal with it in a serious responsible way, as you have. I have seen too many times where these matters generate much public attention, and then they are put on the backburner. It then is very difficult to generate interest in the problems and to deal with the protections involved. That is why I wondered if you are able to live with the present guidelines and whether or not the Bureau has had problems carrying out its responsibility to deal with domestic security and terrorism problems. Director WEBSTER. There are various investigative techniques that we currently have. I trust that as our technology increases, we will have even better techniques that will impact in unforeseen ways on privacy interests. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/24: CIA-RDP80S01268A000500020027-8 The conditions in our country change from time to time. Trying to cast up a hypothetical for which I will not be held responsible if I pick a bad one, the most important investigative tool that we possess is the use of our informant system. We are very proud of it. These are not co-opted informants. It is voluntary information. It is the most effective tool that we have. We could very easily penetrate a small organization with countless informants. We would not choose to do so even if we were not restricted by guidelines from doing so. There might come a. time in a particular area of stress or tension when the nature of the activity would be such that the guidelines would become too inflexible in terms of getting needed information in order to avert a very serious threat to life or property. It would be far easier to submit to the Attorney General for his consideration a modification of a guideline that precluded our use of an informant at a particular level of inquiry, given a radical change of circumstances, than it would be to come back to Congress for a legislative amendment. I do think that the charter should provide for ongoing oversight of any of those guidelines. That would give you your chance to step in if you felt that we were, in some way, abdicating our responsibility. Senator KENNEDY. We will have a chance to work with you in that area. I think it will be a matter of concern that will have to be addressed. You mentioned investigative techniques. Would it not be helpful to write into the charter rather clear and specific authority on limitations to help agents know exactly what they can and cannot do especially in light of recent instances? Director WEBSTER. Where we all can agree that the principles are sound and that they are unlikely to change and that they can be defined in ways that validate certain types of activity and prohibit types of activity and where we see no reason why that would change, then I would be 100 percent in favor of putting it in the charter. Senator KENNEDY. Would it be useful and helpful in protecting the men and women of the Bureau'? Director WEBSTER. Absolutely. I have that in mind. Senator KENNEDY. Obviously, I think it has been a matter of con- cern to the 'members within the Bureau, and they are entitled to this protection. Director WEBSTER. One of the areas that you may find is this. There is not complete unanimity of agreement in our own discussions. There is an area of concern to me and that is the activities of our undercover agents. This is a fairly recent development in the last few years. It is a very important development and one necessary to meet our commitment in organized crime. I can foresee situations in which a special agent would be called upon to do certain things within the organization he had penetrated, acting in an undercover capacity. There may be situations in which we would be required to do certain things in order to put him in that position. We have been operating under Attorneys General's opinions as to the legality of those activities. On an ongoing basis we are conferring with the Attorney General and his staff with respect to particular situations, such as the use of credentials, for instance, that might violate a State law and whether or not that type of activity is illegal or legal. Senator KENNEDY. What are the routine types of legal problems you have encountered? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : eiA-RDP80S01268A000500020027-8 Director WEBSTER. In undercover activity? Senator KENNEDY. Yes; and organized crime. Are you talking about delivering a bribe or passing narcotics or what? Director WEBSTER. That is a possibility. We do not permit either our informants or our undercover agents to engage in any acts of violence. But there is a possibility that, in order to assure his credibility with the organization, he is apt to carry a bag or do something of that kind. Attorney General BELL. Let me give you an example of one that has been printed in the newspaper. We had the two undercover agents working with the Weathermen. They were asked to give marksman- ship training. Mr. Adams brought it over to me for authorization in writing. That chilled my rights, I thought, right then, because I did not want to do it. These people have been underground, at least one of them has been underground for, I believe 4 years. So, I finally authorized him to teach marksmanship to these people, but to do it, on a misinformation basis. [Laughter.] They could teach them how to miss. [Laughter.] They could teach them how to miss everytime. Fortunately, within 1 month after that they were able to apprehend these people just be- fore they planted a bomb in front of a State senator's house. Senator KENNEDY. How do you handle activities by the undercover agents where it would be a clear violation of the law? Attorney General BELL. That is something we left out of the crimi- nal code. It is a common law concept for that. The easiest example is that a police officer does not break the law when he carries a gun. Mr. ADAMS. As Judge Bell mentioned, in that case that was one that was so sensitive it was presented to him personally. Also, in connection with this case, recognizing the various decisions that do come up in this area, which could not be covered in our manuals?and we cannot foresee day to day the type of decisions which have to be made from an investigative standpoint?we had a U.S. attorney spe- cifically assigned to these undercover agents in order to give them the daily legal guidance necessary. This was so that their decisions could be reacted to promptly on the spot with the best understanding of the law as it exists. We are in constant contact with the -U.S. attorneys and the departmental attorneys in these matters. Attorney General BELL. Let me give you two quick examples. One would be false credentials. That would be against the State law and might be against the Federal law. Another would be the "sting" operations where we knowingly purchased stolen goods. That is against the law. We are doing that in the name of law enforcement. That is a law enforcement technique. These are under the jurisdiction of the Office of Legal Counsel. Senator KENNEDY. Obviously there is a balance needed here. When do you get to the point of doing anything under cover of law? Attorney General BELL. That is why you have a Director of the Bureau and an Attorney General. Senator KENNEDY. Are we also going to have somthing in the charter on this, too? We recall problems with other Attorneys General. Attorney General BELL. We ought to have something in the charter on allowing this public use concept if we can narrowly restrict it. 29-211 0- 78 - 4 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 46. Senator KENNEDY. Yes; but where are the limits? We recall a num- ber of circumstances which were troublesome in the recent. past. How do we deal with it and have the kind of flexibility for situations we cannot foresee? Obviously, the breaking of the law has to be a matter of enormous concern. Director WEBSTER.. I hark back to my original concept that if the charter expressly contemplates this type of needed activity and if it places on the Attorney General the responsibility for defining and approving, in advance, the activities to be conducted, and if it then provides for clear oversight and monitoring by the Congress, then . I think we have come about as far as we can come. Admiral Turner, in discussing the activities of the CIA, talked about oversight in terms of the public's surrogate. In a sense, our un- dercover activities can reasonably be dealt with in much the same way. You would be the surrogate for the people in this regard, Senator. Senator KENNEDY. I understand in January, the Department is- sued guidelines for the use of informants. Will you have similar guide- lines for mail covers, surveillance, interviews, undercover agents, un- dercover operations, and access to Federal and State agency records and third party records and files? Director WEBSTER. Yes; I should think so. Some of those are already in place. Attorney General BELL. Mary Lawton says that our guidelines provide that we have to follow the postal regulations. Senator KENNEDY. Do you have Ltuidelines for mail covers? Attorney General BELL. We follow the postal laws. They have guidelines. Director WEBSTER. We also have, I believe, some regulations with respect to the use of mail covers in foreirrn counterintelligence. Those require the approval of the Attorney General. Then we, follow the regulations. Senator KENNEDY. Will there be recommendations in the charter on these items? [No response.] Senator KENNEDY. Do you expect to make recommendations in the charter on the codification of mail covers, record access, and the use of investigative techniques. Director WEBsTER. Yes, it is, Mr. Chairman. Senator KENNEDY. Are there certain investigative techniques that your charter would virtually prohibit? Director WEnsTER. Mr. Adams suggests to me that the bag job, as it was known, the illegal breaking and entering, would be an example. We would be subject to court- authorized surrepetitious entries in those cases. Attorney General BELL. I have not talked with Judge Webster or Mr. Adams about this, but I suspect that we ought to expand title 3 of the wiretap law and put some other things under that. We are doing that now in foreign intelligence. Maybe we ought to do more things by court order. However, we have been getting along well with the present arrangement. Senator KENNEDY. We want you to take a look at title 3 and conic back to us, hopefully after we pass this bill. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : i.3A-RDP80S01268A000500020027-8 Attorney General BELL. I do not say-we want to give up an investi- gative technique. Senator KENNEDY. No; but we want to take a look at the trouble- some areas. You made comments about the different agencies involved in law enforcement, and we will look forward to working with you on that. If we had more clearly defined procedures which would out- line permissible investigative techniques as well as those which are prohibited, do you think we would be avoiding the situation that we are confronted with now; that is, the indicting of top echelon people and the disciplining of agents. Attorney General BELL. Definitely. That has worried me from the very first day I became Attorney General. I have often wondered about this. If our system that we had in place at the time was so inadequate that the error could. be Committed, I wonder about it. Negligence could be comnaitted, as distinguished from acting with criminal intent. I have wondered about that. Director WEssrEE. The only caveat that I would add to that is that this not be one of those things that we used to know in the law. That is, if you mentioned a list, anything you did not mention is excluded because new technology will be developing as we go along. We see it every day. So if we validate a particular type of activity, the language of the charter should not imply that any other form would be illegal. Attorney General BELL. Neither one of us can pronounce this Latin statement, but there is a Latin rule on that. (Laughter.] Senator KENNEDY. Judge Bell, you mentioned in your statement: Perhaps it Is time that Congress reexamine the question of whether the FBI should provide crime information in training State law enforcement agencies. Do you think that activity should continue? Attorney General BELL. Yes; I think so. That is this thing of message switching that ties in there. It gets everyone excited. What has happened, as I understand it, the States have a place in Phoenix, Ariz., where they gather data. "I do not know if they are objecting to our doing it in order to save their own place, or what is going on. But surely there cannot be anything wrong with exchanging information to investigate and detect crime. The only objection would be the way we are doing it and the way it is proposed. to be done. I think we need to get into that; yes. Senator KENNEDY. Do you think the charter should define the rela- tionship between the FBI, State, and foreign law enforcement agencies? Attorney General BELE. I hope so; yes. Senator KENNEDY. Precisely? Attorney General BELL. Yes. We gain much more than we. give in dealing with the foreign countries, and also with the States. It has to be a cooperative I thing. I think this is particularly true in a Coun- try such as ours where we have a dual system of law enforcement. It is more than dual. We have local, State. and Federal. We are the only country that has ever been, I guess, devised on that sort of basis. Sometimes we do not recognize that. Director WEBSTER. The FBI depends heavily upon the cooperation of local law enforcement officers for the effectiveness of its own opera- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 48 tions within the Federal jurisdiction. The Congress has seen fit, from time to time, to encourage us in that effort, particularly in the training of State law enforcement officers at the National Academy. I believe that is authorized under the Safe Streets Act. We want to be sure that those activities are considered, and, I trust, validated in the charter. The same can be said for some of our cooperative efforts which we have been doing from almost the beginning of time with foreign na- tions which have been very important as criminal activity is more mobile in today's society and more far reaching. I hope those will be clearly validated in the charter. Attorney General BELL. Another example is Interpol. We have authority to be a member of Interpol. Senator KENNEDY. The charter will spell out the authority for this exchange of information and also to foreign law enforcement agencies, and to State and local officials. Director WEBsTER. Yes. In terms of dissemination of information, there are actually two areas there that should not be confused. One is supplying State and local law enforcement officers with information that should be of use to them, which is on a voluntary basis. The other falls in this category of information collecting which is called mes- sage switching. That is actually a capability, a computer capability, developed in the Bureau to be able to refer one State inquiring about a particular subject to another State which has information. None of that information belongs to the Bureau. In fact, it is not kept in the Bureau. It is simply a computer method of expediting information from one State to another State. It is considered by the International Association of Police Chiefs to be a very vital tool. It has been held up because of misunderstandings and confusion about it. I hope it will be addressed along the way. But that is a different subject. Attorney General BELL. I pose this question: If we cannot transmit it by computer, could you tell somebody about it? If Judge Webster knew that somebody in Missouri knew something that would help somebody in Arkansas, could he tell it? I am sure he could. Nobody would argue that. It is because we are afraid of computers that we have this concern. We all are. That, I think, is the root of the trouble over message switching. Senator KENNEDY. We will deal with computer exchange of infor- mation and the privacy issue. Should the FBI conduct all the various types of criminal investigations which it does now? What are your thoughts on that? Attorney General BELL. I do not know any myself that I want to give up or discontinue. These are experienced Bureau people. They may have different ideas. I do not want to preclude their views. I gave you my own. I have great faith in the Bureau myself and in what they are, doing. Senator KENNEDY. Are they working in all areas that they should, or are there some areas that should be dropped or are there some areas they should be in but are not? Director WEBSTER. We were just talking among ourselves about the little things assigned to us like migratory bird authority. The question : If we did not do it, who would do it? If it is a criminal law that needs to be enforced, then it has to be enforced by someone. Our view of it is that we probably are the best equipped. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : C*-RDP80S01268A000500020027-8 Senator KENNEDY. Provide for us that list and let us take a look at it? I am talking about the more questionable ones. Please submit that to us. Director WEBSTER. Certainly. Senator KENNEDY. Thank you. Without objection, so ordered. [The Department supplied the following response to the subcommittee:] On April 20, 1978, during the appearance of William H. Webster, Director of the FBI, before the United States Senate Committee on the Judiciary, Senator Edward Kennedy discussed the issue of the numerous statutes which set forth violations that are investigated by the FBI. Senator Kennedy requested a list of statutes that could perhaps' be dropped from the investigative jurisdiction of the FBI. The FBI has jurisdiction over the following rarely investigated crimes: Interstate Transportation of Prison Made Goods (18 U.S.C. 1761). Interstate Transportation of Fireworks (I8 U.S.C. 836). Interstate Transportation of Unsafe Refrigerators (15 U.S.C. 1211). Switch Blade Knife Act (15 U.S.C. 1241)% , Federal Cigarette Labeling and Advertising Act (15 U.S.C. 1331). Illegal Use of a Railroad Pass (49 U.S.C. 1). Illegal Manufacture, Possession, or Wearing of a Civil Defense Insignia (50 U.S.C. 2284). Illegal Manufacture, Sale, or Use of a Military Cremation Urn (18 U.S.C. 710). Unauthorized Use of the Smokey Bear Symbol, Unlawful Reproduction or Use of the Character "Woodsy Owl" or Unauthorized Manufacture, Reprodur- tion or Use of the Character "Johnny Horizon" (18 U.S.C. 711-714). Illegal Manufacture, Use, Possession, or Sale of Emblems and Insignias, to Include Badges or Medals of (1) Veterans Organizations (18 U.S.C. 705), (2) 4--H Emblems (18 U.S.C. 707), (3) Merchant Marine and Seaman Decorations (46 U.S.C. 249), (4) Gold Star Lapel Buttons (36 U.S.C. 180). Misuse of the name Peace Corps (22 U.S.C. 2518). Many of the statutes within the investigative jurisdiction of the Attorney General would as a matter of Deparbment of Justice policy be assigned to the FBI. The major violations within the investigative jurisdiction of the FBI have been assigned a classification within the FBI's administrative system. The FBI does not currently have a list of all the violations which could be assigned to the FBI, many of which include violations which rarely, if ever, are investigated. Attorney General BELL. We particularly ought to address those that overlan another agency, like with the Wildlife Service. T did not know the FBI was into this. I did not realize we were protecting doves. [Laughter.] Mr. ADAMS. We have been approaching it in the reorganization studies. We first have to determine: What is the mission of the FBI? Is it the basic law enforcement agency or not? In trying to prevent proliferating matters under the processes in the past, anytime Congress passes a law, and no jurisdiction is at- tached to a specific agency, it rests with the FBI upon delegation from the Attorney General. So, there .are a number of areas like this that could be addressed. But the first they would be: What is the basic role of the FBI? Senator KENNEDY. Should the FBI be conducting civil rights in- vestigations, should some other agency, or should the Civil Rights Division be hiring its investigators to do that work? Director WEBSTER. The Attorney General might have a different view. but from ,what I can see, the FBI is doing an excellent job in this field. It suPplies a neutral investigation in the development of facts. I think that its record in this area is outstanding. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 50 The high professional level of the special agents assigned to this work gives them a better understanding of fairly complicated and sophisticated laws. My own view of it is that it is properly in the FBI. Attorney General BELL. Let me say this, Senator, also. I have had to face this. When I first got to Washington, there was a good deal of estrangement between the Bureau and the Civil Rights Division. That has been alleviated, to some extent. I think Mr. Drew Days and Mr. Adams have helped it out a lot. I remember in the South in the civil rights revolution of the sixties all the good work the Bureau did. Somewhere along the line I remem- ber the case against Lynn in Hattiesburg, Miss. It went on for 1 week there. It was in a voting case. I remember I was on the court at the time. There were 29 agents who testified in that case. Somewhere toward the end of the civil rights revolution there were hard feel- ings developed between the Bureau and the Civil Rights Division. I strongly disfavor giving anybody in the Justice Department any investigators. That is why the Bureau was created. Beginning in 1870 when the Department of Justice was created, they had an appropriation for investigators. They got more and more investigators. Finally, in 1906 or 1908 they created what they called the Bureau of Investigation. Later in the thirties it became the Federal Bureau of Investigation. Now, it seems to me to be a capital error to go back to the old system and start separate investiga- tors in some departments. There are a lot of people in the Justice Department who would like to do that. I found one U.S. attorney's office, since I have been here, where they had hired 30-some-odd extra lawyers and were not using the Bureau. That is the only U.S. attorney's office I found doing that. But I do not favor it. That is a short answer. Senator KENNEDY. I see. I want to thank all of you very much. We are just beginning the wiretap legislation on the floor, so I will have to excuse myself now. Can you tell us before I go whether. or not the Department has a task force working on this, Attorney General Bell? Attorney General BELL. The Office of Legal Counsel, John Harmon, and the Assistant Attorney General is in charge of this problem of getting this draft up. Mary Lawton denies that they are a task force, but they have a force of some sort working on it. [Laughter.] Director WEBSTER. I have just authorized a working committee. Maybe that is a better name for it. Senator KENNEDY. I see. We will look forward to working with them in the same spirit that we have had on the recodification, and on wiretaps. Mr. Adams and Mr. McDermott, I think, are coming back on Tues- day, April 25, for a second day of hearings on the charter. We will also have the Civil Liberties Union, which will testify as well. Again, I want to thank you very much. It has been very helpful. We stand in recess. [Whereupon, at 11 :05 a.m., the committee was adjourned.] Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 FBI STATUTORY CHARTER TUESDAY, APRIL 25, 1978 U.S. SENATE, COMMITTEE ON THE JUDICIARY, TV cr,shing ton, D .0 . The committee met, pursuant to notice, at 10 :30 a.m., in room 2228, Dirksen Senate Office Building, Senator Edward M. Kennedy (acting chairman of the committee) presiding. Present: Senator Metzenbaum. Staff present: Robert M. McNamara Jr., counsel, Subcommittee on Criminal Laws and Procedures; and Ann Logan, staff assistant. Senator METZENBAUM. Mr. Adams, I believe we will start the hearing now. I am sure Senator Kennedy will not mind. This will give me an opportunity to ask you a few of my questions. STATEMENT OF JAMES B. ADAMS, ASSOCIATE DIRECTOR, FEDERAL BUREAU OF INVESTIGATION, ACCOMPANIED BY JOHN S. McDERMOTT, DEPUTY ASSOCIATE DIRECTOR OF ADMINISTRA- TION, AND JAMES 0. INGRAM, DEPUTY ASSISTANT DIRECTOR, CRIMINAL INVESTIGATIVE DIVISION ME. ADAMS. Certainly. Senator METZENBAUM. Do you, in your Identification Division, col- lect fingerprints from any and all entities that make them available to you? Mr. ADAMS. It does serve as a central repository for fingerprint in- formation from police departments around the country. They make their submissions. It is a voluntary act on their part. I do not know what you may have in mind, Senator, from any and all means. Senator METZENBAUM. What is your policy about accepting in your Identification Division fingerprints that are offered to you by non- Federal entities? If the come in to you from a State or a municipal police department, do you just crank those right into your fingerprint bank? Mr. ADAMS. Yes; providing they meet certain entry criteria. Senator METZENBAUM. Are you familiar with the proposal being considered by SEARCII Group, Inc., a consortium of the 50 States and 3 territories, to limit the national identification of fingerprint program to submission by Federal and State agencies? Mr. ADAMS. I would like to refer that question to Mr. McDermott who heads up the administrative side of our house which includes the Identification Division. (51) Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 52 Mr. McDERmorr. Senator, I have not had a chance to study the SEARCH Group, Inc. proposal in detail, But beyond the submissions from local police departments, we receive the fingerprint submissions from the military. We receive fingerprint submissions from the licensing- authorities in State and local governments. We have the financial institutions who want to have a check of our fingerprint records made concerning prospective employees which, of course, is authorized by a specific statute. Beyond that, I do not know where your question is. Senator METZENBAUM. Do you think that we ought to include in the national bank any set of fingerprints that are forwarded to you? Let us assume that somebody runs a garage or a filling station or a retail store. They start to take fingerprints of their employees. They send those. in to you. Do you think all those should be made a part of your bank? Mr. McDfauvrorr. No, Senator, and they are not. If I may explain, let. me say this. The submission of a fingerprint card carries with it the implied request that the fingerprints be classified and searched against the criminal portion of our fingerprint card holdings which consist of approximately 76 million cards of our total 168 million cards. We have an obligation, by law, to respond only to those agencies, Federal, State and local which are authorized to receive information from us. The private sector, unless specifically is made the subject of legislation, such as financial institutions? Senator METZENBAUM. Do you mean national banks as provided for by law? Mr. MCDERMOTT. Yes. We would not respond to most private sector requests because we are not authorized to disseminate information to them. Senator METZENBAUM. When you say that you have 168 million cards on file, does that mean covering 168 million individuals? Mr. MCDERMOTT. No, Senator. As of February 1, 1978, we had about 1.68.5 million cards. They are considered to represent approximately 64 million people. They are broken down into various types, criminal and civil, and military prints, and so forth. Senator METZENBAUM. Would you distinguish for me how You have 64 million people and 168 million cards? Ido not understand that. Mr. MCDERMOTT. There are occasions where we will maintain more than one card on a given individual. Senator METZENBAUM. Why would you do that? Mr. MCDERMOTT. Well, again, I am not a fingerprint expert, and I hope you understand. I can arrange for a briefing in greater detail if you wish it. But, as I understand it, we retain all fingerprint cards submitted to us relating to arrests for serious or significant criminal offenses. On the other hand, fingerprints taken in connection with State statutes requiring fingerprint checks for employment and licens- ing are returned to the submitting agencies after being searched against the criminal portion of our files. In other words, we do not attempt to maintain individual fingerprint cards, in every instance where a set of prints is sent to us. Senator METZENBAUM. You do not maintain that? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : dA-RDP80S01268A000500020027-8 Mr. MCDERMOTT. No. Senator METZENBAUM. What are those 104 million cards that rep- resent the difference between the 61 million people and the 168 million cards? I am a little confused. That is quite a few million cards. Mr. Mc:DER-mow. What I am saying is that in some cases we main- tain more than one card on a given individual. This is most commonly the case with reference to our criminal fingerprint card holdings. Of Our total holdings of almost 168.5 million cards, about 76 million have been received concerning individuals charged with crimes. Those 76 million, approximately, are considered to represent 22 million people. Senator METZENBAUM. Of the 76 million, that relates to the 22 million people? Mr. MeDEumorr. Yes. So, you see the great majority of our finger- print file holdings do not relate to individuals who are charged or have been charged with crimes; Senator METZENBAMI. Say that again? Mr. McDrinuorr. The great majority of our fingerprint card hold- ings do not refer to individuals who have been charged with crimes. Said in a different context, almost 92 million of our cards refer to something like 42 million persons whose fingerprints were submitted to us for a noncriminal purpose. Senator METZENBAUM. For example? Mr. MCDERMOIT. Military. The millions of people who have served in the military have their fingerprint cards maintained in our civil fingerprint file. Also, individuals whose fingerprintsare submitted in connection with applications for Federal employment would be main- tained in that file. Senator METZENBAUM. Can we draw the conclusion that you have two out of every three adult Americans on a fingerprint card? Would that be. an accurate conclusion? I am assuming that there are 215 million people in America, and something like half of that are chil- dren. I do not know the -actual statistics. But would that be true? Mr. McDnumorT. I would have to say the figures would be signifi- cantly lower than that, Senator, in that our total of approximately 64 million cards of all descriptions---- Senator METZENBAUM. No. You mean 64 million people. Mr. McDEumovr. I am sorry. Yes; 64 million people. That would only constitute roughly, 27 or 28 percent of the entire population. Senator METZENBAUM. No. There are 215 million people, so that would amount to about 30 percent of the total population. But if you eliminate all the children in the population, whose fingerprints I would assume you do not have, then, it would seem to me, that the percentage would get up somewhere to 65 percent or something like that. Mr. McDERmorr. The figures are not as impressive as that for the reason that these prints have been collected since back in the twenties. Many of the individuals whose fingerprints are still included in there are since deceased. We do have purging procedures. As we come across criminal prints of individuals who are 80 years old or older, they are automatically eliminated. The same is true of the civil prints of individuals 75 years old or older. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 54 Again, you would wonder why we would keep prints that long. No. 1, there is the expense of purging where you have to hire hundreds of people just for the purpose of purging files. Second, there are benefits to be derived from the maintenance of these, such as in the case of missing persons and in the case of our sending our disaster squad out in the major disasters. There it is possible to 'compare finger- prints taken from the remains with cards on file. This has served a very fine purpose in the past. Senator METZENBAUM. Mr. Chairman, I took the liberty of starting to ask questions before you arrived. If you do not mind, I will con- tinue with a few. Senator KENNEDY [entering]. Fine. Senator METZENBAUM. Would you be good enough to advise the committee as to the percentage of adult Americans that you feel you presently have and for which you believe you presently have fingerprints? Mr. MoDEamorr. Senator, I would be delighted to have that studied. I am not optimistic that we could come up with a 'meaningful figure, but by all means I will have it studied. Senator METZENBAUM. Thank you. Senator KENNEDY. Without objection, so ordered. [The following response was received by the subcommittee from the FSI:] The FBI has started an indepth study to determine the percentage of adult Americans who are currently represented in the FBI's fingerprint files. At the conclusion of this study, this material will be furnished to the Senate Judiciary Committee. [ See appendix for additional response to the request ,for informa- tion referred to above:] 'Senator METZENBAUM. You recently procured a computerized fin- gerprint file from Rockwell International; is that correct? Mr. McDERmorr. We are under contract with 'Rockwell Interna- tional for research and development of an automated index of names for our Identification Division and also a piece of technology that we call by the acronym FINDER, meaning FINgerprint reaDER. That equipment will have the capability of digitally reading and classifying a set of fingerprints and comparing one set of fingerprints with 'another automatically. We have great expectations for this technology. We feel, in the long run, that it will he able to eliminate as many as 1,000 persons or more from our permanent staff in the Identification Division, which is now handling the fingerprint comparisons in a manual mode. Senator METZENBAUM. Do you expect to store in the computer all the prints you 'presently hold, or only an unduplicated set? Mr. McDERmoTr. This becomes very complicated. We do not antici- pate receiving as many duplicate fingerprint cards in the future. I am sure you are aware, Senator, of the present study on the com- puterized criminal history system. which proposes that computerized criminal histories be decentralized to the several States rather than having them maintained in oUr headquarters. This is the matter of a task force study right now by members of the FBI, the Department of Justice, and representatives of congres- sional committees. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : W-RDP80S01268A000500020027-8 Senator METZENBAUM. What is the b f basis o your keeping prints of persons who have never been charged or convicted of any crime in your file on a permanent basis? Why should the FBI have a record of law-abiding citizens and keep their fingerprints? Mr. MCDERMOTT. There are thousands of citizens who have requested that their fingerprints be maintained by us so that in the event of missing persons and amnesia, or a catastrophic accident in an aircraft or a train wreck Senator METZENBAUM. You said thousands. You now have some 40-some odd million prints of people who have never been charged or convicted of any crime. Out of those 40-some odd million, would you think that the percentage who have requested you to keep their prints would be in excess of one one-hundredths of 1 percent? Mr. McDERmorr. I would not guess, but I would guess it is minis- cule ; yes. Senator METZENBAUM. So, therefore, my question is this. What is the basis and purpose of the FBI keeping prints on law-abiding citizens? Mr. MCDERMOTT. The great majority of them, I would speculate, are based upon receipts from the military taken as people enter on duty with the military. This has gone on over the years, recognizing that part of our early fingerprint holdings was the transfer of military prints to us. Of course, since then, over the years, submissions by all of the Fed- eral executive branch agencies have been maintained. Senator METZENBAUM. Since we do not live in a police state, would you think it would be appropriate that in the Federal charter or in the FBI charter, that we specifically provide that it is the intent of Congress for the continued use of files of persons who are no longer military and no longer Federal employees and who are law-abiding citizens? Should that be totally eliminated and purged from your files? Or, would there be some contrary reason why there should be con- tinued retention from the law-enforcement standpoint? Mr. McDERmoTr. I think the subject of your inquiry is too im- portant to reach for a spontaneous handy answer. I would be very pleased to see a study made which would balance the advantages of retention against the disadvantages. Senator METZENBAUM. I would be happy to have you do a study, but I hope we might get your response by the time we begin drafting an FBI charter. I feel, Mr. Chairman, that it would be most appropri- ate for the Congress to indicate to the FBI that there is no reason for them to retain fingerprints of persons who have never been charged with a crime and have never been found guilty of a crime and who are not in the Federal service, even though they may have been in the military service or something of that kind. I see no reason for the law enforcement arm of the FBI to continue to maintain such files. I would hope that when we move toward a Federal charter that we might look more closely at the subject and perhaps address ourselves to it. Mr. MCDERMOTT. If I may add, Senator, it should not be overlooked that this does constitute a data bank. I realize that word carries a i certain degree of reprehensibility these days, but t does constitute Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 56 a data bank of fingerprint records against which comparisons can be made for a proper law enforcement purpose looking to the solution of crimes. Senator METZENBAUM. Would you then think?if that is the case, would you then think we should go the other way? Would. the FBI advocate a position to see that every American is fingerprinted? Mr. McDEumorr. No, sir; I would not. Senator METZENBAUM. Thank you very much. Thank you, Mr. Chairman. Senator KENNEDY. I welcome the Senator raising these questions. I think it is worth giving consideration to the proposal. It is well worth thinking about. I suppose one of the factors used in terms of fingerprints is freeing people from possible suspiCions of crime. I suppose there is a variety of different kinds of factors. I think the Senator raises a very worthwhile issue and question. I think we ought to invite a response from the Department without the long study, but just a thoughtful response. Senator, I suppose it might be worthwhile to put it in some kind of a letter. Senator METZENBAUM. That would be excellent. Senator KENNEDY. We could make that a part of the record, I suppose. Mr. MoDEumoTr. We would be happy to submit that for the record. Senator KENNEDY. Without objection, so ordered. [The following response was received by the subcommittee from the FBI.1 The FBI has started an indepth study to determine the percentage of adult Americans who are currently represented in the FBI's fingerprint files. At the conclusion of this study, this material will be furnished to the Senate Judiciary Committee. Senator METZENBAUM. Thank you, Mr. Chairman. Senator KENNEDY. Before we proceed, and since I was late, I would like to read my opening statement now. OPENING STATEMENT OF SENATOR KENNEDY Senator KENNEDY. Today the Committee on the Judiciary is holding the second of a number of hearings on a statutory charter for the Fed- eral Bureau of Investigation. The focus of these hearings is to determine the appropriate scope and the required detail which the charter should have if it is to be an adequate definition of the Bureau's legislative mandate. Last Thurs- day, Attorney General Bell and Director Webster not only strongly supported the concept of a statutory charter, but also committed themselves and their resources to this effort. Their commitment is an important first step in beginning this difficult endeavor. Today we welcome back Mr. James B. Adams, the Associate Direc- tor of the Federal Bureau of Investigation. Good morning, Mr. Adams. I would like to move to the area, first of all, of domestic security. These are some of the areas that we talked about last week. I want to get some greater detail. We were discussing domestic security and civil disorder. investigations. I think there was some confusion about which guidelines we were talking about and the method in which these matters were investigated. I would like to see if we can clarify Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : iZIA-RDP80S01268A000500020027-8 that, if we could. Could you review with us, Mr. Adams, the difference between the domestic security and civil disorder investigations? Mr. ADAMS. The domestic security guidelines basically provide the means by which we conduct investigations of individuals or organiza- tions who are involved, or will be involved, in violations of Federal law and force and violence for certain stated purposes. These are the basic guidelines that apply to the investigation of such activities that we now have underway in the 12 organizations under investigation which are engaging in criminal activities, principally bombing ac- tivities. The guidelines on civil disorders and demonstrations are pri- marily for the purpose of providing that there is no interference with the basic first amendment protected activities which are often at- tendant to demonstrations, public demonstrations, and sometimes civil disorders, likewise. It is to clearly define the limits of the Federal Government's inter- est which falls in areas whereby we can conduct and report, that is, conduct investigations and report on violations of Federal law that take place. We can, under certain limited circumstances, conduct inquiries at the request of the Secret Service in connection with their responsibilities to protect the President. We can conduct inquiries for the purpose of determining the need for Federal troops under the President's powers, or upon the request of the State. These are the principal purposes under which these guidelines apply. As I mentioned at the last hearing, we have only had one occasion under the civil disorder and demonstra- tion guidelines where the Attorney General has exercised his authority, which is specifically required to permit us to conduct such investigation. That was in connection with the Bicentennial celebration where the State of Pennsylvania had raised questions concerning the potential for violence, and, in fact, had requested that Federal troops be pro- vided in view of their estimates of impending violence. We concluded. based on information available to us, that the likelihood of such, and the need for such, was not demonstrated and, of course, the Government did not provide Federal troops. On the other hand, the conditions were such that the Attorney Gen- eral felt that an inquiry should be conducted to answer this question. Under these guidelines, we are still required to report incidents which come to our attention on potential civil disorders which may involve violence. We do not go out and actively investigate to collect that information. However, if the police department in a city reports to us information that there is going to be a demonstration or a poten- tial civil disorder resulting from the demonstration, then we do upon having that information Furnished to us, report it to the Department of Justice without taking any investigative action. Those are basically the guidelines under which we operate. It is very limited as to what we can collect. The nature of the information that we collect is limited, and, in no way, are they as broad as the domestic security guidelines for conducting investigations. Senator KENNEDY. How are each of these kinds of investigations initiated? Mr. ADAMS. Generally the field office in a domestic security case has the authority to open a preliminary inquiry, based upon the receipt of allegations to the effect that individuals or organizations may be en- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2ig CIA-RDP80S01268A000500020027-8 gaging in these activities which involve the violation of Federal law and force and violence. Those preliminary inquiries that are opened are very limited as to the scope of the investigation conducted. It is primarily checks of records, our records and local police records, and activities which do not intrude very far into what you would call, or what we would normally refer to as "basic investigative activity." The purpose of this inquiry is to determine whether there is a basis for a full investigation. Sometimes the questions cannot be an- swered with these preliminary inquiries. Under those circumstances, the field office, on the authority of the SAC or special-agent-in- charge, broadens it to include a couple of additional avenues of investigation. Again, this is solely for the purpose of determining whether there is a basis for a full and continuing type of investiga- tion. In the limited investigation, or in the preliminary inquiry? where the surveillance can be conducted for the purpose of identity alone?a physical surveillance can be conducted for no other purpose than just determining the identity of the individual. In the preliminary inquiry, the only interviews that could be con- ducted were very limited. Basically, we could check with the existing sources and information, use of established informants, that is, previ- ously established informants, and interviews for the limited purpose of identifying the subject. In the limited investigation, we can extend that to interviews going beyond identifying the subject which would be to determine what his activities are. The limited and preliminary, of course, preclude the use of mail covers, electronic surveillance, and so forth, as part of that type of investigation. A preliminary investigation can only be continued for 90 days, and can be extended one time for an additional 90 days. FBI headquarters must be advised, but does not have to approve the opening of the preliminary investigation. In moving to a full investigation, on the other hand, the full investigation can only be authorized by FBI headquarters, and it ?has to be on the basis of specific and articulable facts giving reason to believe that the individ- ual or group is or will be engaged in activities involving the use of force or violence in violations of Federal law for one or more of the stated purposes. At that time, we have to move into considerations of the magnitude of the harm, the likelihood that it will occur, the immediacy of the threat, and the danger to privacy. Also, at the time that we initiate or authorize the full investigation, we must notify the Department of Justice within a week, and then at the end of 90 days submit to them a summary report. This investigation cannot continue beyond a year without approval of the Department. So' these basically are the levels of approval by which preliminary or limited inquiries or full investigations may be conducted. Senator KENNEDY. How many of the full investigations are going on at the present time? Mr. ADAMS. When we were here last week I think the figure then was 12 organizations and 61 individuals. Some of those may have been preliminary. I would have to check the record because that would include preliminary, limited, and full investigations. Senator KENNEDY. Do you mean the 12 and the 61 include the pre- liminary as well as the full? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : gA-RDP80S01268A000500020027-8 Mr. ADAMS. That is right. Senator KENNEDY. Can you give us a breakdown? Mr. ADAMS. We will submit that for the record. Senator KENNEDY. That will be helpful. Without objection, so ordered. [The following response was supplied to the subcommittee by the FBI:] There are 41 full domestic security investigations, one limited and one pre- liminary investigation for a total of 43 domestic security investigations concern- ing individuals. Senator KENNEDY. If we are talking about the 12 investigations being a combination of full and preliminary, why should not that decision be made in terms of the preliminary at a higher level? Mr. ADAMS. Well, we feel that the guidelines are such that a special agent in charge should have the authority to act on an allegation. The nature of the activity which can take place in the preliminary is so limited with the check of his office and the check of local and State police records. These are activities which do not intrude out into full investigative activity. So, we have not seen fit, and the Attorney General has not sug- gested that the level of authority should be any higher than the special agent in charge on that. Senator KENNEDY. I suppose in one s6nse that it is limited as you describe it, but in another sense it does include surveillance. In that sense of surveillance, it reaches the legitimate and lawful first amend- ment activity as well. Mr. ADAMS. It should not. The surveillance should not. For instance, if an informant reported to us that an unnamed individual was attending a clandestine meeting of a group which is under full investi- gation, and, because of their activities and committing violence, if he advises us there is an unnamed individual there, then the field office could perhaps place him under surveillance. lie would lead them from the meeting to his residence in order to determine his identity. This would be under the preliminary investigation guidelines. This, in my opinion, is not a very intrusive technique, and in relating it to the basic purpose involved, I think it is not being considered other than what is normal investigative activity. Senator KENNEDY. ITow about the surveillance of open meetings? Would that be included in the preliminary investigation? Mr. ADAMS. If we received an allegation :that an organization met the criteria, without repeating it. But if it was just a general allega- tion with little degree of specificity from a source we would not just go out without some other reason to believe that. But, if we received the allegation, we are permitted under the guide- lines at the present time to utilize an established source or informant, an already existing informant, to attend public meetings, or meetings open to the public, of that particular organization to report back to us whether there is a basis for this allegation. The informant may also attend a closed meeting during the preliminary or limited in- vestigation only upon invitation of someone in the organization where- by dwould be inadvisable for him not to attend, that is the occasion in which he does that. So, we do have the potential, under the guide- lines, for covering a public session, and under a very limited circum- stance, a closed session. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 60 Senator KENNEDY. That is really what I was driving at. You do have, under the preliminary investigation guidelines for doing the pre- liminary work, the opportunity, as you defined it, in the closed ses- sion to place under surveillance what may well be legitimate first amendment activities. It would seem to me that in the preliminary sense that very well may be more of a chilling factor than further on down the road. I do not know. We are just feeling our way through this question. But these were the areas of concern of the things used in the past. Maybe you could review with us briefly the investigative, that is, the thresh- old investigative standards in each category. Mr. ADAMS. In the preliminary investigation, it may be undertaken on the basis of allegations or other information that an individual or group may be engaged in the activities which we previously discussed. In the full investigation, it must be on the basis of specific and articulable facts, giving reason to believe that an individual or organi- zation falls within those stated activities. Senator KENNEDY. Could the preliminary investigation take place with information from an unreliable informant? Mr. ADAMS. We have informants that have furnished reliable and unreliable information. Senator KENNEDY. What if you have a person like that? Mr. ADAMS. If we receive information from such a person, before we would open an investigation' we would certainly have to consider the nature of the information, the degree of access he would likely have had to that information as to whether it is reliable or unreliable, and we would have to consider all other facts involved. I think from the limited number of such investigations that we engage in, it shows the &are and attention presently being given these matters that we do not, either in our field offices or our headquarters, encourage just running off willy-nilly, trying to stretch a guideline to the point to where we would be conducting unnecessary or un- warranted investigations. We have a very small number. We also have considerable demands on our resources in all other areas of our operations. I think that considering the concerns which have been expressed and which are recognized in the guidelines for possible intrusions into protected activities that there is a very careful and determined effort to ensure that investigative activity is not initiated in this sensitive area unless it is fully warranted. Senator KENNEDY. When does a domestic security investigation spill over and become a counterintelligence investigation? I can see a situation where one might start off with civil disorder and move toward domestic security, and then to counterintelligence with a whole range of different thresholds that have to be met and a range of different techniques being available to the Bureau. Mr. ADAMS. It does not happen very often. I know that since we initiated the guidelines, in the domestic security and foreign counter- intelligence investigations, for example, we have only had one group of investigations that have moved, per se, from the domestic to the foreign field. It is true that we have occasionally had individuals who ere engaged in domestic activity, who, at some later point, become identified as Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :611A-RDP80S01268A000500020027-8 being involved in espionage or related activity which would move them to the foreign counterintelligence area. I inquired the other day. Since the initiation of these guidelines in April 1976, the investigative activity on only one organization or group?and its attendant members?has been moved from the domes- tic to the foreign counterintelligence area. No one could recall any other specific individual cases that had been so moved. Senator KENNEDY. You said just one; is that correct? Mr. ADAMS. Right. It is one organization with attendant members and front groups. Senator KENNEDY. What about from the other way, that is, the counterintelligence to the domestic security? Mr. ADAMS. There have been none that I know of that have moved in that direction. I know of none that have been moved in the opposite direction. Senator KENNEDY. We would like to see the organizations in ex- ecutive session, that is, the organizations included in this list. Let me move to this. Let us say that we have a speaker advocating political reform. Let us say that if that political reform does not occur, that people should take the matter into their own hands, or to forcibly change the Government. Does that meet your threshold? Mr. ADAMS. No, it does not. In fact, as I referred in one of our prior sessions, we do have this organization where the Attorney General has determined not advocacy, but intent to overturn the Government by force or violence. It consisted of about 71 members at the time, but all of their activities have been restricted to recruiting adherents to their cause, publishing their aims and statements, and recruiting in the fac- tories. But no element of violence has taken place yet. We apply the magnitude of harm test. Sure, the magnitude is great if they could carry out their threat, but the likelihood is not great and the im- mediacy is not great. All of these qualifying matters have to be applied. It was concluded that we had no authority to continue the investigation under the domestic security guidelines. This poses certain problems to us which we are still trying to address with the Department, which is the fact that by not being able to investigate the organization, we cannot target informants against it. We would then not know if they move from 71 individuals to 70,000 individuals unless at some point in time someone does become aware of it and reports it to us. We are concerned over our ability to accommodate this, which is unquestionably the proper decision concerning first amendment rights, with our responsibilities under Executive Order 10450. If members of this organization apply for sensative positions in Government, then we would not be able to maintain that information on them and report that information. This is indicative, I think, of the care which is presently being given this with which the procedures are being problem and the seriousness followed.' threatens violence? How o you licy decisions .and you tell if there is a group that d u government? Senator 4-KnEN:0EDY.. How. do a b foreign directe y a . be, they determine wh ether . are being formants, through in dividnals who can With Mr. ADAMS. Through a word of their? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 29-211 0 - 5 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 62 Senator KENNEDY. When do they come into play ? If a group does suggest this, then do you activate your informant system? Mr. ADAMS. No. If it does not meet that basic criteria-- Senator KENNEDY. How do you know whether it meets the basic criteria unless you do some kind of investigation? Mr. ADAMS. No. 1, we have to rely pretty much, at the present time, upon committed acts to indicate violence. We have certain organiza- tions that publicly take credit for their bombing acts, like the New World Liberation Front, which issues a communique every time they blow up a Pacific Gas & Electric Co. facility. Our investigations, as you can tell, from the number, are 12, and in executive session we will be very glad to demonstrate to you why these organizations came to our attention and why we reach that threshold and how we reach the threshold for a full investigation. Senator KENNEDY. We would be interested, as well, in the ones where you did not move ahead in terms of an investigation. You must have a next group. You made a decision to do the top 12. What about the 12 cases below these. I do not know whether you rank them or not. Mr. ADAMS. Do you mean organizations that -we did have under investigation and then concluded them after a period of time? Senator KENNEDY. Yes. Mr. AnAms. Yes, we have had those. Senator KENNEDY. Maybe in executive session we could address those as well. I would be. interested in the basis for not moving ahead and what information you did have which urges you to move ahead. We would like to get some sense about how these, criteria are being implemented and the judgment that is being placed on various words in meeting that criteria. Mr. ADAMS. That can be very easily demonstrated because of the violence in the organizations and the determination of it and the period of time by which we subsequently terminate the investigation. Senator KENNEDY. What types of preventive action does the FBI take in the domestic security cases? We got into this area briefly the other day. Since the guidelines went into effect, has the FBI taken any preventive actions in domestic security cases or investigations? Mr. ADAMS. Preventive, action is a term that has to be pretty clearly defined. One of the best examples was in California recently where during our investigation of the Weather Underground we were able to penetrate the. organization. By having live individuals within the organization, we became aware of a plot to engage in an assassination and a plot to engage in bombings. We were able to prevent the, action taking place because it reached the conspiratorial stage. It reached the conspiracy act, and actually reached the attempted bombing. The bomb was constructed. It was to be set off under the office of a State senator in California. We had another case involving a group whereby, based on inform- ant information within the organization, an antibusing situation, the guidelines were met because they were engaging in violence and deny- ing people their civil rights. We became aware of a cache of grenades, thom explosives and weapons. We were able to prevent, their use by - soei:za:ngs of a domestic thro,,h a search warrant. Again arisino? out we have had an 'organizgatifoonreiino:nNde.wi York security investigation, under investigation that was engaged in harassin and engaging in bombing activities. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : 04-RDP80S01268A000500020027-8 Through penetration of the organization, we became aware of plans and were able to prevent those plans from taking place. In most instances, we try to pursue the matter until we can develop a prosecut- able violation. This becomes a very delicate question at times as to whether we have sufficient control over this situation so that we can develop the case to a prosecutable standpoint. By taking .these in- dividuals off the street, we insure that they will not commit the act on a subsequent date as long as they are incarcerated. In some instances, if you are unable to develop a prosecutable case, then it is necessary to just go out and interview the known partici- pants in order to let them know that you are aware of their anticipated plans and hope that you discourage the activity in that regard. Those are instances that come to mind. Senator KENNEDY. Those are interesting examples. I suppose I would be interested in how many tithes, let us say, for the period of the last 18 months or the last 2 years, that this has taken place. Let us say that you were able to take preventive action. Specifically we would like to know about the actions that were taken. We would like to know about your own interpretation as to how the anticipated action was avoided. Is 2 years a reasonable period of time for you to check out? Mr. ADAMS. That would be a reasonable time frame. I would like to cover that, if we may, at the same executive session because one particular item I have in mind is a current on-going situation which could be more appropriately discussed then. . Senator KENNEDY. Fine. - Mr. ADAMS. But I would like to assure. you, Senator Kennedy, that when we are talking about preventive action, we are talking about it in this narrow area. We are not talking about the neutralization, dis- ruption, and that sort of activity which took place during the COINTELPRO actions of years past. Senator KENNEDY. Let me ask you this. You will supply that information for us? Mr. ADAMS. Yes. Senator KENNEDY. It is important because the balance here is the type of threat to the rights of individuals covered by the first amend- ment covered in these domestic security questions. You indicated in your testimony, as did Director Webster, that you . take preventive actions in terms of protecting the lives of individuals as well as their security. I think it is important for us to try to evaluate what these factors are. I think that will be an important consideration for the committee. So, we would like to get that informa- tion from you and review it with you. We will do that in executive session. Mr. ADAMS. I would be glad to. Senator KENNEDY. Let me ask you this: On the issue of neutralizing the activities of domestic security groups, are any efforts made now to neutralize activities of domestic security groups? Mr. ADAMS. No; not in the sense that it was used under the COINTELPRO actions. Senator KENNEDY. How about outside that sense? Mr. ADAMS. We would like to neutralize the activities of several violence-prone groups by successful prosecution of all the criminal Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2A4 CIA-RDP80S01268A000500020027-8 acts that have been committed. That; is the only sense that I can say that we are interested in neutralizing the activities. Senator KENNEDY. It has been suggested that paid informants or undercover agents can be used as a part of infiltrating the domestic security. Someone has suggested that a warrant, similar to a title III warrant, be required. Do you have any thoughts on this? Mr. ADAMS. Well, I think that a warrant requirement for use of in- formants is impractical. I feel that there is no adequate way that you can devise a warrant procedure which would not almost negate the effectiveness of any informant program. Senator KENNEDY. Why is that? Mr. ADAMS There are problems of notice when you get into war- rants. There are problems of publication. There is the protection of the confidential relationship. There is the degree of specificity which would be required for probable cause, or some degree of cause. In- formants are often used as extensions of an investigative prerogative. We do not have probable cause at the time that we investigate a prob- lem. We have often only an investigator's years of experience and hunches that criminal activity is afoot. Recognizing certain signs' or recognizing certain behavorial patterns, cause an investigation in the criminal field to be initiated. The attaching of a warrant requirement ignores the fact that an in- formant in a criminal case is already engaged in criminal activity in many different areas. We are contacting him on a regular basis to furnish us information that might come to his attention on a matter within our investigative jurisdiction. We do not know beforehand what we can target him toward. He is out there seeking to ferret out Federal violations and trying to bring them to our attention due to his exposure. I recognize that during the charter discussions that this issue is such a sensitive issue that it must be addressed. We fully intend to address it. But my initial impression, as we have discussed it over the past 3 years, because of various inquiries that have been made, we have found the problems almost insurmountable to still provide for effective use of human informants. Senator KENNEDY. Would you draw any distinction between the use of them, let us say, in organized crime, in terms of white collar crime, as distinguished from the areas that involve the greater degree of First Amendment activities, in terms of the domestic security and civil disorder? Do you see any distinction? Mr. ADAMS. I think some of the problems are still there. I guess what I keep coming back to is this. I have difficulty with the small number of informants we presently have in domestic security. It is less than 100 in a Nation of 200 million people. I think our attention has been obtained most dramatically in the past few years in widespread investigations to possible abuses in the area of the use of informants and so forth. We have tight guidelines. Even under the domestic intelligence provisions for utilizing inform- ants we have tight guidelines. Under the criminal use of informants, we also have tight guidelines. I feel that with the guidelines that we now have that the sensitivities are being recognized and the individual rights are being recognized. We hate to say that we have reduced abuses to an irreducible mini- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :&IA-RDP80S01268A000500020027-8 mum, but I think the sheer numbers alone is a good indication of our efforts in that regard. Senator KENNEDY. Perhaps you could submit something on the prac- tical problems which you have touched on here. Mr. ADAMS. Yes, We Will. Senator KENNEDY. Thank you. Without objection, so ordered. [The following response was received by the subcommittee from the FBI:] OFFICE OF THE ATTORNEY GENERAL, Washington, D.C., December 15, 1976. To: Clarence M. Kelley, Director, Federal Bureau of Investigation. From: Edward H. Levi, Attorney General. Subject: Use of informants in domestic security, organized crime, and other criminal investigations. Courts have recognized that the Government's use of informants is lawful and may often be essential to the effectiveness of properly authorized law enforce- ment investigations. However, the technique of using informants to assist in the investigation of criminal activity, since it may involve an element of deception and intrusion into the privacy of individuals or may require Government co- operation with persons whose reliability and motivation may be open to question, should be carefully limited. Thus, while it is proper for the FBI to use informants in appropriate investigations, it is imperative that special care be taken not only to minimize their use but also to ensure that individual rights are not infringed and that the government itself does not become a violator of the law. Informants as such are not employees of the FBI, but the relationship of an informant to the FBI imposes a special responsibility upon the FBI when the informant engages in activity where he has received, or reasonably thinks he has received, encour- agement or direction for that activity from the FBI. To fulfill this responsibility, it is useful to formulate in a single document the limitations on the activities of informants and the duties of the FBI with respect to informants, even though many of these limitations and duties are set forth in individual instructions or recognized in existing practice. As a fundamental principle, it must be recognized that an informant is merely one technique used in the course of authorized investigations. The FBI may not use informants where it is not authorized to conduct an investigation nor may informants be used for acts or encouraged to commit acts which the FBI could not authorize for its undercover Agents. When an FBI informant provides information concerning planned criminal activity which is not within the investigative jurisdiction of the FBI, the FBI shall advise the law en- forcement agency having investigative jurisdiction. If the circumstances are such that it is 'inadvisable to have the informant report directly .to the agency having investigative jurisdiction, the FBI, in cooperation with that agency, may continue to operate the informant. A. USE OF INFORMANTS In considering the use of informants in an authorized investigation, the FBI should weigh the following factors: I. The risk that use of an informant in a particular investigation or the conduct of a particular informant may, contrary to instructions, violate indi- vidual rights, intrude upon privileged communications, unlawfully inhibit the free association of individuals or the expression of ideas, or compromise in any way the investigation or subsequent prosecution. 2. The nature and seriousness of the matter under investigation, and the likelihood that information which an informant could provide is not readily available through other sources or by more direct means. 3. The character and motivation of the informant himself; his past or potential involvement in the matter under investigation or in related criminal activity; his proven reliability and truthfulness or the availability of means to verify information which he provides. 4. The measure of the ability of the FBI to control the informant's activities insofar as he is acting ?on behalf of the Bureau and insure that his conduct will be consistent with applicable law and instructions. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 66 5. The potential value of the information he may be able to furnish in relation to the consideration he may be seeking from the Government for his cooperation. B. INSTRUCTIONS TO INFORMANTS The FBI shall instruct all informants it uses in domestic security, organized crime, and other criminal investigations that in carrying out their assignments they shall not: 1. Participate in acts of violence; or 2. Use unlawful techniques (e.g., breaking and entering, electronic surveil- lance, opening or otherwise tampering with the mail) to obtain information for the FBI; or 3. Initiate a plan to commit criminal acts; or 4. Participate in criminal activities of persons under investigation, except insofar as the FBI determines that such participation is necessary to obtain information needed for purposes of Federal prosecution. Whenever the FBI learns that persons under investigation intend to commit a violent crime informants used in connection with the investigation shall be instructed to try to discourage the violence. C. VIOLATIONS OF INSTRUCTIONS AND LAW 1. Under no circumstances shall the FBI take any action to conceal a crime by one of its informants. 2. Whenever the FBI learns that an informant used in investigating criminal activity has violated the instructions set forth above in furtherance of his assignment, it shall ordinarily notify the appropriate law enforcement or prose- cutive authorities promptly of any violation of law, and make a determination whether continued use of the informant is justified. In those exceptional circum- stances in which notification to local authorities may be inadvisable, the FBI shall immediately notify the Department of Justice of the facts and circumstances concerning the investigation and the informant's law violation, and provide its recommendation on reporting the violation and on continued use of the informant. The Department shall determine: (a) When law enforcement or prosecutive authorities should be notified of the law violation; ( b) What use, if any, should be made of the information gathered through the violation of law, as well as the disposition and retention of such informa- tion; and (c) Whether continued use should be made of the informant by the FBI. 3. Whenever the FBI has knowledge of the actual commission of a serious crime by one of its informants unconnected with the FBI assignment, it shall ordinarily notify the appropriate law enforcement or prosecutive authorities promptly and make a determination whether continued use of the informant is justified. In those exceptional circumstances in which notification to local authorities may be inadvisable, the FBI shall promptly advise the Department of Justice of the facts and circumstances concerning the investigation and the informant's law violation, and provide its recommendation on reporting the violation and on continued use of the informant. The Department of Justice shall determine: (a) When law enforcement or prosecutive authorities should be notified of the law violation; and ( b) Whether continued use should be made of the informant by the FBI. 4. In determining the advisability of notifying appropriate law enforcement and prosecutive authorities of criminal activity by FBI informants the FBI and the Department of Justice shall consider the following factors: (a) Whether the crime is completed, imminent or inchoate; ( b ) Seriousness of the crime in terms of danger to life and property; (c) Whether the crime is a violation of federal or state law, and whether a felony, misdemeanor or lesser offense; (d) The degree of certainty of the information regarding the criminal activity; (e) Whether the appropriate authorities already knew of the criminal ac- tivity and the informant's identity; and (f) The significance of the information the informant is providing, or will provide, and the effect on the FBI investigate activity of notification to the other law enforcement agency. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :69A-RDP80S01268A000500020027-8 Senator KENNEDY. Just before leaving that question, Mr. Adams, let me say this The courts have ruled on that question. I wonder whether perhaps we could devise a different procedure under title III or not ? You commented about your concern for title III provisions and the inherent problems that are suggested by that. I am referring to the conduct of criminal investigations in terms of notice ancr the relevation of evidence and other factors. I wonder if a warrant pro- cedure could be shaped different from title III to deal with some of these other considerations. Obviously these are preliminary exami- nations of some of these issues. We would like to search these out a bit more. We would like to pursue that issue in more detail. Mr. ADAMS. That will be fine. Senator KENNEDY. We might have suggestions, but it might be helpful to us to look closely at your response. You indicate that as a practical problem, you have difficulty in the warrant area. Maybe we could write you a letter and give you some different alternative ways where a warrant procedure might be fashioned and get your response to that. Mr. ADAMS. Certainly. I would be glad to respond. Senator KENNEDY. Thank you. Without objection, so ordered. [The department supplied the following response to the committee.] A request for information on how the FBI would be adversely affected by a warrant requirement in the use of informants. It is assumed an informant is a person who provides the FBI information in a continuing and confidential relationship concerning matters of investigative interest, and that the warrant requirement for the use of an informant will require an allegation of a violation of Federal law. 1. Informant who provides information of a criminal nature when received and is not targeted toward specific individuals or groups. A warrant requirement for this type of informant would be unworkable. The persons contacted by the informant and the type of information developed are not known until after the fact. The FBI is presently operating several inform- ants of this type who provide information including that used for criminal intelligence, identification of subjects, detection of crimes, probable cause for arrest and search warrants, and undercover activities. 2. Informant who provides information regarding a particular criminal group. This type of informant is particularly valuable in organized crime investiga- tions and investigations involving criminal groups whose criminal enterprise is particularly covert. The warrant requirement would cause difficulty if little were known regarding a group's specific activities. The question would have to be resolved wether a warrant would have to be obtained in order to attempt to develop an informant within a group and whether a warrant would be re- quired to use on the existing informant to penetrate the group. This type of informant is used to develop information regarding the members of the group and their activities and to corroborate other investigations. 3. Informant used strictly for obtaining intelligence information who is unable or refuses to provide specific information regarding criminal violations. Criminal intelligence information is critical to investigations involving groups whose organization and leadership are not known. The FBI is presently operat- ing several informants who provide strictly criminal information regarding organized crime groups. A warrant requirement would complicate the use of such informants because of their limited value regarding the development of information concerning specific criminal violations. 4. Informant who is developed primarily to determine the extent of criminal activity in a particular geographical area or industry. A warrant requirement for such an informant would be unworkable because the informant's value is to determine the extent of criminal activity and no specific allegations regarding criminal activity can be made prior to his activity. 5. Informant used to check reliability of a second informant. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 68 This type of informant is necessary in determining what further steps can be taken based on another informant's information. This information includes that used for probable cause for a search warrant or title 3 affidavit which requires specific corroboration either to support the affidavit or to protect an informant. The warrant requirement would also be an undue complication in the use of this type of informant. 6. Informant who is in a position to provide information regarding local violations but refuses to deal directly with local authorities. A warrant requirement here would be unworkable because no Federal viola- tion could be alleged. In addition to the above-described complexities of a warrant requirement. the fact a record will be made of the informant's activities and a return will be required present another possibility of informants being identified. Informants are vital to the overall success of the FBI's investigations and the warrant requirement would cause citizens to be reluctant to become involved. The war- rant requirement constitutes an undesirable complication of criminal procedure which will benefit criminals to a greater degree than it will provide a protection of first amendment rights. Senator KENNEDY. Yes; we will do that. Last Thursday, one serious problem with undercover operations was discussed. This is the time in which the agents may be called upon to break the law or to participate in an illegal act. Judge Bell reviewed with us some of the common law holdings on this. Can you give some of the specific examples of the types of activity that we are talking about? Mr. ADAMS. The most common case is false identity whereby there may be a State or local law forbidding the use of certain types of identification, that is, providing for proper authorization of certain types of identification. We provide them with false identification in order to carry out their investigative responsibilities. Another area is in connection with some of our operations. We may buy stolen property. We will put an undercover agent in a posi- tion whereby he may buy one stolen tractor-trailer, and, instead of making the arrest at that time, we try to penetrate the organization. So, we buy the stolen property and keep the operation going until at some point we can move up the line and determine who the conspira- tors are who are actually running the commercialized theft operation. We have certain problems in running a business, let us say, and in having receipts and disbursements. There are certain Government regulations that when you receive money it immediately goes into the Treasury. We need to continue a viable operation. We cannot be on the losing end all of the time. We would soon run out of appropria- tions in that area. We have had occasions where agents participated in gamblrno. operations in order?and I do not mean just violation of the local gambling laws, but in actual operation of a gambling facility?but we have to do this until we can make a case against high-level organized crime figures, which we did make successfully. All of these have been covered generally by the court decisions which basically apply to narcotics. In one case, one undercover nar- cotics agent could sell narcotics to an individual who then sold it to another undercover agent. The courts have held that is legal. It is only when the activity becomes so outrageous that there does become a question of legality. But, yet, our people do have a rather great concern over their activities today, and would like to be assured that there is a recognition that some of these procedures are taking Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : 051A-RDP80S01268A000500020027-8 place and that Congress does indicate its accommodation with the executive branch on it. But .these are matters which we intend to explore in the charter formulations. Senator KENNEDY. Do you have guidelines for undercover agents, especially in the area of illegal activity? Mr. AnAms. No; the Department has handled these matters on an ad hoc basis in the past. We should have had a tunnel under the street between the two buildings with all of the ad hoc decisions that have gone on in the past several years. So, Mr. Civiletti recently indicated that perhaps we could establish guidelines which would relieve the necessity of so many ad hoc decisions on these matter. At the same time, this would give our agents greater assurance by having guide- lines in hand which they could readily see had been approved by the Department of Justice. Under our procedures, as Judge Bell men- tioned last week, we would submit these to the Oversight Committee, likewise, for review before action. Senator KENNEDY. You are going to do that? Mr. ADAMS. Yes. Senator KENNEDY. When will you have those? Mr. ADAMS. That is not that July 1 promise date. Senator KENNEDY. I hope also that you would indicate what pro- cedures for review and approval of these types of activities would exist within the FBI and how you would deal with sui generis types of situations. We, would be interested in that. Mr. ADAMS. Each operation that we run, of a long-term duration, that is, an undercover operation, we require the field to send a memo- randum to headquarters outlining the operation. This goes through our Legal Counsel Division en route to me, and when necessary, on up to the Director, and, in some cases, to the Attorney General for approval. We do keep close control on them. The people consult with our Office of Legal Counsel in advance, but as a final fail-safe, each operation is routed through the Legal Counsel Division for its com- ment and approval. Senator KENNEDY. I think we probably ought to have a chance to see the ones that have been approved by the Attorney General over the last 11/2 years. Mr. ADAMS. That will be fine. Senator KENNEDY. Let us say since 1976. Mr. ADAMS. We might have somewhat of a problem if it is a cur- rent ongoing operation. But I think we will have, during that period of time, some that have been closed after criminal prosecution. They would, therefore, be available. We will be glad to submit that for you. Senator KENNEDY. Thank you. Without objection, so ordered. [The following response was received by the subcommittee from the Department: A request for information concerning undercover operations approved by the Attorney General since 1976. In connection with the evolution of the application of the undercover technique, specifically in long-term undercover operations, it is important to note that the initial operations were Law Enforcement As- sistance Administration (LEAA) joint local-Federal endeavors funded under the LEAA antifencing program. A condition of granting funding for joint proj- ects is an LEAA requirement for a confidential memorandum of understanding setting forth the terms of the partnership between the local and Federal partners. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 70 In each instance wherein the FBI participated as the Federal partner in LEAA joint funded operations, the confidential memorandum of understanding for these operations was submitted to the Attorney General for his approval. The position of the Department of Justice in regard to cooperative operations against organized theft and fencing is succinctly set forth in a letter from Assistant Attorney General Richard L. Thornburgh to the Director, FBI, dated January 14, 1976, which has been attached to this letter, q.v. Since 1976, there have been 20 such LEAA funded joint local-Federal under- cover operations wherein the procedure outlined above was followed. Most of these operations are still pending prosecutive action. An example of such an operation wherein all prosecution has been com- pleted is the LEAA funded long-term undercover operation code from TRICONN conducted jointly by the Metropolitan Police Department (MPD), Washington, D.C., and the Washington field office of the FBI. TRICONN was an outgrowth of two previous Sting operations and was targeted against fences, drug dealers, and dishonest businessmen. In this operation, a liquidation company was estab- lished as a front business for handling stolen property. This business, repre- sented as a branch facility of a national organization, utilized a combined office/warehouse complex to project an impression that the business was capable of handling major items of stolen property. This business was staffed with under- cover operatives from both the FBI and MPD who handled all contacts with the criminal element. Closed circuit television (CCTV) with audio backup was utilized to record all transactions in the business front. This operation ran from Oct. 12, 1976, to Sept. 8, 1977, and resulted in significant statistical accom- plishments and widespread media coverage. The confidential memodandum of understanding for each Sting operation, in- cluding TRICONN, was submitted to the Attorney General for approval, and Attorney General approval was obtained for the nontelephonic consensual monitoring of conversations with the criminal element in connection with the installation of the CCTV and the use of on-body recorders and transmitters by the undercover operatives. It should be emphasized here that LEAA funded joint local-Federal under- cover operations were conceptually similar based on an LEAA requirement that all grants under the antifencing program be targeted specifically against property crime. Also of significance is the fact that LEAA is an agency within the Department of Justice and as such had final approval authority for all LEAA grants under the antifencing program. Each grant application for an under- cover operation detailed the operational plan and targets of the project as well as the projected budget and manpower requirements. Since funding became available in the FBI appropriation for fiscal year 1977 for support of the undercover technique, there has been a shift from joint LEAA funded operations to solely Bureau funded long term operations targeted specifically at crime problems impacting upon FBI jurisdiction. Each Proposal for a solely Bureau funded long term undercover operation is sub- mitted to FBI Headquarters for approval. The approval process involves a complete review by the Legal Counsel Division at FBI headquarters, and in those instances where there is a unique legal problem, or unusual application of the undercover technique, the U.S. Department of Justice is consulted for a legal opinion. The majority of these operations have been conceived and implemented since 1976 and are presently in various stages of operation and/or adjudication in the courts. An example of a solely Bureau funded operation is the long term undercover project code name GEMINI conducted by the New York City Office of the FBI. This operation began in August 1976, and ended in March 1978. All prosecutive action has since been completed. This operation was established as a cartage business, utilizing a confidential source of the New York office and an undercover special agent, targeted against organized crime infiltration and control of the waste removal trade in the New York City area. It was anticipated that this business would be forced to pay kickbacks for the privilege of doing business in the New York City area. This business was actively involved in the daily routine of collecting garbage and soliciting new business from companies being serviced by suspect hoodlum-owned carting companies. In the course of this operation, the FBI undercover special agent was assaulted while performing his undercover role. Since nontelephonic consensual monitoring was absolutely essential for the safety of the undercover special agent and to collect evidence of criminal Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CM-RDP80S01268A000500020027-8 violations, this proposal was submitted to the Attorney General for approval. This operation resulted in significant accomplishments, including the conviction of organized crime figures in New York City. It is pertinent to note that all long term undercover operations, wherein any mode of nontelephonic consensual monitoring is anticipated, are submitted, in accordance with U.S. Department of Justice regulations, to the Attorney General for approval. Such a request details the modes of technical coverage to be utilized, the nature of the operation, the role of the undercover operative, and the targets or subjects of the investigation. Almost without exception. all long term undercover operations are predicated upon the employment of some mode of nontelephonic consensual monitoring in order to successfully implement and support the use of the undercover technique. Further, any utilization of the undercover technique in long term operations is coordinated with and approved by the U.S. Attorney of concern in connection with obtaining his commitment to prosecute cases developed through the use of the undercover technique. DEPARTMENT OF JUSTICE, January 14, 1976. To: Director, Federal Bureau of Investigation. From: Richard L. Thornburgh, Assistant Attorney General, Criminal Division. Re Cooperative operations against organized theft and fencing activities. In a memorandum to you dated December 16, 1975, this Division expressed approval of a "Memorandum of Understanding" which outlined plans for a coordinated covert operation to attack Tidewater, Virginia, area organized theft and fencing activities. It is our understanding that the FBI has previously participated in similar projects in Illinois, New Jersey, and Washington, D.C. Your vigorous and innovative efforts to combat the serious threat posed by organized theft and fencing activities are most commendable. Since we in the Criminal Division are most interested in enhancing enforcement in these areas of criminal activity, we are anxious to assist you in these efforts in any way we can. Cognizant personnel in the Law Enforcement Assistance Administration have informally notified us that they would like to see similar projects launched in other cities with similar theft and fencing problems. However, as you know, local law enforcement agencies must initiate the grant application for funding of projects such as the Norfolk operation. Accordingly, we would suggest that the FBI informally bring the availability of this particular type of LEAA funding to the attention of local authorities in these localities in which the Bureau feels such a cooperative effort would be both necessary and workable in terms of the degree of cooperation that could be expected. This type of informal encouragement and liaison with local authorities con- cerning available LEAA funding is in no way contrary to the statutory and administrative limitations on LEAA operations. We request and would appreciate your views regarding the establishment of additional projects in other geographical areas. We will be glad to assist in any way possible, such as assisting in liaison efforts with cognizant U.S. Attorney's offices or local prosecutors. Senator KENNEDY. You will assemble those? Mr. ADAMS. Yes. Senator KENNEDY. I understand the use of undercover agents is a relatively new phenomenon. Is that right? Mr. AnAms. We have always used them, but in a different form. They used to be mostly "buy-bust." Certain agents were experts on art and where we knew that certain thieves were trying to dispose of priceless art, we would use them to make the "buy-bust" situation. It is only within the past few years that we have begun to engage in more long term systematic operations. That is where the new opera- tion conies in. Senator KENNEDY. I would like to know the reasons for that, de- cision. I wonder why you made that decision now, which had not been a part of the Bureau's procedure in the past. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2h: CIA-RDP80S01268A000500020027-8 Mr. ADAMS. I think, for one thing, there is the financial situation. in the past when we had such limited funds in that area, at the time that you recovered the painting, if you did not recover the $50,000 that you had for "show" money in order to purchase the :painting, that had a rather severe impact on the budgeted funds available for such purposes. Last year, Congress approved $3 million in this regard. Senator KENNEDY. What did you request from OMB; do you know? Mr. ADAMS. I think originally we had requested $6 million. We got $3 million. We have had some discussion back and forth internally within the Bureau?not between the Bureau and the Department, but internally?and we feel basically that the $3 million has been a realistic figure. It does take an inordinate amount of manpower to support it. With the other demands on our manpower resources, we think that we are going to come in right where we should be on the $3 million. We do not feel that we have passed up any good oppor- tunities in order to do this. Senator KENNEDY. As for the FBI's access to records, to what ex- tent has the FBI formal access to various types of third-party records? I am talking about employment records, credit records, medical rec- ords, phone records and tax records? Mr. ADAMS. It varies considerably. With bank records, for instance, even in the face of the Supreme Court decision indicating there are no privacy problems, but that the records are the records of the bank and not the depositor, we utilize subpenas in almost every instance. I think a survey was conducted a month or so ago which showed that subpenas were almost invariably utilized. In certain private employ- ment records, the public still cooperates willingly with the FBI in our investigative activity. We do enjoy a degree of access to such basic records of identity and aspects like that. There are tight controls on credit bureau records. We can obtain fugitive information, for example, and place of employment and last employment and that type of data, but we cannot get a full report without a subpena. Senator KENNEDY. You would say you have general access in all your divisions, for those types of third-party records? Mr. ADAMS. No; I say it varies. For instance, in bank records, there is the subpena, route. In some other areas, it is access just on the basis of cooperation on the part of the private company. Senator KENNEDY. IS it the position of the Bureau to try to get those records whenever they are available or whenever they have these informal or formal arrangements? From what I gather from your testimony, some of it is based on informal relationships that are worked out in different regions or in different agencies; is that right? Mr. ADAMS. It gets back basically to the investigative function that most of our work is. Most of it is knocking on doors and asking people questions. That .type of cooperation. Many people do not distinguish between answering our questions when we ask them or from showing us the records of their company concerning a matter that we might have under investigation. When you get into the areas of banks and telephone toll records, that is a different situation. We have had records such as this which Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CRDP80S01268A000500020027-8 have been the subject of congressional deliberation and concern: The general trend is toward requiring a subpena before making available third-party records. Our concern is that legislation is introduced almost every year which would apply, or propose to apply, warrant require- ments to records. One bill was introduced a year or so ago that private investigators and everyone else in the world could get access to records as they always had, but the Federal Government agencies would have to have a warrant. I have never been able to understand how we could conduct a major white-collar fraud ease?such as the Arizona land fraud scandal that involved 20,000 victims and innumerable paper companies?if we had to go through some burdensome procedure where everytime we wanted to look at a document we would have to secure a warrant. with an opportunity for someone to object and challenge. We might as well go out of business. Fortunately, these problems have been aired, and there has been no resolution which is adverse to the basic need for investigators to have this type of information, but it con- stantly comes up because of everyone's genuine concern over third- party records and access to matters which involve privacy. Yet, we have great responsibilities placed on us to conduct organized crime and white-collar crime and other complicated investigations. We do need weapons and the ability to ferret out information in this area. So, during the charter process, we hope we will again come up with an accommodation which will satisfy both needs in this area. Senator KENNEDY. Which areas, besides the bank records, do you utilize subpenas in? Mr. ADAMS. Telephone toll records. Senator KENNEDY. That is the only other area? Mr. ADAMS. We do not have access, to my knowledge, to medical records.. Generally, medical, school, or other records like that come up in applicant investigations. Then we obtain a waiver from the appli- cant permitting us to check those records. Senator KENNEDY. During the course of investigations, what kind of cooperation 00 Federal agencies offer, and what type of information is made available to you? Mr. ADAMS. We get full cooperation, as long as we have an in- vestigative interest. The Internal Revenue Service is a different proposition. Taxpayer return information is a different proposition. The information that the tax revenue people develop during their in- telligence investigations, which is unrelated to the taxpayer return, we make a request through the Department of Justice for that infor- mation. Of course, we enjoy excellent cooperation with the other Fed- eral investigative agencies and where there is a need-to-know, and an investigative interest, such information is exchanged. Senator KENNEDY. If an agent questions the legality of an order, what procedures are there within the FBI for an agent to follow? Mr. ADAMS. It depends on what area this falls in. If it falls in the foreign counterintelligence area, not only can he question it through his supervisor, or write directly to the Director or the Attorney Gen- eral, but he can take his concern directly to the Intelligence Oversight Board, or to the Intelligence Oversight Committee. We have had questions raised about our procedures. I have had in one particular case a national security wiretap where agents wanted to be assured Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 74 that that the Attorney General would give them a letter that would protect them from any future prosecution and also would guarantee indemnity against any civil suits which might arise out of it. I could take care of the prosecution issue without much difficulty because of the opinions of the Attorney General and the presidential au- thority, but when it comes to the point of immunity, until Congress acts on the amendments to the Federal Tort Claims Act, no one can assure an agent that he will have civil immunity for any act that takes place. So we do have things raised. We had a case in another office on preparing false identifications. The agent in charge of the office requested that We explore this particularly with the Attorney General as to whether it was legal. We obtained an opinion back in this case that it was legal. I think everyone has the opportunity and is urged, in fact, to do this. We have sent out communications that if anyone has any ques- tions about procedures that are improper, then they should raise those questions. They should report them. Senator KENNEDY. For example, is it done on an ad hoc basis ? Mr. ADAMS. It is done on an ad hoc basis; yes. We have provisions in the manuals that we must report to the Intelligence Oversight Board. We have been reporting on a quarterly basis. Anything that comes up where we think there is a possible violation of law, or improper procedure, the manuals place the responsibility on each employee to bring such matters to the attention of our inspector general and our legal counsel. Senator KENNEDY. For example, how many times has this come up. let us say, in the last year? Mr. ADAMS. I would say, of my personal knowledge, maybe three or four specific instances where they wanted assurance that what they were doing was legal. I am sure that at the Investigative Division level, that there are questions raised every day on the phone to whether this falls within the guidelines or outside them. I would not have any figure. Senator KENNEDY. Is there any notation in the agent's file that raises these types of questions? Mr. ADAMS. There is generally. The ones I have had raised have been raised formally and by communication. So, the communicatior goes back explaining the answer. Senator KENNEDY. If an agent raised these questions, whether it is done formally or informally, the fact that he raised it, is that in his files? Mr. ADAMS. In his personnel file? Senator KENNEDY. Yes. Mr. ADAMS. Not that I know of. The communications that I have received have been over the signature of the special agent in charge, which would go into the case file of the particular matter as a record that a determination was made that the activity was legal. Senator KENNEDY. I have some more questions, but I will submit them to you. Senator KENNEDY. We will invite your responses to those questions. Mr. ADAMS. We will be glad to respond. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 75 [The following questions were submitted to Mr. Adams for his responses which follow:] FEDERAL BUREATJ OF INVESTIGATION, Washington, D.C., June 18, 1978. SENATE COMMITTEE ON rim JUDICIARY FBI CHARTER The Senate Committee on the Judiciary was imable to cover some areas of interest to them during the Charter hearings held on April 25, 1978, and by letter dated April 28, 1978, from Senator Edward M. Kennedy to James B. Adams, Associate Director, FBI, 16 questions were submitted for FBI response. These questions, together with the FBI responses are set out below: Q. What agencies, both Federal and state, are authorized by law to receive fingerprint identification information from the Bureau? What specific laws au- thorize this dissemination? A. The basic authority for the FBI to operate the Identification Division is contained in Title 28, United States Code, section 534, which provides that the Attorney General shall acquire, collect, classify and preserve identification, criminal identification, crime and other records and exchange these records with, and for the official use of, authorized officials of the Federal Government, the states, cities and penal and other institutions. The Attorney General has delegated these functions to the Director of the FBI by Title 28, Code of Federal Regulations, Section 0.85(b). Under this authority FBI identification records are furnished to all Departments of the executive branch of the Federal Govern- ment and to members of Congress for official use. Courts, prosecutors, probation and parole officers, penal institutions, and law enforcement agencies are authorized to receive identification records for criminal justice purposes. Pub. L. 92-544 (86 Stat. 1115) authorizes the FBI to exchange identification records with: 1. officials of Federally chartered or insured banking institutions to promote or maintain the security of those institutions; and 2. if authorized by state statute and approved by the Attorney General of the United States, to officials of state and local governments for purposes of employment and licens- ing. Under this authority records are furnished to state and local government agencies which require a fingerprint check for licensing or employment purposes. Examples are the submission of fingerprints in connection with the processing of applicants for gun permits, adoption of children, and admittance to the practice of law; and the licensing of private investigators, polygraph operators, and security guards. Pub. U. 94-29 (89 Stat. 97) mandates that "every member of a national securi- ties exchange, broker, dealer, registered transfer agent and registered clearing agency shall require that each of its partners, directors, officers and employees be fingerprinted and shall submit such fingerprints or cause the same to be sub- mitted to the Attorney General of the United States for identification and appropriate processing." Under this authority FBI identification records are furnished to stock exchanges and the National Association of Securities Dealers which act as channeling agents for the organizations affected by this legislation. Q. On page 43 of your testimony on April 25, you mentioned that a survey was conducted recently regarding the access various field offices have to third- party records. Would you provide the committee with a copy of this survey, the responses and any analysis or reports relating to this survey? A. In January 1978, the Bureau's field offices were polled regarding their access to bank, credit, and telephone toll, employment, and health records. These offices were specifically asked if they could obtain access to these records without the issuance of grand jury subpena. Seven field offices indicated they had some limited form of informal access. Of these seven, three field offices had limited access to bank records and four had limited access to credit records. Where credit information is available, only descriptive and identifying data can be obtained without resort to process. Our field offices must rely upon the use of grand jury subpena generally for access to telephone toll, credit, bank, employment, and health records. It should be noted that waivers are obtained in order to obtain records pursuant to background investigations being conducted by the FBI. The Bureau's inability to obtain third-party records in the absence of grand jury process is extremely critical in the area of foreign counterintelligence. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 76 As a matter of practicality, foreign counterintelligence matters are not conducted within the grand jury system. For that reason, the grand jury process is not available for these investigations. Financial institutions and credit institutions are extremely reluctant to release records without process even where it can be demonstrated that the information is being requested for national security purpose. Our field offices have indicated overwhelmingly that they feel there is need for some legislative relief in order to obtain access to third party records where no grand jury process is available. Q. Please identify those Federal statutes and regulations which restrict or control your access to third-party records. A. The Family Educational Rights and Privacy Act of 1974. The Fair Credit Reporting Act. Tax Reform Act of 1976. Social Security Act and the Privacy Act. Q. To what extent does the F HI have informal access to various types of State agency records or the records of other Federal agencies during the course of an investigation? A. Although no in-depth survey has been conducted of our field offices concern- ing access to third-party records held by State agencies, the FBI does have access to Department of Motor Vehicle records and State and local law en- forcement records. Our access to records of other Federal agencies is strictly governed by the Privacy Act and is limited to "Routine Use," or "for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the records, specifying the particular portion desired and the law enforcement activity for which the record is sought." Q. On page 48 of your testimony on April 25, you mentioned that the Bureau sent out "Communications" to field offices regarding the reporting of procedures which agents felt were improper. Would you provide the committee with a copy of these recommendations? A. See attached FBI memorandum to all employees dated June 4, 1976, entitled "Intelligence Oversight Board," and airtel from Director, FBI, to Albany, dated November 29, 1976, captioned "Intelligence Oversight Board." Also attached is a memorandum to all Special Agents in Charge, dated February 27, 1975. Q. Can you give us any specific examples of instances where domestic security investigations have actually prevented violence? A. American League for Independent Voter Education (ALIVE) was a para- military organization whose objective was to prepare for armed intervention by guerrilla tactics to oppose Communism in the United States. Members par- ticipated in training involving firearms practice, political indoctrination, and construction of explosive devices in the Louisville, Kentucky, area. The group was strongly against court-ordered school busing, which would have involved integration of certain schools in the Louisville area. On August 17, 1977, based on information obtained as a result of an FBI domestic security investigation, Federal search warrants were executed, which resulted in the recovery of 97 hand grenades, 17,000 rounds of military small arms ammunition, and 26 sticks of dynamite. After recovery of the above material and subsequent investigation by the FBI concerning possible theft of Government property, members of the group became disenchanted and the organization folded. The Weather Underground Organziation. The Weatherman was formed im- mediately before the June 1969, Students for a Democratic Society (SDS) National Convention. Like its parent organization, the Weatherman adopted the Marxist-Leninist ideology, but unlike the SDS which "talked" revolution, the Weatherman advocated acCve violence to bring it about in the United States. During the fall of 1969, Weatherman members were involved in violent demon- strations in Chicago and Washington, D.C. As a result of the demonstrations in Chicago, numerous members of the Weatherman were arrested by the Chicago Police Department on various local charges. Numerous Weatherman members failed to answer these charges and, as a result, Unlawful Flight to Avoid Pro- secution (UFAP ) charges were filed against them. In late December 1969, Weatherman leaders urged the establishment of an underground movement using guerrilla tactics such as those of Arab terrorists. Since 1970, the Weatherman organization has claimed credit for numerous bombings which occurred in the United States. In May 1977, this Bureau successfully penetrated the Weather Underground Organization (WIJO) in Los Angeles, California. As a result of this penetration Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : q*-RDP80S01268A000500020027-8 by an undercover special agent, and subsequent investigation conducted by this Bureau, four WUO members and the leader of the Prairie Fire Organizing Com- mittee (PFOC), were arrested on November 19, 1977, in Houston, Texas, and Los Angeles, California, in connection with their plan to bomb California State Senator John V. Briggs Office in Fullerton, California. Subsequent searches by Los Angeles Police Department (LAPD) based on local search warrants resulted in obtaining a volume of evidence. LAPD submitted evidence to FBI Laboratory and results of examinations indicate possible link between WUO and three unsolved Bureau bombing matters. Federal prosecution of the individuals by the United States Attorney, Los Angeles, was subsequently dismissed subject to being reopened after the state prosecutions have been completed. Trial date set for June 26, 1978. Q. Does the FBI have any formal written procedures for the use of mail covers, surveillance, undercover agents, trash covers, interviews and access to third-party or agency records? If so, may we have a copy of them? A. There is at this time no compendium of "formal written procedures" con- trolling the use of undercover Agents. The authority to utilize undercover Agents resides with the special agent in charge, within each field division, in connection with short-term, individual ease applications of the undercover technique. In those instances wherein undercover Agents are being assigned to long-term opera- tions and-or are required to travel across field division boundaries in connection with undercover assignments, then such authority is based on FBIHQ approval. In the latter instances specific instruction and direction are afforded each opera- tion to insure a justified and effective, efficient use of the undercover technique. Virtually all applications of the undercover technique are closely coordinated with the U.S. Attorney holding prosecutorial power over the investigation being conducted. Additionally, it is clear that the usual restraints of the First, Fourth, Fifth, and Sixth Amendments to the Constitution as well as other statutory re- strictions, executive orders, U.S. Department of Justice regulations, and internal FBI administrative and operational procedures apply to the use of undercover agents, always assuming that such utilization falls within our normal jurisdiction. Policy on use of mail covers, criminal cases. The FBI does utilize mail covers in connection with its criminal investigations. It is our policy that mail covers may be instituted only after approval by FBI headquarters and this approval is limited to our important cases or cases in which it can be anticipated that positive results will be achieved by use of this technique. The mail cover, of course, does not involve an opening of mail. It is merely a recording of return addresses and- or postmarks appearing on the mail. Requests for mail covers are initiated by our field offices, accompanied by full justification. The request is reviewed at FBI headquarters at various levels up to and including the Office of the Assistant to the Director?Deputy Associate Director (Investigation). In submitting its request, the field office involved advises FBI headquarters that the mail cover will be requested from the regional postal inspector in charge within 10 days of the date of its communication unless the field office is advised by FBI headquarters that the request has been disap- proved. The communication from the field office must contain a brief background of the case, must state the need for the mail cover, the identity and complete mailing address of the person whose mail is to be covered, the identity of the regional postal inspector in charge, the statute and possible penalty involved, any information as to whether or not the person whose mail is to be covered is under indictment in connection with the matter under investigation and whether or not he is known to have retained an attorney to represent him. Mail covers may be requested initially for a 30-day period and may be con- tinued on request to the regional postal inspector in charge for two additional 30-day periods without seeking further approval from FBI headquarters. Part 861 of the Postal Manual of the U.S. Postal Service sets forth regula- tions authorizing mail covers at the request of law enforcement agencies. The postal regulations state that mail covers may be requested in fugitive or criminal cases in order to obtain information to assist in locating a fugitive or to obtain evidence of the commission or attempted commission of a crime. For mail cover purposes, a crime is defined by the U.S. Postal Service as the commission or attempted commission of an act punishable by imprisonment for a term exceed- ing one year. The vast majority of mail covers used by the FBI in the criminal field relate to fugitive eases. So far, during fiscal year 1978 we have approved mail covers In 28 criminal cases. Approvtd, F91-8 Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/3 : CIA-RDP80S01268A000500020027-8 Mail covers, domestic security. The Attorney General's domestic security guide- lines as implemented by the FBI on April 5, 1976, provide for the use of the in- vestigative technique of mail covers when a full investigation has been authorized by FBI Headquarters. Part 831 of the Postal Manual of the U.S. Postal Service sets forth regulations authorizing the Assistant Postmaster General, Inspection Service (Chief Postal Inspector), to administer mail covers at the request of enforcement agencies. In security cases, as delineated in "Manual of Investiga- tive Operations and Guidelines," mail covet requests must include complete in- formation concerning the name and address of each individual or organization to be covered and any additional information as attorney of record for subject and whether or not subject is under indictment. If a request for a mail cover is approved by FBI headquarters, arrangements for implementing the mail cover will be handled by FBI headquarters through the Assistant Postmaster General, Inspection Service. The limitations on mail covers for domestic security cases are governed by the Attorney General's guidelines and, therefore, may not be used in either pre- liminary or limited domestic security investigations. Since a full domestic secu- rity investigation may only be authorized by FBI headquarters commensurate with the existence of certain facts which provide the basis of specific and artic- ulable facts giving reason to believe that an individual or a group is or may be engaged in activities which involve the use of force or violence and which involve or will involve the violation of Federal law, the parameters are estab- lished for mail covers by the Attorney General's guidelines. The approval of the Attorney General or his designee is required in conjunction with adherence to postal regulations prior to utilization of this investigative technique. Standards for criminal investigations, electronic surveillances. Electronic sur- veillances in the area of criminal investigation fall within two basic categories. They are those ordered by a U.S. District Court, under the provisions of Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (Title 18, sec- tions 2510-2520, U.S. Code) and those in which one of the persons participating in the conversation has given his consent to Special Agents of the FBI to over- hear and sometimes record the conversation, In addressing the electronic surveillances conducted as a result of an order of a U.S. District Judge, the standards are well defined. The Attorney General has provided specific guidelines and instructions regard- ing policy in this area. These guidlines are set forth in Departmental booklets entitled "Agent's Manual for Conduct of Electronic Surveillance under Title III of Public Law 90-351" and the "Manual for Conduct of Electronic Surveillance under Title III of Public Law 90-351" prepared for the use of attorneys in the Department of Justice. These two booklets together provide ste0-hy- step procedures in requesting, approving, ordering and conducting electronic surveillances. Criminal violations that the Title III statute are allowed to combat are re- stricted to only a few of the most serious of crimes. In addition, this Bureau and the Department take the view that the use of a Title III should be considered in only those investigations with the most potential to impact on major criminal activity (and when it is demonstrated that other means will not result in suc- cessful prosecution) or in those instances wherein a life is in danger. Once the investigators in the field decide to seek a Title III in an investigation, the proposed affidavit is prepared, working with the local office of the U.S. At- torney or Department of Justice Strike Force to ensure there is sufficient prob- able cause to support a request for a court order. The proposed affidavit is then forwarded to FBI headquarters for review. This includes the substantive su- perviser, the unit and section chiefs for substance, the Legal Counsel Division for the proper legal format as well as substance, and then by the Criminal In- vestigative Division Assistant Director before being reviewed by the appropriate Deputy Associate Director and final review and approval by the Director, These steps are considered necessary to ensure compliance within the scope and intent of the law. It is noted that this internal procedure in the FBI is an example of the highest standards being applied to the use of a Title III. As a result, since the enactment of Title III, only one Bureau applicat;on (out of the 1,050) hi been refused by a Federal District Judge. (The one denial resulted from a 1969 gambling case in Las Vegas, where the judget questioned the probable cause. The request was dropped by the Department of Justice.) In addressing electronic surveillances in which one of the participants has granted consent, it should be noted that they fall into two categories. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : 90-RDP80S01268A000500020027-8 The first includes those instances involving only telephones. The Attorney General has issued instructions which allow the special agent in charge of a field office to authorize telephone electronic surveillances provided the local U.S. Attorney or Department of Justice Strike Force Attorney, upon being ad- vised of the facts, concurs in the use of this investigative technique and states that it is his legal opinion no entrapment would result from the surveillance. The second includes those instances in which one of the participants in the conversation grants his consent to overhearing or monitoring by means other than the telephone. In ?these instances the participant has concealed on his person or on his premises a transmitter or recorder. The Attorney General has reserved, to himself or his official designee, the authority to grant permission to use this investigative technique. In some instances of an emergency nature, the Attorney General has delegated to the Director of the FBI the authority to approve the use of this technique, but in each of these instances, this Bureau must follow that emergency authorization with an appropriate correspondence to the Attorney General or his official designee. Normally when not of an emergency nature, the office seeking authority to consensually monitor a conversation other than by telephone must discuss the facts and circumstances with a representative of either the local U.S. Attorney or Department of Justice Strike Force Office and with his concurrence ami specific comment that no entrapment would ensue. The facts, circumstances, and the opinion of that attorney are relayed to FBI headquarters for approval and submission to the Department of Justice. Trash covers may be used as an investigative tool, but there are no formal written procedures for their use. There have been instances wherein individual criminal investigations, the legality of warrantless seizure of property has been brought to the attention of FBI headquarters. FBI agents may seize trash placed out for collection without a warrant and without infringing on con- stitutional rights of the party who put it there since this property has been abandoned and, hence, not protected by the Fourth Amendment. Interviews are used as a basic investigative tool in investigation. There are no formal written procedures for interviews, but the general procedure regarding interviews is set forth in the Manual of Investigative Operations and Guidelines. The Attorney General Guidelines for Domestic Security Investigations provide for interviews during preliminary, limited and full investigations. The FBI has no formal written procedures for the access to third party or agency records. See answers to questions 2 and 3. Q. One problem in codifying guidelines is that they could not be changed promptly enough to react to a demonstrated need. How often have existing guidelines been changed in the past? A. Since the adoption of the Domestic Security Guidelines in April 1976, there have been no changes made to them. Q. Would you explain what a mail cover is and how it is used? In what types of cases is this technique used? B. Are there formal guidelines defining the use of these rovers? C. What procedures are followed when a mail cover is to be used? A. Response to this question is addre,sed under question 7. Q. Would you explain the UACB procedure? A. UACB simply means Unless Advised to the Contrary by the Bureau. This procedure is used for other investigative matters and it is an administrative procedure whereby the investigating office having fulfilled the requirements for a particular investigative matter by previous communication advises that they will proceed with the prescribed course of action. This eliminates the need for a separate communication to the field office advising them to proceed with the investigative matter. It does not obviate approval at the necessary levels at FBI headquarters for the requested investigative technique. The Special Agent in Charge of the field office is aware in sending a communication requesting ap- proval in an investigative matter with the requisite requirements fulfilled that the matter has been approved provided he does not hear to the contrary within a stipulated timeframe. Q. Would you briefly explain how civil rights investigations are initiated by the FBI? A. Is each of these eases approved by either the Department of Justice or FBI headquarters before an investigation is begun by a field office? B. What criteria are used for approving these investigations? C. What percentage of the special agent workforce is assigned to this work? Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 80 A. All civil rights investigations (both criminal and civil) are initiated based either upon the receipt of a complaint, which is considered to be any allegation made, or information received from any source not known to be unreliable, which includes legitimate public press or other legitimate news media, indicat- ing a possible violation exists, or upon the specific request of the U.S. Depart- ment of Justice. A. All cases wherein investigation is initiated based upon the specific request of the Department are, of course, approved by the Department, The FBI field offices can initiate investigation in certain types of civil rights cases on their own initiative, based upon the specific guidelines and policy established by the Department. In other types of civil rights cases, based upon specific depart- mental guidelines and policy, the FBI field office obtains the initial facts of tha complaint and forwards the results to the Department for its consideration as to whether any further investigation or Federal action is warranted. The results of all civil rights investigations conducted by FBI field offices are furnished to FBI headquarters where, after review, they are furnished to the Department for its consideration as to whether any additional investigation or Federal action is warranted. B. All investigations in civil rights matters are based upon statutory authority, and in accordance with the guidelines and policy established by the U.S. De- partment of Justice. C. Slightly over 2 percent of the Special Agent workforce is assigned to civil rights matters, based upon Time Utilization Recorclkeeping. Q. If the charter is written along the broad lines suggested by the Attorney General with the Department issuing guidelines, how can we be sure that the guidelines will be implemented and the procedures followed in each ease? A. Implementation of the guidelines and procedures therein would be con- trolled by the supervisor at FBI headquarters and further by the FBI head- quarters inspection system. Primary responsibility for compliance would be with supervisory personnel in the various field offices and simultaneous review by supervisory personnel at FBI headquarters. Further compliance would be as- sured by appropriate reviews by the Department of Justice and reviews of procedures by congressional oversight committees. The guidelines compliance procedure as outlined above has been successfully utilized Wrice April 1976, in the area of the Attorney General domestic Fecurity guidelines. Q. I understand that there have been situations where the FBI has provided in- vestigative or technical assistance to state police investigating a state crime, even though the FBI had no authority or jurisdiction in the ease (e.g., Chowchilla kidnapping case). A. How often has the FBI been requested to provide such assistance and for what types of situations? B. Are there any guidelines for pro- viding this assistance? Who approves this activity? What criteria is used? C. If the charter were to allow that assistance could be provided in. extraordinary situations, what type of criteria should we consider, so that the FBI does not become a national police force and its resources are not abused by the states for every crime they cannot solve? IDENTIFICATION DIVISION ASSISTANCE A. The Latent Fingerprint Section of the FBI Identification Division is respon- sible for processing crime scene evidentiary material by chemical methods for the development of latent fingerprints, palm prints and footprints, and making com- parisons of developed latent (or inked) finger, palm, toe and footprints with known prints of suspects or victims. The examination and identification of im- pressions obtained from fingers, hands, feet and or skin tissue from these body parts of unknown deceased individuals are also handled by the Latent Finger- print Section. This service, in addition to being primarily utilized by FBI field offices, is offered to all duly constituted law enforcement agencies in the United States at the Federal, state, county, and local levels, including prosecutors and courts. Cases examined run the gamut of criminal offenses, local, state and Fed- eral. They include heinous capital offenses, crimes of local and national notoriety, offenses involving public or national prominence, killing police officers, bombings. and offenses in which the subjects are notorious criminals or fugitives from justice. Many of the cases handled involve matters in which local or state law enforcement personnel are not qualified or lack the technical expertise to prop- erly process the evidence, evaluate-the developed impressions and make the neces- sary comparisons. Guidelines in regard to the provision of these services are that Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :g11A-RDP80S01268A000500020027-8 all examinations for local, county and state law enforcement agencies are limited to criminal matters and are handled under the control and supervision of the Assistant Director of the FBI Identification Division. Articles of evidence volun- tarily submitted for examination and comparison are processed in the Latent Fingerprint Section of the FBI Identification Division, which is located at FBI headquarters in Washington, D C Latent Fingerprint Section specialists, utiliz- ing prepared illustrated exhibits, regularly testify in all types of judicial proceed- ings to latent print identifications. During the period October 1, 1976, through September 30, 1977, a total of 10,019 latent cases were handled by the Latent Fingerprint Section for local, county and state law enforcement agencies. In connection with these examinations, Latent Fingerprint Section specialists made 292 court appearances in behalf of local, county and state authorities. Another area in which technical assistance of the Latent Fingerprint Section has been of invaluable investigative assistance to local, county and state law enforcement agencies is FBI disaster squad activity in identifying victims of disasters involving United States citizens. Specialists of the Latent Fingerprint Section comprise the technical nucleus of this squad, which, since 1940, has aided in the identification of the victims of one hundred and five major disasters in the United States and abroad, including air crashes, ship accidents, fires, hurricanes, floods, explosions and similar disasters. Requests for this assistance are honored from local, county and state law enforcement agencies. FBI disaster squad activ- ity is limited to major disasters involving United States citizens accompanied by a request for assistance from local authorities. Participation in this activity is approved by the Assistant Director of the FBI Identification Division and by the Assistant to the Director?Deputy Associate Director of the FBI (Administration). All services of the Latent Fingerprint Section of the FBI Identification Di- vision are provided without charge. The present controls, supervision and guidelines on the above-described tech- nical assistance rendered by the Latent Fingerprint Section of the FBI Identifi- cation Division are considered to be adequate. These services and technical assistance have been provided to law enforcement over many years and in every instance the requested service is provided in response to a request from the local, county or state law enforcement agency. We do not believe that the furnishing of these services to state and local agencies would in any way result in the FBI becoming a national police force. There is no opportunity for abuse of the FBI's resources as each request received from a state or local agency is evaluated in re- gard to the need for the service and its impact on the Bureau. CRIMINAL INVESTIGATIVE ASSISTANCE With regard to the Chowchilla kidnaping case, it should be pointed out that the FBI entered this investigation under the presumptive clause of the Federal Kidnaping Statute. When evidence was established that the victims had not been taken interstate, the FBI, acting under specific instructions of Attorney Gen- eral Edward Levi, was ordered out of the investigation; however, the FBI was instructed by the Attorney General to furnish complete cooperation to local authorities within legal boundaries. Since the kidnapers had utilized false idea- ties in purchasing equipment used in the kidnaping from a Federal agency, a determination was made that they were possibly in violation of Title 18, sec- tion 1001, Fraud Against the Government. This enabled the FBI to continue Its investigation. For at least 25 years the bureau's policy has required field offices to obtain FBI Headquarters approval before conducting any investigation for a local law enforcement agency. FBI headquarters has limited cooperation short of active investigation in strictly local matters because of the lack of authority to conduct such investigations, the possibility of liability attaching to our activities and we have particularly avoided any interviews with possible suspects, witnesses or subjects. We have permitted FBI offices to attempt to obtain coverage or re- quested investigation through local police. Although the FBI has no direct authority under Title 28, chapter 1, subpart B., Code of Federal Regulations which describes the FBI's general functions the Department of Justice has advised that there is no problem with the FBI utilizing its good offices between police departments to have local authorities conducted requested investigation, locate individuals in other cities for police department interview or the acquisition of records for the police. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 82 Approximately 10 requests a week are received for assistance and many of these originate from small departments seeking out-of-state assistance in con- nection with a violent crime. These departments lack the experience and exper- tise of big city departments which are able to communicate directly between themselves for assistance. It is believed the Bureau could be of assistance to these departments, but the charter should liimt our assistance to violent assault or murder cases and the coverage of out-of-state leads on request of the ranking official of a police department. This limitation of itself would preclude the FBI from becoming a national police force. Additionally, we would be limited in our assistance to the coverage of specifically requested out-of-state leads and would not involve ourselves in the overall investigation of a case. As you undoubtedly are aware, the FBI renders assistance to local authorities under the Unlawful Flight Statute, and in cases involving police killings, if re- quested, by presidential executive order. Interstate criminal activity frequently provides statutory authority for cooperation in matters of concurrent jurisdic- tion. In suggesting statutory authority to the area of violent assault and murder, the Bureau is relying on experience of previous requests. The com- mittee may desire additional comments from professional police organizations, such as the International Association of Chiefs of Police in considering this area. TECHNICAL AND LABORATORY ASSISTANCE A. Subject to the general supervision and direction of the Attorney General, Title 28, CFR section 0.85(g) gives the Director of the FBI authority to: Operate the Federal Bureau of Investigation Laboratory, to serve not only the Federal Bureau of Investigation, but also to provide, without cost, technical and scientific assistance, including expert testimony in Federal or local courts, for all duly constituted law enforcement agencies, other organizational units of the Department of Justice, and other Federal agencies, which may desire to avail themselves of the service. Technical assistance of this nature is provided on a regular and continuous basis. Requests for electronic monitoring assistance is limited to the loan of FBI equipment to local law enforcement agencies. Neither installation nor opera- tional assistance is provided by FBI personnel. Necessary instruction is furnished so that equipment may be properly and safely operated. Requests from law enforcement agencies for technical equipment have been received approximately six to eight times per year. B. Currently, the loan of electronic monitoring equipment must be approved by the Department of Justice on an individual. basis. It should be noted that the FBI does not currently require the local police to be involved in an "extraordinary" situation, but only that their investigative needs cannot be met without such equipment, and they must provide informa- tion which demonstrates that the case is of sufficient importance to warrant the use of FBI equipment. This determination of worthiness is made by the FBI, subject to Department of Justice approval. C. An FBI Charter should retain technical assistance authority currently set out in Title 28, CFR section 0.85(g). Concerning the loan of electronic moni- toring equipment, the current criteria, FBI method of operation, and Attorney General approval should be continued without change. Q. Would you briefly explain what the legal attache program is and what function it performs? A. How many legal attaches does the Bureau have and where are they located? B. When did the program begin and what was its original purpose? C. Are there any formal agreements with the host countries which allow this operation? D. What is the statutory or regulatory basis for the existence of these foreign offices? A. A. and B. See attached captioned "Legal Attaches" enclosed herewith relating to above. C. There are no existing formal agreements with the host countries; however, prior to posting FBI personnel overseas, the concurrence of the 11.8. Department of State, the appropriate U.S. Ambassador as well as that of the Foreign Ministry of the host government must be obtained. D. See attached caption "Legal Attaches" enclosed herewith relating to above. Q. What authority do the legal attaches have in the foreign countries? A. What type of investigative matters do they handle and for whom? In fiscal year 1977. the legal attaches handle 45,229 investigative matters. Can you give us a general Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : giA-RDP80S01268A000500020027-8 breakdown of what these were and the type of work the legal attaches would do? C. Are there any formal guidelines for procedures for the legal attaches to follow in performing their work? D. What type of work do the legal attaches not perform? A. Legal Attaches have no legal jurisdiction nor do they have authority to con- duct investigations in foreign countries; however, their presence there is with the concurrence of the host government and the U.S. Department of State and the appropriate U.S. Ambassador. A. See attached captioned "Legal Attaches" enclosed herewith relating to above. B. It should be noted that the above figure includes name check requests con- ducted for foreign law enforcement and security/intelligence agencies and such requests do not require investigation. However, exclusive of the name checks, the investigative matters handled consist primarily of the following major categories: Approximate (in percent) Personal crimes 26 Foreign counterintelligence matters 19 Fugitives 17 White collar crimes 11 General property crimes 7 Organized crime 2 C. Guidelines or procedures for Legal Attaches are set forth in the FBI's Legal Attache Manual, Manual of Administrative Operations and Procedures, Manual of Investigative Operations and Guidelines, Foreign Counterintelligence Manual, and Legal Handbook for Special Agents. Only the Legal Attache Manual applies exclusively to the Legal Attache Offices; however, it is used in conjunc- tion with the other manuals. D. The FBI's foreign liaison program is of a service nature only. Legal At- taches have no jurisdiction by law outside the United States; they have no authority to conduct investigations in foreign countries and generally do not even conduct interviews abroad. Q. What does the FBI mean when they say that the legal attaches are not "operational?" A. Is this true in all eases, including Mexico? A. This information is classified and will be available for access by the Senate Committee on the Judiciary. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/24: CIA-RDP80S01268A000500020027-8 orrIcn OF TAO DIOFCTOR UNITED STATES DEPARTMENT OF JUSTICE FEDERAL BUREAU OF INVESTIGATION WASHINGTON, SIC. 20535 June 4, 1976 MEMORANDUM TO ALL EMPLOYEES 1-76 (A) INTELLIGENCE OVERSIGHT BOARD -- The President by Executive et/f? Order 11905 of February 18, 1976, established the Intelligence Oversight Board. The Board, composed of three members appointed by the President from outside the Government, is charged with reviewing activities of the Intelligence Community that raise questions of legality or propriety. The activities to be reviewed by the Board are those conducted by the Intelli- gence Community as part of Government business. With respect to the FBI, activities to be reviewed by the Board are those conducted under Section 4 of Executive Order 11905 relating to foreign intelligence and counterintel- ligence. In this regard, the Board will receive and consider reports from Inspectors General and General Counsels of the Intelligence Community concerning activities that raise questions of legality or propriety. In the FBI the Inspector General is the Assistant Director, Inspection Division, and the General Counsel is the Assistant Director, Legal Counsel Division. It is important to emphasize that the Board is not to review illegal or improper personal activities of Government employees. Pursuant to provisions of the Executive Order, each employee is instructed to cooperate fully with the Intelligence Oversight Board. Further, , the Intelligence Oversight Board has advised that the Executive Order does not explicitly establish a system by which employees of the Intelligence Community would report to the Boax4c1..1. The Board was not established as a substitute for the FBI's normal procedures for tee'eiving complaints and allegations from employees. Nonetheless,, the, president has made it clear that he expects the Board to accept information Com individual employees which falls within the Board's jurisdiction. Although the Board does not feel an obligation to investigate all allegations received, it will, as it deems appropriate, follow up on serious allegations received from employees bearing on activities conducted by the Intelligence Community as part of Government business. Accordingly, although only a fraction of the Bureau's work relates to foreign intelligence and counterintelligence, you are advised that with respect to foreign intelligence and counterintelligence you do have the ability to report directly to the Board on matters coming within its purview. -X- SC PE. a c4cio 'r E.o. Izon. Clarence M. Kelley Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : RA-RDP80S01268A000500020027-8 Airtel ' To: SAC, Albany From: Director, FBI INTELLIGENCE OVERSIGHT BOARD 11/29/76 PERSONAL ATTENTION Reference is made to Memorandum to All Employees dated 6/4/76, captioned as above, and Buairtel to all SACs dated 6/10/76 captioned 'Attorney General Guidelines for FBI, Foreign Counterintelligence Investigations." Referenced memorandum pointed out that by Executive Order 11905 dated 2/10/76 the President established the Intel- ligence Oversight Board (I013). The IOB is comprised of three members outside of Government. IOB is charged with reviewing activities of the Intelligence Community that raise questions of legality or propriety. This 'memorandum also stated that IOB will receive and consider reports from Inspectors General and General Counsels of the Intelligence Community concerning activities that raise questions of legality or propriety. In this regard, the Assistant Director, Planning and Inspection Division, and Assistant Director, Legal Counsel Division, will fulfill this function in the FBI. Under the dictates of Executive Order 119051 a COPY_c_f,74 whiciLl_is?attached, the basic duties of the Planning and - Inspection and Legal Counsel Divisions are as follows: - (1) Discover and report to IOB any activity that raises questions of legality or propriety within the FBI. ?. (2) Report to 100 any questionable activities of any r. Al. S. foreign intelligence agency operating within the United 'States that comes to the Bureau's attention. 4 (3) Submit quarterly reports to 103 of any findings con- cerning_questionable activities outlined in fl and f2 above. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/236: CIA-RDP80S01268A000500020027-8 8 r MECTTIR PE3-L';C:EAT_, ATTENTJON MEMORANDUM 10-75 UNITED STATES DEPARTMENT OF JUSTICE FEDERAL BUREAU OF 3NVESTIGATJON WASHINGTON. D.C. 20535 February 27, 1975 MEMORANDUM TO ALL SPECIAL AGENTS IN CHARGE: .(A) REPORTING IMPROPER OR UNAUTHORIZED REQUESTS, EXPLOITATION, OR MISUSE OF THE FBI The FBI, as the investigative arm of the Department of Justice, is a fact-gathering and fact-reporting agency whose opera- tions must be characterized at all times by complete integrity and impartiality. Furthermore, all na personnel must be alert to any .indication of possible exploitation or misuse of any of the Bureau's resources. Therefore, I want to reaffirm at this time our long- standing policy for employees to report to supervisory officials or to me any untoward requests, practices, or behavior. In line with standing instructions of the Attorney General, I will continue to immediately bring to his attention instances which in my judgment are improper or which, considering the context of a particular request, I feel present the appearance of impropriety. All FBI personnel are hereby reminded and instructed to comply with the above-stated policy. Bring the contents of this memorandum to the attention of all personnel assigned to your division. Clarence M. Kelley Director 2-27-75 MEMORANDUM 10-75 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : ?17A-RDP80S01268A000500020027-8 Airtel to SAC, Albany - .RE: INTELLIGENCE OVERSIGHT BOARD (4) Submit immediate reports during intervals between quarterly reports to JOB regarding activities, including any major or significant activities, that raise serious questions of legality or propriety of ongoing or planned activities by the FBI. (5) Insure that all FBI employees have been instructed to cooperate fully with the 100. (6) Be prepared to have JOB review periodically FBI guidelines used by the Office of Inspections designed to iden- tify questionable activities in the intelligence field that raise questions of legality or propriety. It can be readily seen that the duties and sanctions -placed upon the Intelligence Community by Executive Order 11305 are absolute and a matter of strict compliance. Any employee of the FBI who does not comply with these instructions could subject himself to grave, and possibly legal, consequences and bring discredit to the FBI as an organization. ? I am holding each SAC personally responsible to insure that employees in his division are fully aware of the Bureau's duties and responsibilities. SACs are instructed to devise administrative procedures that will bring to light questions of legality and propriety. Hereafter, SACs will personally discuss this topic at the semiannual clerical and agent conferences and the Office 'of?Inspectiona_will..address..this matter at the tine of field -in5pe_c_tions. In addition, each office will submit a quarterly -airtel marked to the attention of the Planning and Inspection ' -Division tqLreach FBIBIC2 by,the first of the month reporting .:(:)n any quegtion of legality or propriety of any ongoing Oi. planned-activities in the foreign.lntelligence field. The initial aiAel should reach FBIHO by 1/3/77 and, it should cover, the precediFq three months. The results of these communications will form a, basis of the Bureau's quarterly letter to I013. However, ay major Or_significant.vact.ivity:that raisen'serious- . questions of legality or propriety of ongoing or planned activi- ties shouldf,be brought to the attention of the Bureau immedi- ately-and dot held for the quarterly airtel. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 88 1,EGAL ATTACHES OVERVIEW OF LEGAL ATTACHE PROGRAM :---The Legal Attache Program had its inception in the -1940s. Prior to World War II, President Franklin D. Roosevelt charged the FBI with responsibility for countering the activities of Axis intelligence services in the Western Hemisphere. The Special Intelligence gervice (SIS) was formed within the FBI and Special Agents were dispatched throughout Latin America in both overt and covert capacities. Those assigned to U. S. Embassies were given the title Legal Attache -As part-of- - - -their mission, Special Agents assigned to SIS helped police d6partments throughout-Latin America-improve andistrengthen 'their professional capabilities. -After World War II with the -Creation of the Central Intelligence Agency (CIA), the SIS was terminated and all Legal Attache offices in Latin America were closed with the exception of Havana and Mexico City. Covert operations ceased: Havana is now closed, but Mexico City remains open. The ,g.cale of the operation was-drastIcally- curtailed -but-the value-Of having liaison-posts-overseas had become::: fa.11.i2 apparent. Athe request of the 1.14 High_Commissioll_inL Germany an office_was established temporarily in Frankfurt - ? -, - to assist in processing war refugees headed for the United - States after World War II. Other offices were-established , in_London, Paris, Madrid, and Rome. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: A-RDP80S01268A000500020027-8 Throughout the years, the number of offices has - fluctuated. ,As of 4/1/78, there were 13 Legal Attache offices manned by 31 Special Agents and 34 support and service personnel covering some 80 countries and territories. A list of these offices is attached. The mission of the Legal Attaches is to establish ? close, personal liaison with all principal law enforcement and security/intelligence agencies throughout their territories - overcoming the differences in languages, laws and customs in-situations which are often sensitive and complex. This provides the means by which leads overseas in FBI cases can be covered efficiently and expeditiously. In reciprocity, . the FBI will conduct inquiries within the U. S. on behalf of cooperative foreign services provided that the request falls within the standards applied by the FBI for the initiation . of its own investigations. Attached are.copies of the 1979 budgetary program summary submitted to .the Department of Justice. -Legal Attaches handle the entire spectrum of. FBI TfT -.cases with the greatpoulk falling into theLcriminal,and applicant case categories. Legal Attaches act in,a liaison capacity and are not intended to be operational. Where unusual circumstances _ Indicate that an interview-Should be conducted by? a Legal Attache, the standing instructions are to invite the person 'to the U. S. Embassy'for the interview, or, if this is not feasible, for the interview to be conducted in the presence of local authorities. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/26CIA-RDP80S01268A000500020027-8 At present, the Legal Attaches enjoy excellent working relationships with the Embassies within which they ,are housed. In accordance with PL.93-47, which delegates to the Chief of the United States Diplomatic Mission within the country of accreditation, "full responsibility for the direction, co- ordination, and supervision of all United States Government offices and employees," Legal Attaches keep U. S. Ambassadors to countries in which they conduct liaison informed of the nature and scope of their activities. They have specific instructions to insure that the Ambassador is briefed on any situation which could impact on foreign policy considerations within his area of responsibility. In addition to regular oral briefings, several Legal Attaches provide periodic written summaries of investigative accomplishments and problems within their countries to individual kmbassadors at their - request. As a member of the staff of the Embassy to which he is assigned, each Legal Attache must satisfy his Ambassador of the value of his activities. Several Ambassadors submit annual performance ratings on Legal Attaches to FBI Headquarters. Each Legal Attache is also subject to scrutiny by his Embassy as part of the ongoing studies of staffing patterns of Americans _ overseas which look for areas whdre reductions can be effected without harming productive activities. Many Legal Attaches _ are members of the Country Team in their Embassy at the invitatior of the Ambassador. Their widespread contacts in the law Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23.: MA-RDP80S01268A000500020027-8 en.forcsA,unt, immigration and security/intelligence agencies of the host country frequently prove useful to the ,Ambassador and other officers in confronting the day to day problems of the Embassy. Legal Attaches have a private, secure teletype system linking them to FBI Headquarters. U. S. Ambassadors are not on routine distribution for such messages sent over this system,but by agreemenit between the Attorney General and the Secretary of State, are entitled upon request, access .to all non-administrative messages. The agreement excepts, from review material that would compromise sources and methods or material which would be protected by Privacy Act considerations. The FBI foreign offices return substantial dividends on a modest investment. Their staffs are productively and efficiently occupied. Their skilled liaison with our counterparts in areas of the world where the domestic responsibilities of the FBI are effected by developments abroad plays a vital role in successfully carrying out our mission. (a) INVESTIGATIONS PROGRAM (Legal-Attaches) This program undertakes to provide a bonstant and prompt exchante of information and'assiStanCe with foreign law enforcement and security agencies in order, to accomplish _ - , the responsibilities of the FBI in the applicant, criminal, domestic security, foreign counterintelligence, and inter- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 92 national terrorist fields. .Another objectiv:' c Lbis prcram is to provide liaison for the purpose of locating and returning fugitives who have fled abroad, to the United States -of America. (b) PROGRAM JUSTIFICATION Prior to World War II, President Franklin U. Roosevelt directed the FBI to establish foreign offices'in order to under- take responsibility for counterintelligehce in the Western Hemisphere. This was the ltsis for the Legal Attache System. There is no statutory or regulatory basis for the existence of these foreign offices. In budget hearings, however, represen- tatives of this Bureau have regularly testified over the years before Congress as to the operations of our foreign liaison posts and Congress has regularly appropriated funds for these activities. Currently, the FBI has thirteen posts abroad, known as Legal Attache Offices. These offices cover more than 80 countries and insure the exchange of information and aiisistance between foreign law enforcement and security agencies and the FBI. Our representatives are not operational. Agents assigned to these foreign posts achieve their results by liaison contact's, resulting in A" close, cooperative relationship and thereby _overcoming thdifferences in langliage, las, and customs in situations which are often sensitive and complex. _ - , Prior to posting FBI personnel overseas, the concur- rence of the fUnited States Department of State, the appropriate United States Ambassador and the Foreign Ministry of the host Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : c3lik-RDP80S01268A000500020027-8 . government v,ust 1e obtained The Unite6 StatL; pepartmc.nt of State provides office space and other administrative support to the program. The following performance measures have been or are expected to be achieved in furtherance of the major objectives of this program: FY 1977 FY 1978 FY 1979 FBI fugitives located 735 735 735 FBI fugitives returned to U.S. 122 122 122 Fugitives of interest to _other agencies located 63 63 63 Automobiles and airplanes located 91 91 91 Value of items located abroad (8000) 4,972 4,972 4,972 Investigative matters handled . 45,229 45,229 45,229 ? The Legal Attache Program enables the FBI, through liaison, to locate and/or effect the return to the United States of fugitives who have fled abroad, locate vehicles, _ aircrafts and other stolen articles and otherwise fulfill its mandated responsibilities in the applicant, criminal, domestic security, foreign counterintelligence and inter- national terrorist field. The'-statistics relative thereto are set forth above. Approved, For jRelease 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 94 Funding in Fical Year 1979, at tLe current level, would allow the FBI to continue the return to the United States of American'fugitivear abroad, and continue the exchange of information with foreign agencies in furtherance of our domestic responsibilities. Funding at less than the current lekrel would severely curtail this relatively small, but critically important program. Delays will be e!iperienced in the timely processing and handling of investigative requests, many of which involve sensitive, high-priority investigative matters. A reduction in this program would have adverse impacts on the other field investigative programs, of which this program is directly supportive. Thus, the basic mission of the FBI would be hampered. (c) LONG-RANGE GOALS To provide a constant and prompt exchange of informa- tion and assistance with foreign law enforcement and security agencies in order to accomplish the responsibilities of the FBI. (d) SHORT-TERM OBJECTIVES . Major objectives are the location and return to the United States of American fugitives abroad, and the exchange of information with fo,eign agencies in furtherance of the domestic responsibilities oqthe Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :9JA-RDP80S01268A000500020027-8 ? (e)'' ALTBENATIVES ? Alternatives would be to (1) have other Embassy -personnel a5road handle FBI responsibilities; (2) have FBI w:.rk -handled by other United States Government agencies abroad, sl:zh -as-Drug Enforcement Administration (DEA), Immigration and Naturalization Service (INS), United States Customs Service, etc; (3) conduct all FBI business, having foreign ramificatic:Is - by mail or other communication, directly with foreign govera=ts; =(4)-handle all FBI work through INTEPOL. These possibilities are considered to be inadequate to the needs of the FBI becEr,ize they either involve having FBI responsibilities accomplished bv -personnel with no experience in law enforcement, or by law enforcement personnel who do not have the training or experier.ce with the broad scope of investigative responsibilities of the -FBI, or would involve long delays in communication, with possible serious security risks involved. --(f) -IMPACT OF SUORT-TERM OBJECTIVES The Legal Attache program will be continued. The -iconstant and prompt exchange of information and assistance wil :- be maintained as much as possible with foreign law enforcemenz - and security agencies. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 8-LZOOZ0009000V89Z1?0808dCIU-VIO : CZ/1.14900Z aseeieu -10d peACLIddV NUMBER OF FBI PERSONNEL STATIONED ABROAD SPECIAL SUPPORT AGENTS PERSONNEL BERN 1 Switzerland BONN 2 Geroany BUENOS AIRES 2 Arelitina CARACAS 2 Venexuela , rIONU KONG 2 CrO. i:OGN 3 3 EK, ono MAORID 1 Spain MANILA Prolippines MEA'ICO CITY 3 9 Mexico OTTAWA 2 3 Canad.a PARIS 2 Fiance ROME 2 2 Italy TOKYO 2 2 Japan TOTALS 31 34 SPKKIKI Support Agents pe,onngr TOTAL PERSONNEL 55 JANUARY 11, 1978 FPI FOREIGN LIAISON OPERATIONS The FBI maintains liaison posts abroad in 13 countries. These offices function in a liaison capacity in connection with criminal and security matters involving the Bureau's domestic responsibilities. In addition, the Bureau belongs to one international security committee and corresponds with police agencies all over the world except in countries controlled by the communists. In addition to the activities of its representatives abroad, the Bureau exchanges certain types of informa.,on with, and where warranted, arranges to have investigations conducted in the U. S. for, law enforcement and 'intelligence agencies in many foreign countries on a reciprocal basis. MEXICO CIT MANILA ea. 69. * FBI REPRESENTATIVES STATIONED IN Ky AMERICAN DiPLOssATIC ESTABLISH- MENTS OUT.. THE UNITED STATES BUENOS AIRES ? COUNTRIES WITH WHICH THE FBI ER? CHANGES INVESTIGATIVE INFORM/al. POt/O0J 0 CD 0- 0 CD c7 CD tri cr, 0 0 co 0 0 co co tri ???1 Co Approved For Release 2005/11/23 : qA-RDP80S01268A000500020027-8 Senator KENNEDY. Let me bring out one more question. This is on the Inspection Division. As I understand it, there are frequent inspec- tions in the various field offices. Am I correct? Mr. ADAMS. That is correct. Senator KENNEDY. Are they really comprehensive? Mr. ADAMS. Yes, they are. Senator KENNEDY. Why did they not turn up the questionable prac- tices of 1970,1971. and 1972? Mr. ADAMS. If I had privy to the results of the investigation, which we do not have, then perhaps I could answer that question. I do under- stand, however, that in connection with certain of the activities that Mr. Kearney was involved with back in the 1970-71 period, that there was material found which indicated that the inspector did consider that particular activity. I know this only from having it brought to my attention after it appeared in the newspaper. Apparently the doc- uments were found that indicated this had been brought to the atten- tion of an inspector. Senator KENNEDY. Is that part of the Gray case? Mr. ADAMS. No. This is the earlier case, the Kearney case. It was in response to the discovery motion filed in New York by the defense counsel. We started going through everything we could go through. Senator KENNEDY. I will be submitting questions to you on that area. I have here an FBI functional organization chart as well as the domestic security investigation guidelines and the civil disorder in- vestigation guidelines which I will have placed in the record at the end of the hearing. Senator KENNEDY. I want to thank you very much. You understand it is going to be a continuing educational experi- ence for those of us on this subcommittee. We will probably be going over these areas as we get more information. We look forward to work- ing with the Department. Mr. ADAMS. We are, too, because we feel that as we did when we started out 3 years ago when many things were being raised, we recognized the need for a charter. We felt it was the only safeguard that our personnel could have that they could be assured there is an accommodation. Senator KENNEDY. Thank you very much. gentlemen. Our next witnesses are John Shattuck, Morton Halperin. and Jerry Berman, who are appearing on behalf of the American Civil Liberties Union. John, we welcome you. Would you please start off? STATEMENT 01' SOHN H. F. SHATTUCK, DIRECTOR, AMERICAN CIVIL LIBERTIES UNION Mr. SHATTUCK. We are happy for this opportunity to appear before you on a matter of great importance to the ACLU, to the Congress, and to the country. We would like to start by congratulating you, Mr. Chairman, at the outset, for your leadership in getting the Senate to approve an act to bring all Federal wiretaps of Americans under a criminal standard warrant procedure. As you know, we have long worked to improve this bill and are very pleased that under your lead- ership it was improved. This is a significant improvement over the Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 98 current law, and we think it is a hopeful sign for the future of the legislation that you are considering this morning. Senator KENNEDY. Thank you. I will not ask Mort Halperin whether he would have voted for it or not. [Laughter.] We are glad to have your effective help and support in fashioning that standard. That is a very important contribution and very con- structive. We appreciate your help. Mr. SuArrucK. We have also long urged the enactment of a legisla- tive charter for the FBI. The ACLU, over the years, has challenged many investigative practices of the FBI which threaten and violate civil liberties, and the massive record of abuses which has been com- piled in recent years, has, I think, shown that we were correct to make these challenges. On the other hand, the FBI has an important func- tion to perform in investigating violations of the criminal laws of the United States. We think it is time for Congress to clearly define this function and to safeguard the rights of Americans by setting strict limits over the FBI's criminal investigaitve authority. In our testimony this morning, we will set out what we believe the limits of this investigative authority regarding what they constitution- ally should be as well as practically. The bulk of our statement this morning, Mr. Chairman, will be presented by Mr. Berman who has worked long and hard on this subject. He is legislative counsel for the ACLU as well as general counsel for the Center for National Security Studies. We have submitted a lengthy statement with many footnotes for the record, and we will, of course, not be covering all of that, but a great deal of the material in the statement will be summarized. All three of us, including our colleague, Morton Halperin, are avail- able for questions, and I will be adding something at the end of Mr. Berman's statement. Senator KENNEDY. Without objection, the statement will be inserted into the record at the end of your oral testimony. Mr. SHATrucK. I think Mort Halperin would like to say a few words before Mr. Berman begins. STATEMENT OF MORTON H. HAT2ERIN, AMERICAN CIVIL LIBERTIES UNION Mr. HALPERIN. Mr. Chairman, let me reiterate what John Shat- tuck said about the wiretap bill and the great importance of the lead- ership that you provided on that. I also want to underscore my sense that the activity you are engaged in here is of extraordinary im- portance. I think that most of us assume, as I did, that when you came to criminal investigations, there were clear guidelines and rules. I think we have discovered that this field is as unregulated as national security investigations have been unregulated. This issue really goes to the heart of the democratic society. How do you investigate crime without at the same time intruding on the right of free and secret, if necessary, political association? It is clear that there are complicated issues here, but I think it is also clear that Congress, in face of the record, has an obligation to legislate in this area. I am very encouraged that you have begun these hearings, and would urge you to stick with it until we get the kind of legislation that I think will give us the balance that we need. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : g4A-RDP80S01268A000500020027-8 STATEMENT OF JERRY J. BERMAN, AMERICAN CIVIL LIBERTIES UNION Mr. BERMAN. Mr. Chairman and members of the committee, we welcome the opportunity to testify here today on the urgent need to develop a statutory charter to govern the FBI and to state our views on critical issues which must be resolved. Concurring in your view that this is a matter of paramount legislative priority, we com- mend you for initiating these deliberations and look forward to work- ing with this subcommittee and the Congress in a concerted effort to enact a statutory charter into law. This legislation is long overdue. For 2 years both the Congress and the previous and present adminis- tration have repeatedly said that an FBI charter is urgent, yet we are only now getting down to business. In this regard, we are particularly pleased that you prodded the Justice Department to come forward in July with some kind of proposal for an investigatory charter. We also share your view that this is the first priority and that the ad- ministration's recent call for a comprehensive FBI and even Federal law enforcement charter must not become a reason to delay further the resolution of basic issues. I turn now to the need for an investigatory charter. The massive and disturbing public record of investigative abuse by the FBI is the primary impetus for charter legislation. While we can hope that these programmatic abuses are in the past, we must bear in mind that the central conclusion of each of the many congressional inquiries is not that investigative abuses were committed, but that they occurred largely because the FBI's investigative powers are undefined, un- checked, and unregulated by statutory standards and procedure. Cur- rent statutes simply authorize the FBI to detect . . . crimes against the United States. Nowhere in the United States Code does the Con- gress set out standards and procedures to guide the Bureau in detect- ing crime: the basis for initiating investigations; the standard that must be met to conduct intrusive investigations; or guidelines to control the use of investigative means. As for the Bureau's domestic security mission, the code is simply silent. This congressional deference to the executive has been destructive of civil liberties and damaging to law enforcement. Violations of first and fourth amendment rights have resulted on a scale incompatible with a democratic society and may still be going on. Public trust in law enforcement as well as Bureau morale have been undermined. The demonstration by FBI agents while this hearing was going on last Thursday evidences that. Both the public and the agent in the field are looking to Congress to protect civil liberties and end the uncer- taintyaboutwhat agents can and cannot do without risking indictment or civil liability. Only the Congress can resolve these issues. Today we will focus our testimony on the case for the five basic reforms which a statutory charter must institute: These proposals are embodied in the model legislation, "A Law To Control" the FBI, which all of us here helped to draft, and in legis- lation, H.R. 6051, now before the House. Although they may be con- troversial, we hope that over the course of these hearings the committee and the Congress will become convinced their enactment is both wise public policy and necessary for the protection of fundamen- tal constitutional liberties. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 100 First, the charter must abolish the domestic intelligence jurisdiction of the FBI and limit the FBI to the conduct of criminal investigations. Second, the charter must only authorize intrusive investigations pursuant to a criminal standard, excluding conspiracy as a basis for investigation when first amendment activities may be involved. The purpose of such investigations should be the gathering of evidence for arrest and prosecution. Third, the charter must establish strict statutory procedures govern- ing investigations which may intrude on lawful first amendment ac- tivity in order to ensure that they are properly authorized and con- ducted so as to minimize the intrusion. Fourth, the charter must establish a judicial warrant procedure governing the FBI's direction of informants or undercover agents to infiltrate associations in authorized criminal investigations. Fifth, the charter must prohibit the FBI from engaging in preven- tion action or Cointelpro-type activity. While our extended testi- mony covers each of these issues in even greater depth, we will devote most of our limited time today to stating in some greater detail why we believe domestic security investigations should be prohibited; why criminal investigations should not be premised on conspiracy stat- utes, and why warrant procedures are required to permit the use of informants and undercover agents in authorized criminal investiga- tions. Domestic security investigations are intelligence investigations un- dertaken by the FBI primarily to prevent acts of political violence rather than to effect criminal prosecution. Although the FBI never recognized such a distinction in the past, domestic security investi- gations are today defined as distinct from counterintelligence investi- gations because the violent acts they are intended to anticipate and prevent are not undertaken for or on behalf of a foreign power. Most of the intelligence investigations conducted by the FBI, form investi- gations of subversive activities to investigations of radicals and ex- tremists fall in this category. We believe these are the core issues, and that we want to join the debate on these issues. We don't want to become entangled in guidelines over domestic security until we de- cide whether that is a mission worth authorizing the Bureau to conduct by statute. I think that we ought to make it clear from the start what we mean by domestic security investigations. We consider these investi- gations undertaken primarily to prevent acts of political violence, rather than to effect criminal prosecution. In the past, there has been no distinction made between domestic security investigations and counterintelligence investigations. Now, with the introduction of S. 2525 and S. 1566, the wiretap legislation, we begin to draw a line. But in the past most of the Bureau's investiga- tions of subversives, radicals, extremists, civil rights groups, and so on, fall into this domestic category where there are no agents of a foreien power involved. Today, domestic security investigations are authoriLd to anticipate and prevent the violent overthrow of the Government, civil disorders, and domestic terroism. . The issue we address today is whether Congress should continue that jurisdiction. Because we think that it should not continue this intel- ligence function of the Bureau, we think the matter is properly before Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : Rhek-RDP80S01268A000500020027-8 the Judiciary Committees of the Congress, rather than the Senate Intelligence Committee. The value of domestic intelligence does not outweigh the risk to civil liberties. Senator KENNEDY. Let me just ask you about the sentence before, "Today domestic security investigations are authorized to anticipate and prevent the violent overthrow of the 'Government, civil disorders, and domestic terrorism." Is the standard now being used under the recent guidelines for criminal standards? Mr. BERMAN. I believe it is a loose criminal standard. It is not tight enough for us, and I think that what the guidelines do is codify the conspiracy statutes, such as the Smith Act. While the purpose of the guidelines is to prevent activities which lead to the violent overthrow of the Government involved, or will involve force or violence, you will see that the standard for investigation is much lower than that. It is a maybe, or a reasonable suspicion of people involved in activities, rather ill an a strict criminal standard. Senator KENNEDY. With the preliminary investigation, is that the basis for which will involve the use of force and violence, and which will involve the violation of Federal laws? Mr. BERMAN. Yes. You see that is the standard for the investigatory purposes. That is a preamble. But, if you turn to the standard for full investigations, where we are particularly concerned, you will see that it is a future crime standard. Furthermore, as you know, in all the difficulties over the wiretap legislation, being engaged in crime is dif- ferent from being involved in activities. It is a much more nebulous term. I may be lawfully engaged in first amendment activity, but somehow involved in unlawful activity under the terms of the guidelines. In any event, I don't think it is the guidelines we are talking about, but the mission. Over the course of our history, we have always recognized the ten- sion between maintaining an open, democratic society and protecting the society from violent disruption. Repeatedly, we have established domestic security measures in response to perceived threats to our social order. In every case, from the Alien and Sedition Acts through the Palmer raids in the twenties and the loyalty and security programs in the fifties? Senator KENNEDY. We changed the "may be" to be "futherance of." Mr. BERMAN. We did that in the wiretap legislation where we were using a wiretap technique. That was in counterintelligence and we were talking about the use of an intrusive technique of wiretapping whereas the guidelines are talking about when do we start looking at records and conducting physical surveillance, and infiltrating organi- zations and the like. Senator KENNEDY. Would you distinguish this standard here from the one you proposed. and would you do it now or later? Mr. BERMAN. I will come to it later. We would like to do it in the context of the criminal investigation rather than a domestic security jurisdiction in the Bureau. Senator KENNEDY. Fine. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 102 Mr. BERMAN. The long and the short of it is that up to the recent revelations of massive covert FBI surveillance and disruption of law- ful political activity over the last four decades, the measures employed have proved far more damaging to our society than protective of it. Yet today we are considering the continuation of a domestic intel- ligence jurisdiction for the FBI. The new threat to which we are responding is political terrorism. Persistently we rely on these demon- strably dangerous measures because of our stubborn adherence to the two basic assumptions: One, that it is possible to draw the fine line between legitimate conduct and illegitimate investigation of advocacy and association and thereby minimize the threat to civil liberties; and two, that domestic security operations can substantially prevent or reduce political violence. These assumptions permit the assertion that on balance the benefits outweigh the risks. The only problem then is to design proper guidelines and effective oversight. These assumptions are thoroughly debunked by the evidence for three reasons: First, by definition, domestic intelligence investigations require surveillance of lawful political activity. Particularly in times of social turmoil, those charged with a preventive intelligence mission have been unwilling or unable to distinguish between vigorous citizen dissent and real security threats. Second, in part because of this misdirection, domestic intelligence operations have failed totally to accomplish their goal of preventing violence. Senator KENNEDY. That is an important issue that we have to try to evaluate, that is, what their representations are. We heard some examples today. We have asked for the greater detailing of that, but I supposed that it is at least, a consideration. You are balancing this type of intrusion into first amendment rights without any effective prevention of violence. Then there is the question as to whether or not you have found that there has been a prevention of violence over the period of time. Your representation here is that they have failed totally to accom- plish their goal of preventing violence. Mr. BERMAN. Yes. In many respects we think these have proved counterproductive in the sense of inciting violence in some points; and making it more difficult for law enforcement at the same time threaten- ing civil liberties. I think that if we could admit my first point, which is that by definition if you were trying to ferret out crimes, political crimes before they occur, then you cannot use a tight criminal stand- ard. You are forced, almost by necessity, to start loosening those guide- lines up and making more vague criteria in order to be able to allow an agency of the government to be there ahead of time. So we begin to slip the standards. I think we get to the second point of what happens if we recognize that risk, and then we have to look at the public record as to what has happened under lower standards of investigation for intelligence investigations. Third, there is significant evidence that these efforts are counter- productive in stemming political violence and often have the opposite effect. Given these facts of life, sound public policy, based on the need to protect fundamental constitutional rights as well as society from serious violence, must reject this fruitless and dangerous course. Reaching this conclusion in no way implies that we do not consider Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :1F4A-RDP80S01268A000500020027-8 terrorism to be a serious potential threat to the fabric of our society and to our democratic institutions. Rather it is based on a large body of empirical evidence on the public record which, contrary to tradi- tional dogma, indicates that preventive intelligence, to the extent that it is conducted within "tolerable boundaries," is useless for preventing terrorism and. that "less intrusive means" may well be more effective. First, drawing the line is impossible. If their objective is to permit the FBI to prevent a crime before it occurs, intelligence investigations, by d.efmition, must be initiated without reasonable suspicion that a criminal act has been, is being, or is about to be committed. FBI agents will inevitably focus investigative attention on persons who vigorously dissent against Government policy or social conditions, or groups who advocate the need for radical, or revolutionary change, even though these activities are constitutionally protected. Dissenters are visible and reasonable targets of intelligence investigations which are sup- posed to prevent politically motivated violence. Moreover, if the in- vestigative purpose is to piece together a "web of intelligence" which intelligence agents claim to require to distinguish the real threats of potential violence from "legitimate conduct," investigators have to gather information about all of the plans, activities, beliefs, associa- tions, and memberships of suspect individuals and groups. This danger is particularly acute when the principal investigative technique is the planted informer who cannot be entrusted with the decision to decide what is relevant or significant activity which may signal possible violence. The inevitable result is the very evil which the guidelines and charters are intended to prevent: Ongoing inves- tigations of lawful political activity in violation of free speech and associational privacy protected by the first amendment and unreason- able searches and seizures in violation of the fourth amendment. While some may argue that you have to strain to read such authority into the Justice Department guidelines or the Church committee recom- mendations, two possible foundations for a domestic security charter, we must remember that tumultuous times produce such strained interpretations. Second, preventive intelligence is ineffective and counterproductive. The inevitable costs of these intelligence activities require the Con- gress to carefully assess their value before authorizing them. Based on the public record, the Bureau's "offer of proof" to support its mis- sion, and the General Accounting Office's intensive audit of FBI Domestic Intelligence, and its followup study appropriately titled "FBI Domestic Intelligence Operations: An Uncertain Future," there is literally no evidence to support the value of domestic intelligence in anticipating or preventing acts of political violence. According to the Church committee, Between 1960 and 1974, the FBI conducted over 500,000 separate investigations of persons and groups under the "subversive" category, predicated on the possi- bility that they might be likely to overthrow the Government of the United States. Yet not a single individual or group has been prosecuted since 1957 under laws which prohibit planning or advocating action to overthrow the government. According to the GAO audit of 17,528 FBI domestic intelligence investigations of individuals in 1974, only 1.3 percent resulted in prose- cution and conviction, and in only "about 2 percent" of the cases was advance knowledge of any activity?legal or illegal?obtained. In our Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/21043 : CIA-RDP80S01268A000500020027-8 extended testimony we cite other examples, and the GAO talks about organizational investigations turning up the same absence of anticipa- tion of activity. The Senate Intelligence Committee offered the Bureau the opportunity to send a memorandum to the committee asking what the examples were and why they should authorize this. They came up with three out of the massive number of investigations they were con- ducting. I think the point here is that the Bureau's failure to anticipate or prevent violence occurred during the period when it operated covertly "with no holds barred," as the late William Sullivan of the Bureau used to say. None of the major outbreaks of political violence which are cited to support the need for a preventive intelligence jurisdiction were antici- pated or prevented: the civil disorders of the sixties the campus dis- orders of the seventies, the Capitol bombing, the political assassina- tions and attempts, the violent activities of the Weather Underground or the SLA. So long as prevention remains the goal of domestic security investigations, new restrictions and procedures will further ensure failure. The often-heard criticism that these restrictions, necessary to protect civil liberties, will "tie the hands" of the FBI's intelligence agents is not unfounded. The followu.p report of the General Account- ing Office report realistically describes the dilemma: Despite the improvements in the direction and control of domestic intelligence, there are still few visable results . . . . Realistically this may be the best that can be expected, particularly in view of the greater investigative restrictions now placed on the FBI and [in view of] its past record when there were fewer restric- tions and less control. Not only does domestic intelligence fail in its mission, with or with- out restrictions, but it is, we believe, in fact, counterproductive. Instead of serving to detect and prevent violence, domestic intelligence has the opposite effect. of making crime detection more difficult and violence more likely while jeopardizing civil liberties. By focusing on the dissenters and protesters in order to prevent violence before it occurs, intelligence agencies play into the hands of terrorists. As the aim of the terrorists is to both intimidate and create sympathy for his or her cause by convincing people that repression makes violence necessary, overreaction by authority is a key element in the strategy. If police investigate innocent persons or those sym- pathetic to the cause of the terrorist, the police confirm or appear to confirm the truth about repression. By violating constitutional rights, intelligence agencies unwittingly help to promote the success of terrorist tactics. By engaging in overbroad surveillance, intel- ligence agencies create 'paranoia and distrust of the police which makes detection of terrorists more difficult. To cite just two examples, the major reason why the FBI has had great difficulty in overtaking the. SLA and Weather Underground is that a significant segment of the public has been 'unwilling to establish their wherea;bouts to the police, and some people have helped these groups stay underground. Intelligence investigations have made them enemies of the police, and they wrongly but understandably identify with other enemies of the police. Without public trust in police authority, which is under- mind by surveillance or fear of surveillance, FBI criminal investiga- tors are hindered in legitimate efforts to enforce the law. Finally, by taking preventive actions or using illegal means, an intel- ligence agency can become the mirror image of the terrorist groups it is Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :IZIA-RDP80S01268A000500020027-8 supposed to thwart. When a police agency becomes a kind of terrorist organization using intimidation and violence to achieve public ends, even if their intentions are benevolent, that is a far worse threat than Black September or FALN, or SLA. Official terror is the ultimate evil of modern times, and the FBI, as the public record shows, used tactics in its intelligence mission which we associate with police states: from the compilation of emergency detention lists to Cointelpro. We are not here to flog the Bureau any longer, but we are saying that it is the mission. It is the particular segregation of the mission, in times of social turmoil which lead to the excesses. We don't think that guide- lines can control that kind of mission. We think a total change in emphasis is required. Instead of focusing on political dissent, the FBI should zero in on illegal conduct. The appropriate alternative is criminal investigations conducted under strict standards and procedures. Both the administration and key elements of the Congress are apparently coining to the same conclusion. As the Attorney General has stated in recent testimony before the House Judiciary Committee: Last year we began efforts to draft legislation dealing with the domestic security investigations of the FBI. It quickly became apparent, however, that it is unsound, both legally and practically, to isolate this particular subject from other areas of FBI criminal investigative responsibility. There is no real differ- ence between investigations of criminal enterprises bent on violence for political motives and criminal enterprises bent on violence to extend the influence of organized crime for economic gain. Murder, assault, bombing and extortion are weapons equally adapted to calling attention to a political cause or enforcing a loan-sharking or kickback agreement. Whatever the motivation, the same in- vestigative techniques come into play in attempting to identify the persons or organizations behind these acts, determining who provides the leadership and bringing a halt to such crimes. The only distinction is that greater safeguards for the protection of First Amendment rights should be provided in the investiga- tion of crimes undertaken for political reasons. Instead of wasting time and resources and infringing rights by try- ing to prevent violence before it occurs, the FBI should be primarily trying to prevent violence by detecting and prosecuting those who commit crimes of violence in order to deter such acts. Senator KENNEDY. Should the FBI attempt to prevent any crime or wait until it occurs? Mr. BERMAN. I think it has a preventive role within the criminal investigation, but it is far more limited in focus on crimes about to occur, specific acts about to occur. I think that that would take care of some of the cases where you could arrest or diffuse a bomb, like in the Weatherman Underground case. It is not a preventive intelligence investigation, but it is a criminal investigation to find the Weatherman Underground in which you have taken preventive measures. This is pursuant to a criminal investigation, and you are not out here looking for potential terrorists. So there are preventive measures, but we are now talking about preventive action. I think that within traditional law enforcement there are preventive measures which the police can take which don't involve Cointelpro activities. T just want to make one point here. That is that all this morning we were talking about how the FBI is claiming that the guidelines have reduced the number of investigations. It should he remembered that the FBI is not operating under the guidelines. They are operating under far more restrictive internal rules that they call quality over Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 106 quantity which makes them focus on committed acts of violence and groups engaged in committed acts of violence. That is why the num- bers have come down. The guidelines are flexible enough to permit wider investigation. The second reason why they are more focused is that they say the times have changed. We are not in a time of social crisis. If the Bureau can focus on quality over quantity, then the statute can also. If this argument is thrashed out with evidence and offers of proof by the Justice Department, and we come to the conclusion that we should close down domestic security investigations, we would rec- ommend three things: First of all, Congress should enact a charter which would preempt all executive orders and limit the FBI to the conduct of criminal in- vestigation. The charter must also carefully define the FBI's investiga- tive responsibility in the areas of civil disorders and background investigations. These functions must no longer constitute a basis for intelligence. investigations. Then we come to a standard for FBI criminal investigations. The Congress must define carefully the FBI's criminal investigatory au- thority. The charter should mandate that the primary purpose of a criminal law enforcement investigation is to detect . . . crimes against the United States, by identifying the perpetrators and gathering evi- dence to establish the basis for arrest and prosecution. Of particular importance, the Congress must establish an investiga- tory standard which the FBI must meet before it can conduct a covert, intrusive criminal investigation. We believe the FBI may not conduct such investigations unless it has a reasonable suspicion, based on spe- cific and articulable facts and rational inferences from such facts, that the subject of an investigation, whether a person or a group, has com- mitted, is committing, or is about to commit a specific act which vio- lates a Federal criminal statute. Senator KENNEDY. Now is that in the Terry v. Ohio case? Mr. BERMAN. We read that as required by Terry. Terry never really addressed the full investigation. It was a stop-and-frisk case, but our argument is that this is the implication of Terry for a full investiga- tion. Senator KENNEDY. What do you mean, "about to commit?" Mr. BERMAN. "About to commit" means to have taken a step toward the commission of a crime which would be different from an overt act in conspiracy law. Senator KENNEDY. In the criminal code, we have some "substantial step." Mr. BERMAN. But it must be a substantial step toward the commis- sion of a substantive crime and not a substantial step toward the com- mission of a conspiracy. That's the Droblem, because conspiracy statutes, on their face, raise serious problems for prosecution but as an investigative standard, we think they are wholly inadequate and dangerous. It is too easy to meet a probable cause standard because you can use legal overt acts. Senator KENNEDY. If they are about to commit it, though, even under that, isn't it effectively a conspiracy? Mr. BERMAN. If you said "about to commit a specific act" it is not a conspiracy, but a conspiracy would be included in the term "about Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : T4-RDP80S01268A000500020027-8 to commit a violation of Federal laws." A specific act, if it is not clear in our statutory?the way we have framed it, I am sure we could make it clear by report language that we are excluding conspiracy as a basis for investigation. Mr. SHATrucx. Senator Kennedy, the critical point here is one that, in fact, you are bringing out by your questions. This is that, in fact, the "attempt law" is the appropriate way to look at the "about to" formulation, not conspiracy law, nor solicitation, nor anything that would touch upon speech. An attempt to commit a substantive crime would be the about to" formulation that we are talking about. I think, as you move through the statement, you will see that conspiracy- based investigations are what we are most concerned about avoidings. Senator KENNEDY. What I am interested in here is the distinction of your own framing of the standard versus the standard that the At- torney General endorsed. Mr. BERMAN. Yes, we are spelling it out by saying that he has a conspiracy framework, and that is where we have joined issues. Mr. HALPERIN. Maybe I will further confuse it, but it seems to me that the Justice Department is moving toward "probable cause," but of all crimes, including conspiracy. What we are saying is that we prefer the "reasonable suspicion" standard which is lower, but exclud- ing conspiracy crimes as the basis to begin these investigations. I think that is the basis of the difference. Senator KENNEDY. Thank you. Mr. BERMAN. We point, that out in the past, outside of executive orders, the Bureau has always read their overbroad jurisdiction to in- vestigate from conspiracy statues. We think that by leaving conspiracy as the basis here, we have not solved the problem, but have come right around full circle to where we are today. We do not propose a "Probable cause" standard, which both the At- torney General and the FBI Director have indicated might be work- able, because we are attempting to articulate a standard of investiga- tion that is not premised on "conspiracy" statutes. In our view, reasonable suspicion of a specific act in violation of law is a tighter investigatory standard than probable cause of conspiracy, and the only standard that can protect constitutional rights adequately. In the past, the FBI has conducted massive investigations of law- ful political activity premises on the violation of conspiracy statutes such as the Smith Act, 18 U.S.C. 2385, and Voorhis Act, 18 U.S.C. 2386, which on their face punish lawful speech and advocacy. We recommend the repeal of these statutes by this charter legislation. However, even if they are repealed, the use of general conspiracy statutes, 18 U.S.C. 371, in conjunction with statutes prohibiting sub- stantive conduct as a predicate for intrusive investigation perpetuates the problem. Applying the courts' observations concerning the prosecution of po- litical conspiracies to the investigation of such conspiracies illustrates the danger of such an investigative standard. Reading conspiracy statutes literally, advocacy of illegal acts by persons in asso- ciation justifies investigation. Moreover, commission of wholly legal overt acts, inextricably intertwined with the political process, could also justify investigation. A standard of probable cause of such activity is easily met. Even if there is no specific intent to violate the law by one Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 108 or all of the associates, conspiracy statutes permit intrusive investiga- tion of first amendment activity. Investigatory discretion to proceed under these statutes renders a "criminal standard" an illusory protec- tion against future investigative abuses. We are really looking in one other point. We are looking at the in- vestigative standard, and first amendment activities for something like the specific intent that the courts require in a prosecution of the first amendment group. I know that we are going to have to thrash this out, but we do not think that standard ties the Bureau. Of cases involving terrorism and violence 99 percent are ones which have occurred, or committed. The Bureau has enough trouble just appre- hending people who have committed terrorism and holding those in- vestigations within bounds rather than trying to decide where a bomber might be, of whose threat is credible, and which organization's illegal purpOses are going to lead to violence. The prosecutorial re- quirement of specific intent must be paralleled in the standard for investigation. Persons or groups should not be targeted for investiga- tion unless there is reasonable suspicion that the substantive crime, rather than conspiracy, is about to be committed. For example, if the FBI obtains evidence of a specific threat of illegal activity by an asso- ciation together with specific and articulable facts indicating that a member has purchased weapons, the FBI would have reasonable sus- picion that a criminal act was about to be committed. The FBI would not be required to sit on its hands until a substantive crime occurred. The criminal standard allows a full investigation be- fore the law has been violated. More important, it should not bar the Bureau from conducting preliminary inquiries using less intrusive techniques. A charter, providing for a? preliminary criminal inquiry, would allow the FBI to check its own records, conduct interviews, contact established sources of information, and use other such means to find out whether the basis for a full investigation exists. Without meeting a reasonable suspicion standard, the FBI could check out specific threats, credible allegations, incidents, and the like. On the other hand, if the allegation is unfounded, or in the case of a full investigation, if the substantive crime does not occur, the investigation must terminate. Rather than hinder the Bureau, the standard would make the FBI more effective in carrying out its law enforcement responsibilities. Con- spiracy predicated investigations lead to overbroad investigations which are a waste of resources on virtually fruitless attempts to pre- vent political violence. The narrow standard we propose is required when first amendment activities may be investigated. The same stand- ard is probably not constitutionally required in organized crime and other criminal investigations. However, fourth amendment considera- tions remain; a criminal standard is therefore required. We look to the Justice Department and the FBI to explain why a uniform standard would not be wise or practicable. At this point I think John Shattuck would like to go into the next issue. Mr. Sirxrrucx. Senator, I think the next proposal is actually less controversial than anything else in our statement because we find sub- stantial support from the Attorney General for special procedures to safeguard and minimize the intrusion on first amendment and other Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :IZIA-RDP80S01268A000500020027-8 constitutional rights in the conduct of the kinds of criminal investiga- tions that Mr. Berman has just been laying out for you, so our point is this: We are pleased that the Attorney General agrees with us and has on several occasions stated that he also believes that special pro- cedures for accountability are essential in this area. They would include accountability for the authorization and conduct of an investi- gation, assuming that no investigation is initiated without statutory basis; that criminal investigations do not become a pretext for open- ended intelligence investigations; that the least intrusive technique necessary to obtain evidence be employed; that investigations are not overbroad; and that privacy is not violated by unnecessary mainte- nance and dissemination of information. Senator KENNEDY. Before we continue on this, in the middle of page 11 you point out, "the narrow standard we propose is required when first amendment activities may be investigated. The same standard is probably not constitutionally required in organized crime and other criminal investigations." I imagine you are talking about white-collar crimes and others like that. Mr. BERMAN. Yes; we find that it is the first and fourth amendment activities that raise the standard, but we have looked at some evidence of organized crime investigations which raise a policy question about the standard. Most of those have been conducted under committed crime standards. Moreover, when the GAO did a study of organized crime investigations of strike forces, as you are well aware, for the 10 years that has been $80 million wasted because of lack of definition as to what organized crime is. So, part of the focusing in a standard would also maybe focus their organized crime investigations. Mr. SnArrucx. The special procedures to which I was referring are somewhat of a departure from the way in which investigations are now conducted. I think the spirit of these procedures is currently fol- lowed, but I think some clear statutory guidance is necessary. Special provisions to achieve these ends are laid out in "A Law To Control the FBI." They include: (1) requirements for written authorization and certifications; (2) time limits for investigations; (3) Justice De- partment review, authorization, and supervision of continuing investi- gations; (1) special authorization and Justice Department mandated procedures to govern the use of intrusive techniques; and (5) require- ments that minimization procedures be established. These provisions are not detailed regulations, which the Justice Department and the Bureau seem to fear. Rather they simply mandate that the Justice De- partment establish procedures according to statutory criteria. They set appropriate limits on administrative discretion. All of these procedures should apply in criminal cases involving first amendment activity. But many also protect against fourth amendment privacy violations and should apply to all criminal investigations. These are matters that I think there is a larger consensus on than almost anything else in the legislation that you will be considering. We do want to emphasize that procedures cannot be merely internal. They should not simply be the kind of secret guidelines which we have had but rather something set forth in statutory form that we can look at and know about, comment on, and make sure that the kinds of intru- sions on constitutional rights that have gone on because the procedures have not been in effect in the past don't go on in the future. Approved ,For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/A.1): CIA-RDP80S01268A000500020027-8 The point that we want to conclude our prepared presentation with is one which you brought out in some detail in your questioning of Mr. Adams, namely, the whole question of the warrant procedure and ac- countability mechanisms for the use of informers and undercover agents. We feel that this is one of the most critical areas in which the charter should move. We start from the premise that the wiretap as technique of search, is very similar to the undercover agent. In fact, if anything, the undercover agent is considerably more intrusive and, in many respects, much more dangerous. If there is going to be a fourth amendment and statutory warrant procedure across the board for the conduct of wiretaps even in very sensitive foreign intelligence areas, such as you have in S. 1566, it seems to us extraordinary that there would not be a similar procedure in the domestic investigative setting where, in fact, the national security interests certainly are not as great. We are talking about very serious potential constitutional violations. Senator KENNEDY. We have to get at what we mean by informers, and whether we are talking about citizens who voluntarily furnish in- formation, or whether we are talking about paid professionals directed by the FBI. Mr. SHATTUCK. We are really addressing the question here of paid undercover agents who are directed and controlled, if you will, similar to the foreign agents who are defined in the wiretap bill who are, in fact, agents of the Bureau in the sense that the Bureau controls them and moves them. We understand the various distinctions in the in- formant area between the tipsters and the people who just might walk in off the street and give information, on the one hand, and paid under- cover operatives on the other. We are not talking about those with respect to the warrant procedure, but rather the paid informers. A further point that needs to made, I think, is that what we are really talking about here is associational privacy and the infiltration of private groups. That is why the warrant procedure is so important and why the case law that we find in the Supreme Court on this issue doesn't speak to the question that we are addressing here. The Hoffa case, as you know, was really a case where an informer was targeted on a particular individual and was not aimed at a group. The associa- tional privacy point that we bring out is not one that has been ad- dressed by the Supreme Court. Therefore, I think the argument that the Supreme Court has generally not required a warrant for informer searches is not an argument that speaks to the issue here, which is the invasion of political and associational privacy. Senator KENNEDY. Do you have suggestions about the warrant pro- cedure that may be different from the title III that would deal with the protection of the fourth amendment and yet deal with some of the practical problems? Mr. SHATTUCK. A crucial point, Mr. Chairman, is this. We are talk- ing about independent scrutiny. If that can go on at the front end in the sense that the the use of the informer, and the reason why that in- former would be used, would be presented to an independent magis- trate, or to a judge based upon probable cause of crime, then if that is satisfied and various procedures are put into effect for minimizing the intrusion and the time period in which the informer would be in a group that you have probable cause to believe is engaged in crime, then I think various other technical points, such as, for example, notice, Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : plfk-RDP80S01268A000500020027-8 could be treated quite differently. It is obviously different from a wiretap. We are not asking you to simply import the title III procedures, lock, stock,. and barrel, into the informer area, but rather to set forth principles in the informer authorization process which would protect fourth amendment rights. Senator KENNEDY. I would like for you to give an assessment of the guidelines. Obviously you differ as to the sufficient kind of accountabil- ity and informer procedures which have been announced that provide both in-house and Justice Department review of those. Perhaps you could submit something later as to why that does not provide sufficient independent review. Mr. SHATTUCK. It is the independent review we are stressing. There are ways in which the guidelines are quite good now, but they are not independent and they don't speak to the kind of criminal standards that we are talking about either. Under times of stress, they could very well go by the boards. In short, special procedures to minimize FBI interference with first amendment rights must be reinforced by a warrant 'requirement for criminal investigative techniques which may intrude on rights of polit- ical privacy. For the same reason that a warrant is required to con- duct a wiretap, it should be used to guide and restrict the use of in- formants and searches of private records. The target of each of these techniques is speech, albeit in different forms, and the only way to ensure that the purpose and conduct of the search are limited to the seizure of criminal evidence is to require prior judicial approval. Nowhere is the need for judicial supervision greater than in cases involving domestic security, where first and fourth amendment rights are simultaneously jeopardized. As the Supreme Court pointed out in Keith: National security cases . . . often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the in- vestigative duty of the executive may be stronger in such cases, so also is there greater jeopardly to constitutionally protected speech. . . . History abundantly documents the tendency of Government?however benevolent and benign its motives--to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The first amendment, of course, guarantees freedom of speech, of the press, of assembly and of the right to petition for redress of griev- ances. The Supreme Court has often observed that the effective exercise of these rights requires associational privacy. Citizens must be able ? to meet and associate privately to discuss their political beliefs and plans and to consider what lawful actions to take to promote their ideas. Records relating to these associational activities are protected unless they contain evidence of crime. ? The right of associational privacy was firmly established by the Supreme Court in repelling the effort of the State of Alabama to compel disclosure by the NAACP of its membership lists. (NAACP v. Alabama, 357 U.S. 449 (1958.) It was sustained and emphasized most recently by the Court in its decision modifying certain intrusive disclosure provisions of the Federal Election Campaign Act. (Buck- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/a: CIA-RDP80S01268A000500020027-8 ley v. Valeo, 424 U.S. 1 (1976) .) As Chief Justice Burger pointed out in his concurring opinion: Mecrecy and privacy as to political preferences and convictions are funda- mental in a free society. . . This Court has seen to it that governmental power cannot be used to force a citizen to disclose his private affiliations, even without a record reflecting any systematic harassment or retaliation. . . . For one it is far too late in the day to recognize an ill-defined "public interest" to breach the historic safeguards guaranteed by the First Amendment. If the first amendment prevents the Government from compelling disclosure of information related to lawful political and other associa- tional activity, it must also require restraints to be imposed on the use of intrusive investigative techniques to gather such information. In fact, it is for this reason that the restraint of a warrant procedure has been imposed upon Government wiretapping. Surely, the first amendment is no less violated if the FBI obtains a copy of the mem- bership or contribution lists of the Socialist Workers Party through the use of paid informers or the search of the party's bank records than if the party's membership and contributor information is ob- tained through a wiretap or as a result of the campaign reform law. Indeed, the first amendment violation is compounded when it results from an intrusive search which also raises fourth amendment ques- tions. This is why we believe that a warrant requirement should be imposed on the use of informers and record searches in criminal investigations. One, in regard to informers, the FBI record on the use of paid informers in political groups shows a massive violation of first amend- ment rights. Although the worst abuses in the last three decades occurred in the undercover provocations of the Cointelpro and Cominfil programs, the Church committee documented many ex- amples of routine informer activities which cut deeply into associa- tional privacy. The committee's final report points out that during the 1964-76 period: The FBI expanded its use of informers for gathering intelligence about domestic political groups, sometimes upon the urging of the Attorney General. No significant limits were placed upon the kind of political or personal informa- tion collected by informers, recorded in FBI files, and often disseminated out- side the Bureau. These vast informer operations were typified by the following: By 1972, 7,402 ghetto informants, for example, "the proprietor of a candy store or barber shop", had been put in a place as FBI listening posts to provide information about racial activities [and] identify extremists passing through or locating in the ghetto area. In 1964 the FBI had infiltrated the Communist Party USA at a ratio of 1 agent for every 5.7 members. In 1970 FBI Director Hoover lifted restrictions against recruiting 18- to 21-year-old informers, and field officers were urged to take advantage of this tremendous opportunity to expand coverage of New Left collectives, communes, and staffs of underground newspapers. Between 1966 and 1976 the Chicago FBI office paid more than $2.5 million to 5,14.5 informants and investigated or opened filed on 27,900 organizations and individuals. The General Accounting Office reports that 48 percent of all domes- tic security investigations were provided by an FBI informer, a Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :1cjf-RDP80S01268A000500020027-8 percentage almost 3 times higher than the most commonly used source for opening an investigation. As recently as fiscal year 1976 the FBI budget allocated $7.4 million for its intelligence informant programs, more than twice the sum for organized crime informers. These statistics reveal the mag- nitude of the informer issue and its impact on associational privacy. But the issue is even larger than the statistics indicated. Informers are at once the most complex, comprehensive and unpredictable in- vestigative tools that the Bureau employs. While the informer is, as the Church committee pointed out, a vacuum cleaner for information, the information is often distorted or inaccurate and in this respect is far less reliable than information obtained by wiretap. Furthermore, an informer who pretends to be a member of a political group cannot simply gather information. He or she must participate actively in the decisionmaking of the organization, taking stands on issues and seek- ing to enhance their credibility by influencing the positions the or- ganization takes and the actions it engages in. Inevitably, as Alan Dershowitz has pointed out in his penetrating account of a Jewish Defense League murder case in which his client turned out to be an informer, the informer corrupts the organization: Violence inevitably stems from a police system that recruits (and educates) secret informers and provocateurs within a radical movement. The recruited agent, almost by definition, is an unstable, psychotic, or psychopathic individ- ual. His temptation to improve his status by engaging in or encouraging violence is almost irresistible. This is what touches off the fatal chain reaction. Violence feeds on violence and the question of who is informer, who is ter- rorist, becomes confused beyond comprehension even by the individual involved. In our view, the case for warrants is overwhelming. While it is true that the Supreme Court has held that an individual has no independent fourth amendment right to be free from warrantless informer surveil - lence, Hoffa v. United States at 385 U.S. 293 (1966), the Court has never directly addressed the question of what restrictions may be con- stitutionally required when informers are used to conduct surveillance of private, political and other associational activities. The Court has intimated, however, that here the balance would shift and a warrant would be required. As Justice White put it in his opinion in United States v. White, 401 U.S. 745, 752 (1971), upholding the legality of a wired informer targeted at an individual, our problem, in terms of the principle announced in Kate v. United States, at 389 U.S. 397 (1967), is what expectations of privacy are constitutionally justifia- ble?what expectations the fourth amendment will protect in the ab- sence of a warrant. Since an expectation of associational privacy is constitutionally justifiable, the first and fourth amendment converge to require a warrant for the use of informers in criminal investigations of groups. To sum up, Congress should enact a warrant procedure similar to title III of the Omnibus Criminal Control and Safe Streets Act and for the use of paid and directed undercover agents by the FBI to in- vestigate criminal acts by members of a group. No warrants should be issued authorizing the infiltration of political organizations not suspected of engaging in specific criminal conduct. This new procedure is necessary to protect first as well as fourth amendment rights, and is urgently required to ensure that political freedom will not again be trampled upon by FBI domestic security activities. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 114 With regard to records searches, another form of intrusive search which raises both first and fourth amendment questions is the war- rantless inspection of private records. Most people believe in the pri- vacy of their personal tax records, bank records, employment records and other recorded third party information about how they lead their lives. This expectation of privacy has often proved to be unjustified, although in constitutional terms it would certainly appear to be justi- fiable. As the California Supreme Court recently pointed out in in- validating a warrantless search of copies of canceled personal checks in the custody of a bank: For all practical purposes, the disclosure by individuals or business firms of their financial records to a bank is not entirely willful since it is impossible to participate in the economic life of contemporary society without maintaining a bank account. In the course of such dealings the depositor reveals many aspects of his personal affairs, opinions, habits, associations. Indeed the totality of bank records provides a virtual current biography. The development of photo- copying machines, electronic computers and other sophisticated instruments have accelerated the ability of Government to intrude into areas which a person normally chooses to exclude from prying eyes and inquisitive minds. Con- sequently, the judicial interpretations of the reach of the Fourth Amendmr,nt constitutional protection of individual privacy must keep pace with the perils created by these new devices. Informal investigative searches of private records have become in- creasingly routine in recent years. With the arrival of new comput- erized storage systems and methods of facilitating access to and exchange of computerized information; for example, the bank indus- try's fledgling electronic funds transfer system, Government investi- gations have turned increasingly to private records. At the same time, legislation such as the Bank Secrecy Act of 1970, has facilitated record searching by requiring private records to be retained for longer periods of time. In short, a revolution in information technology has far outstripped the expectations people have about the privacy of their personal records. There are many recent examples of informal access to bank records. Con- gr3ssional investigations and ACLU lawsuits have uncovered the following: A California supporter of radical causes discovered that his checking ac- count statement had been reviewed by FBI agents when an internal bank memo was mistakenly sent to him which read: "This memo is to authorize you to read checks to the FBI before sending the statement to the customer. . . ." As part of a series of FBI domestic security investigations, the bank accounts of Jane Fonda, Dr. Benjamin Spock, Floyd McKissick and other antiwar and civil rights activists were inspected without legal process. A memo to FBI field offices from Director Hoover in 1968 stated: "there is a need to compile in a single investigative report a clear-cut picture of the entire New Left Movement which will identify its . . . sources of funds. . . ." The FBI inspected and copied the checks of civil rights activists in Philadelphia and Detroit to make a record of their professional ac- tivities, including, in one case, a lawyer-client relationship. Record researches are an important and permissible criminal in- vestigative technique. Nevertheless, they can intrude substantially on associational privacy and therefore raise the same first and fourth amendment issues that arise in the ease of informer searches. Although the Supreme Court has held that a warrant procedure is not con- stitutionally required for bank records searches, statutory guidance is clearly needed in this area. We propose several principles as a point of departure. First, a person's privacy interest in bank, tax, credit, Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : flIgk-RDP80S01268A000500020027-8 and employment records should be recognized by statute. Second, a person's standing to assert his or her privacy rights over records in the hands of third parties should be conferred by statute, on the same basis as if the records were in his or her personal possession. Third, Government investigators should not be able to obtain access to the records without legal process; that is, an administrative summons, subpena or search warrant issued on a showing appropriate to the ? method of process. Fourth, in all instances except the issuance of a search warrant, the record subject should be given prior notice of the proposed inspection and a reasonable time to assert his or her rights before disclosure. These proposals are set forth in more detail in title II of H.R. 6051, and they parallel various other pending record privacy bills. There is a mystique about the use of record searches in law enforce- ment. The trail of paper and computer tape is said to be somehow different from the trail of physical evidence?so much so that the old- fashioned rules do not apply. Though there has been much talk about the need for broad search powers to fight organized crime and white- collar crime, the restriction of investigative methods within recog- nized constitutional boundaries would not prevent vigorous law en- forcement efforts against these types of criminal violations. Where the impact would be the greatest is where the abuses have been the greatest in the use of secret, unrestricted governmental access to private records for the collection of political intelligence; access to the telephone toll records of newpaper reporters to pinpoint the sources of politically embarrassing inside stories ; acces to the bank records of antiwar and civil rights groups to identify their contribu- tors; access to the records of political opponents in election campaigns or outspoken critics of Government policies; had a completely free hand. Elimination of these abuses is the purpose of the procedures we are proposing. Senator KENNEDY. Perhaps you could give us your assessment of the guidelines when they become available. Mr. STTATTucK. We would be happy to accommodate you in that regard. This is an active subject in Congress. Mr. SHATTUCK. I have just a couple of last points. We feel that it is critically important that at the end of all this investigative standard- setting and abolition of the domestic security jurisdiction of the FBI and the warrant procedures, that we still include two flat prohibitions to reflect the record of abuses. One, the FBI should not be permitted to investigate any person or group solely on the basis of first amend- ment activities. That, as you know, is in the wiretap bill. Two, the charter must ban preventive action and Cointelpro-type activities. I think at this stage it should be noncontroversial, but the point is that we are now in quiet times when you can assess these mat- ters, and I think reach agreement with the Bureau that they should be prohibited. Certainly, i in less quiet times, I think the Bureau could very well be seeking that kind of authority again. It is important to make sure that it is not permitted and that this specific prohibition go into the statute. Finally, we don't need to go into any detail about the whole question of oversight This is something that you, Mr. Chairman, are right now engaged in by holding these hearings. It is very important that a long- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 116 term oversight process be set up, even after the charter is enacted and information provided to this committee and other committees. Senator KENNEDY. Does it make any sense to develop an outside group of citizens that would review that on an ongoing and continuous basis and report back? I recognize the importance of congressional oversight. I am talking about these particularly sensitive areas. I have not formulated this in my mind, but we might explore that something along that line with you. That is, we might get an outside group that would review this in very careful detail in some of these areas. I don't, obviously, think it replaces the process and procedures which you have outlined, but there may be some means and mechanisms to get addi- tional kinds of protections. Mr. SuArrucx. Again, I would say that the characters should estab- lish effective oversight mechanisms. Within the Justice Department, the Attorney General should be required to ensure Department and Bureau compliance with the law and to conduct a periodic review of agency investigative activities. The Attorney General must have full and complete access to Bureau files. Within the Congress, the Judiciary Committee should also have access to all FBI files under appropriate privacy safeguards, and should be required to conduct prior review of all procedures designed to implement the legislation. The Attorney General should be required to report FBI violations of charter pro- visions which violate constitutional rights to the committees. Public oversight is also necessary and requires the statute to mandate that all investigatory guidelines and regulations be published in ac- cordance with the Administrative Practices Act. Mr. BERMAN. Mr. Chairman, I think the outside group is a good idea. I know that civilian review boards are put in quotations these days, but there is a civilian review board, and that is the Intelligence Oversight Board for intelligence activities in the administration. It looks at these activities as a public board. It has three members, but maybe with wider nominating procedures like the Legal Services Corporation, you can get a cross-section of people to participate in this. My closing remark is that we think this is an urgent matter. The investigatory charter is the most important thing that has to be done with respect to the Bureau. Recently the Attorney General has been talking about a law enforcement charter, a total charter for the FBI which covers every aspect of their investigatory authority. I think those are worthwhile things for this committee to consider, but I think that they should not be further delayed for getting at this basic issue and as more comprehensive charters develop down the line then those titles can be fitted into it. We should focus on this, and we particularly want to commend you, Mr. Chairman, for attempting to get a deadline for the administration to submit its proposals. We have been waiting for two years for this task force which has continued to operate, but have failed to produce a draft. Mr. HALPERIN. I would like to say one word on informants because I feel very strongly about the critical role of that. The cases on the legitimacy of informants focus on the citizens' obligation to report criminal activity. Where the informants are reporting on legal activity, I think there is no obligation, and indeed, it becomes a disruptive ele- ment. There are two cases now pending. One is the Socialist Workers Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 19A-RDP80S01268A000500020027-8 Party case in New York and the other a case against the FBI in Chicago. Both of them have produced orders by the judges requiring turning over informants names, and both of which have produced a great deal of information about informants and how they actually function in domestic political organizations. I would urge this com- mittee to look at this, perhaps by getting attorneys from those two cases to come here and testify. The judge in New York has said what seems to me to be the critical point, "There is an inherent destructive force simply by the fact that informants occupy policymaking roles where they have a clear conflict of interest by virtue of their position as FBI informants." That is Judge Griesa in New York after looking at the files of the Socialist Workers Party informants. It seems to me that two simple principles are required. One is to prohibit FBI informants from occupying policymaking roles in po- litical organizations. The second is to require warrants where inform- ants are going to be in the process of gathering political information. I think those two principles go to the heart of trying to get a control over what remains a widely used FBI technique of having informants in political organizations and in situations where they gather political information. Senator KENNEDY. Your testimony has been very constructive and helpful; we value your help as we move forward in this inquiry. It is valuable to me personally and other members of the committee. Thank you. We have your full statement which will be inserted here and we thank you very much. The committee stands in recess. [Whereupon at 12:45 p.m., the committee was adjourned.] PREPARED STATEMENT OF ACLU We welcome the opportunity to testify here today on the urgent need to de- velop a statutory charter to govern the Federal Bureau of Investigation and to state our views on critical issues which must be resolved. Concurring in your view that this is a matter of paramount legislative priority, we commend you for initiating these deliberations and look forward to working with this Com- mittee and the Congress in a concerted effort to enact a statutory charter into law. This legislation is long overdue. For two years both the Congress and the previous and present Administration have repeatedly said that the FBI charter is urgent, yet we are only now getting down to business.' In this regard, we are particularly pleased that you prodded the Justice Department to come forward in July with some kind of proposal for an investigatory charter. We also share your view that this is the first priority and that the Administration's recent call for a comprehensive FBI and even Federal "law enforcement" charter must not become a reason to further delay the resolution of basic issues.2 1 E.g. Testimony of former Attorney General Edward H. Levi and Deputy Assistant Attorney General Mary Lawton on Wednesday, Feb. 11, 1976, in "FBI Oversight", Hearings Before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary House of Representatives (94th Cong. 2nd Sess. Serial No. 2 Part 3) (Herein- after cited as House Judiciary FBI Oversight Hearings) pp. 253-262; Testimony of Attor- ney General Griffin Bell before the Subcommittee on Government Information and Indivi- dual Rights of the House Government Operations Committee, June 6, 1977 ; and Recom- mendations in the "Final Report of the Select Committee to Study Government Operations with Respect to Intelligence Activities", Book TI, United States Senate, (94th Cong. 2d. Session. Report 94-755 (Government Printing Office: April 26, 1976) (Hereinafter cited as Church Committee Final Report Book II) pp. 289-341. 2 This is a recent Position of the Justice Department and the Federal Bureau of Investi- gation. Testimony of Attorney General Griffin Bell before the Senate .Tudiciary Committee, April 20, 1978. See also Prepared Statement of Attorney General Griffin Bell before the Subcommittee on Civil and Constitutional Rights Committee on the Judiciary U.S. House of Representatives, February 28, 1978. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :18 CIA-RDP80S01268A000500020027-8 1 We emphasize the necessity for the Committee to focus its principal work on defining the criminal investigatory jurisdiction of the Bureau. While we agree with the Justice Department that a comprehensive FBI charter should be de- veloped to place all of the Bureau's investigatory, police training, support, and liaison functions under law, we believe there are compelling reasons for the Committee to make the establishment of statutory standards and procedures for FBI investigations the first order of business. While other jurisdictional issues are of vital concern to the ACLU, as for example, the Bureau's role in maintaining and disseminating criminal history data, we view the investigatory charter as a matter of considerable urgency and see no valid reason to delay its consideration and enactment pending the resolu- tion of these other issues. When a more comprehensive charter is worked out over time, the investigative statute can easily be included as one or more of its titles.' THE NEED FOR AN INVESTIGATORY CHARTER The massive and disturbing public record of investigative abuse by the FBI is the primary impetus for charter legislation. While we can hope that these programmatic abuses are in the past, we must bear in mind that the central conclusion of each of the many congressional inquiries is not that investigative abuses were committed but that they occurred largely because the FBI's in- vestigative powers are undefined, unchecked, and unregulated by statutory standards and procedures.' As the framers of the Fourth Amendment understood, the unchecked power of the Executive branch to investigate poses a fundamental threat to constitu- tional liberty. As the Supreme Court said in the Keith case: "[T]hose charged with [the] investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing these tasks. The historical judgment, which the Fourth Amendment accepts, is that unrevievved executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and pro- tected speech." Significantly, the Court, in pointing out the inherent danger of an unchecked "executive discretion" to investigate, invited the Congress to establish statutory standards and procedures for sensitive investigative techniques.' The essential validity of this historical judgment and the burden of congressional responsi- bility extend to the whole of the investigatory process. Since the inception of the modern Federal Bureau of Investigation in 1935,8 the Congress, by enacting a multitude of criminal statutes, has greatly expanded the criminal investigatory authority of the FBI.' At the same time, it has per- mitted the Executive Branch to exercise a claimed "inherent power" to overlay this authority with a formidable intelligence jurisdiction.' Yet the Congress a See Testimony of Aryeh Neter, Executive Director, American Civil Liberties Union on S. 2008, the Criminal Justice Information and Protection of Privacy Act of 1975 on July 16, 1975, in "Hearings on the Criminal Justice Infornmtion and Protection of Privacy Act of 1975 before the Subcommittee on Constitutional Rights of the Committee on the Judiciary United States Senate" (94th Cong. 1st Sess. July 15 and 16, 1975) (56-833 U.S. Gov't Printing Office Washington : 1975). 4 As for example S. 1566, the Foreign Electronic Surveillance Act of 1977 is proposed as an eventual part of Title III of the omnibus S. 2525, the National Intelligence Reorgani- zation and Reform Act of 1978, introduced on February 9, 1978, 95th Cong. 2(1 Sess. 5 See, e.g. Church Committee Final Report Book Note 1 supra at page 289: "The Committee's fundamental conclusion is that intelligence activities have undermined the constitutional rights of citizens and that they have done so primarily- because checks and balances designed by the framers of the Constitution to assure accountability have not been applied." See also Comptroller General of the United States, "Report to the House Com- tnitee on the Judiciary FBI Domestic Intelligence Operations . . . Their Purpose and Scone: Issues That Need to be Resolved" (General Accounting Office: Feb. 24, 1976) p. 26) Hereinafter cited as GAO FBI Audit). United States v. United States District Court, 407 U.S. 297, 317 (1972). 7 Id. at 769. 8 The Division of Investigation was first designated as the Federal Bureau of Investiga- tion by the Act of Mar. 22, 1935, ch. 39, title II, 49 Stat. 77, and has been so designated in statutes since that date. For the development of the Bureau's investigative jurisdiction, see chapter on "Criminal Jurisdiction" in Ungar, Sanford J., FBI: An Uncensored Look Behind the Walls pp. 67-83 (Atlantic Little Brown 1976). 1" See Generally "The Development of FBI Domestic Intelligence Investigations", in Supplemental Detailed Staff Reports on Intelligence Activities and the Rights of Americans Final Report Book III of the Select Committee to Study Governmental Operations with respect to Intelligence Activities United States Senate (94th Cong. 2d Sess. Report No. 94-755 April 23, 1976) pp. 373-558. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 11,IA-RDP80S01268A000500020027-8 has declined to define how the FBI is supposed to exercise this authority except In the most rudimentary fashion. The Attorney General is simply authorized to direct the FBI "to detect . . . crimes against the United States." fl Nowhere in the United States Code does the Congress set out standards and procedures to guide the Bureau in detecting crime: " the basis for initiating investigations; the standard that must be met to conduct intrusive investigations; or guidelines to control the use of investigative meaus.13 As for the Bureau's "domestic secu- rity" mission, the Code is simply silent." This Congressional deference to the Executive has been destructive of civil liberties and damaging to law enforcement. It has resulted in: Broadscale intelligence surveillance of lawful political activity in violation of the First Amendment right to privacy of political association; Routine investigation of citizens without probable cause or reasonable sus- picion of crime in both domestic security and criminal cases in violation of the Fourth Amendment; Extensive use of paid and directed informants without adequate guidelines or procedures for independent review contrary to the spirit and purpose of the Fourth Amendment; Inspection of confidential records without subpoena in violation of the Fourth Amendment; and Use of investigative techniques to "chill speech" in violation of the First Amendment." This list does not even include clearly illegal activities such as use of intru- sive surveillance techniques (e.g., break-ins, wiretaps, mail-opening) without judicial warrant or COINTELPRO actions to "disrupt and neutralize" political groups." While most of the public record available relates to investigative abuse com- mitted by the FBI in its conduct of domestic security operations, there are re- 11- 28 U.S.C. 533. " Former Attorney General Edward H. Levi interpreted the "detect" clause of 28 U.S.C. 533 to mean that the Bureau must follow a criminal standard of "investigating persons or Incidents when there is a reason to believe that a federal crime has been or is likely to be committed so that the violators can be prosecuted or the crime prevented." See Attorney General Edward H. Levi, Address to the American Bar Association, August 13, 1975. But of course, that was not the interpretation of former officials of the Department of Justice nor necessarily the interpretation of future Attorneys General. " Section 3052 of Title 18 defines the powers of Bureau agents such as carrying firearms, serving warrants, and subpoenas, but only sets a standard for arrest: "with or without warrant for any offense against the United States committed in their presence, or for any felony cognizable under the laws of the United States if they have reasonable grounds to believe that the person to be arrested has committed or is committing such felony." "Former Attorney General Edward H. Levi found authority for "non-criminal" intelli- gence investigations in clause 3 of 28 U.S.C. 533 which authorizes the Bureau to "conduct such other investigations regarding official matters under the control of the Department of Justice and the Department of State as may be directed by the Attorney General." See Attorney General Edward H. Levi, Address to the American Bar Association, August 13, 1975. But the history of this language, originally in the Bureau's appropriations bill, indi- cates that only foreign intelligence or counterintelligence investigations could have been intended and not domestic security investigations. That is why the FBI relied so heavily on President Roosevelt's Executive Directive of September 1939. See Development of FBI Domestic Intelligence Investigations, Note 10 supra, pp. 395-407. In should be noted how- ever, that the FBI has, over its history used the "penumbra" interpretation of certain political conspiracy statutes like the Smith Act, 18 U.S.C. 2385 and the Voorhis Act, 18 U.S.C. 2384 to derive an intelligence authority from what were intended as criminal statutes under which persons were to be prosecuted. See Development of FBI Domestic Intelligence Investigations, Note 10 supra, pp. 448-454. But particularly, see "Brief on FBI Authority For Domestic Intelligence Investigations" in GAO FBI Audit, Note 5 supra, Appendix IV, pp. 199-200. Both the GAO and the present Attorney General, Griffin Bell, are "uncertain" whether the FBI has statutory authority to conduct domestic intelligence investigations. Id. at 209; Testimony of Attorney General Griffin Bell before the Subcom- mittee on Government Information and Individual Rights of the House Government Opera- tions Committee, June 6, 1977. 11 See Generally Church Committee Final Report Book II, Note 1, supra, See also Halperin? Morton H. and Berman, Jerry J. eds., The Abuses of the Intelligence Agencies (Center for National Security Studies: 1975) ; and Helperin, Berman, Borosage. and Marwick, The Lawless State: The Crimes of the U.S. Intelligence Agencies (Penguin 1976) 10 See sources cited at Id. and also the following Reports "COINTELPRO : The FBI's Covert Action Programs Against American Citizens" ; "Warrantless FBI Electronic Surveil- lance", "Warrantless Surreptitious Entries: FBI 'Black Bag, Break-ins And Micronhone Installations"; and "Domestic CIA and FBI Mail Opening" in Sunplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans Final Report Book III of the Select Committee to Study Governmental Operations with respect to Intelligence Activities United States Senate (94th Confi. 2d Sess. Report No. 94-755 April 23, 1976) Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/2320 ? CIA-RDP80S01268A000500020027-8 1 ports that "black-bag jobs," "suicide taps" and other abuses have also occurred in FBI organized crime investigations." The damage to law enforcement is obvious. In pursuing the dissenter and the merely suspect, and in overreaching the law, the Bureau has squandered valu- able public resources ' which should have been devoted to serious crime, de- stroyed public trust in its own institution, and exposed agents to civil and crimi- nal liability. We cannot and should not rely primarily on the courts to resolve these basic issues. In criminal cases, the only means the courts have to control the investi- gatory function is the exclusionary rule. But increasingly the rule is looked on with disfavor by both judges and legal scholars.' It is obviously ineffective in pro- viding standards or remedies for investigative abuses in a majority of cases which are never prosecuted, and in all intelligence investigations where prosecution is not the aim." Although we believe it is required by the Fourth Amendment, the exclusionary rule is wholly inadequate as a mechanism for establishing general investigative policy, the primary objective here, since review is on a case-by-case basis. In a number of recent decisions, the Supreme Court has strongly suggested that it is the Congress that must legislate standards and procedures for investi- gations.' Reliance on Executive control of investigations is the very core of the prob- lem which legislation must redress. Despite the promise of the Justice Depart- ment to develop guidelines for all investigations two years ago, the existing guide- lines remain incomplete. Domestic Security Guidelines have been promulgated but there are no similar guidelines for criminal investigations.' Moreover, al- though more strict than previous internal security procedures, the current Do- mestic Security Guidelines authorize ongoing intelligence investigations of law- ful political activity and can be read to permit many of the same kinds of in- vestigations that the Congress has so recently criticized.' " "F.B.I. Crime Inquiries Reportedly Tainted", New York Times, October 6, 1977, p. A-1 ; "New Inquiry By U.S. Into F.B.I. Activities", New York Times, October 8, 1977, n. A 24. See Villano, Anthony, Brick Agents Inside the Mafia for the FBI (Quadrangle 1977). "According to the Church Committee, the cost of FBI domestic intelligence is $20 mil- lion annually. Church Committee Final Report Book II. Note 1, supra, p. 18. The General Accounting Office audit shows that most of this money was spent on useless, overboard investigations. See GAO FBI Audit, Note 5, supra. The GAO reaches the same conclusion in its followup report. Report of the Comptroller General of the United States, "FBI Domestic Intelligence Operations : An Uncertain Future" (November 9, 1977) (hereinafter cited as Followup GAO FBI Audit). This is discussed infra. In the Organized Crime area, the GAO states that strike forces have wasted $80 million in the last decade. Report to the Congress by the Comptroller General of the United States, "War on Organized Crime : Faltering Federal Strike Forces Not Getting Job Done (March 17, 1977) (hereinafter cited as GAO Organized Crime Study). "See e.g. Amsterdam, Anthony G. "Perspectives On The Fourth Amendment, 58 Minn. L. Rev. 348 (1974). 23 See e.g. Terry v. Ohio, 392 U.S. 1, 13-15 (1968). "Id. See also United States v. United States District Court, 407 U.S. 297 (1972) ; Laird V. Fatum, 408 U.S. 1, 15 (1968) : "(S)uch a role ('to confine the military to their legiti- mate sphere of activity and to protect appellants' allegedly infringed constitutional rights') is appropriate for the Congress acting through its committees and the 'power of the Purse'.'...... " Justice Department Guidelines for Domestic Security Investigations, March 10, 1976; White House Personnel Security and Background Investigations; Reporting on Civil Dis- orders and Demonstrations Involving a Federal Interest; and Use of Informants in Domestic Security, Organized Crime, and other Criminal Investigations (January 5, 1977) 23 Despite a 2-year promise to develop guidelines in all investigative areas. this Com- mittee knows from the testimony of the Department on April 20, 1978 that the task has not been accomplished. A little less than one year ago, the Department Task Force, estab- lished during the Ford Administration but which operates also in the Carter Administra- tion's Justice Denartment stated that "originally" we "had intended . . . that we would draft all the guidelines to cover not only domestic security but also the whole range of investigative activities that the FBI is engaged in. That wasn't possible, so we adopted guidelines as we went along." Testimony of Justice Department Task Force Officials on FBI Charter Proposals and the Attorney General's Domestic Security Guidelines, before the Subcommittee on Civil and Constitutional Rights of the Judiciary Committee of the House of Representatives. June 6, 1977 (hereinafter Justice Department and FBI 1977 Testimony), (quote from draft hearing transcript.) 24 While the problem here is that guidelines however strict might change, the Justice Department Guidelines are not very strict. Although these guidelines are not before ns to- day, a couple of observations. The Church Committee pointed out that intelligence officials inside the FBI interpret the Guidelines to authorize continuing investigations of "subver- sives." Church Committee Final Report Book II, Note 1, supra, p. 318. The Committee also Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :1141A-RDP80S01268A000500020027-8 Most important, the Guidelines derive their authority from the Executive's claim of an "inherent power" to conduct intelligence investigations.' In the past, this claim has permitted the exact scope of the investigatory power to remain nebulous. In the absence of public debate. Executive guidelines have been and may always be interpreted broadly.' Even strict guidelines may be altered by a stroke of the Executive pen. The Bureau has already represented that some of the guidelines are too restrictive." The Administration has found that criminal investigative guidelines are "not possible" to develop.' Guildelines, as the Ad- ministration has so aptly put it, are only "stop-gap measures." They do not re- solve basic issues. Only an investigative charter can provide a firm foundation for civil liberties Guidelines and the election of a new Administration make no lasting funda- mental changes. The primary reason for the decline in the number of investiga- tions, according to the Bureau, is that "the political/social climate changed." 30 Today the FBI is only investigating individuals and organizations who have com- mitted criminal acts." But the social climate will certainly change. Civil liberties should not rest on mere circumstance. The Carter Administration has left the door open for a reassertion of broad inherent powers in the domestic security area. It has never admitted error or offered to settle any of the many civil suits challenging past abusive surveillance practices." Without statutory redress, Con- gress invites repetition of past abuse. Executive discretion perpetuates the danger of overzealous efforts to "detect" crime, interpreted them as on their face overboard. Id. As did the GAO, in concluding that "the language in the draft guidelines would not cause any substantial change in the nmr.ber and type of domestic intelligence investigations initiated." GAO FBI Audit, Note 5 supra, p. 150. The GAO interpretation was of earlier drafts of the Domestic Security Guidelines. But in the finally promulgated guidelines of March 10, 1976, the standards of investigation articulated were not much tighter. Although stating that the purpose of investigations was to ascertain "information on the activities of individuals, or individuals acing in concer, which involve or will involve the use of force or violence and the violation of federal law," the "involve of will involve" standard is diluted by following sections which authorize the FBI to initiate preliminary investigations on the basis of mere "allegations" and full investigations if persons or groups "may be" engaged in activities that involve or will involve violence. The Attorney General, Edward Levi, admitted that a more "flexible" standard was required to explain the choice of "may be" over "are involved" or "will he involved." See Testimony cited at Note 1 supra. We believe the Guidelines recodify in Executive Order the premise the FBI has always used to investigate possible violation of the Smith Act, 18 U.S.C. 2385. First the person or group does not have to be engaged in violence but simply "Involved" or at some time "involved" in activities which are violent. Their intent may be legal and others illegal but no matter. Second, the threat of violence may be in the distant future. Full investigations are based on a "may be" standard rather than the more definite "will involve" standard which comes at the preamble of the Guide- lines. Efforts to make the test more definite by talking about the Bureau weighing the magnitude of the harm and likelihood of its occurrence do not work because there is no explanation of how to weight the balance. For example. if the harm would be large, "over- throw of the government", the FBI could argue that the likelihood of its occurance could be remote. This is a standard that leaves us right where we were before the Guidelines. Although the number of Bureau investigations is down substantially, the major reason. as Bureau officials admit, is that the "social/political climate changed" and because the FBI is operating on even more strict guidelines for "quality over quantity" which focus Investigations on persons or groups with a long-history of violence or who are reasonably believed to have committed crimes of violence. See Justice Department and FBI 1977 Testimony, Note 23 supra. 28 If there is no statutory basis for the Domestic Security Jurisdiction of the FBI, as pointed out in Note 14 supra. then the G,,Ideliaes can only he authorized under claim of inherent power to conduct national security intelligence activities. 28 See Committee on Federal Legislation of the Association of the Bar of the City of New York, "Legislative Control of the FBI" p. 10 (May 1, 1977) (hereinafter cited as New York Bar Report) al "We do . . . have some concern about the limitation on the use of previously estab- lished informants. . . . We hoped to deal with informants in greater depth and detail and give far greater consideration then we were able to devote at the time the domestic security guidelines were adopted and for that reason some of the rules are stated in rather shorthand fashion and will have to be thought out again." Justice Department and FBI 1977 Testimony, Note 23 Supra (quotes from hearing transcript). 28 mid. 20 mid. 30 Ibid. al Ibid. 33 The present Justice Department is arguing proper investigative conduct in the follow- ing exemplary cases: Halperin v. Kissinger (D.D.C. 1187-73) (reasonableness of wiretap. Immunity of President or Government officials from liability) ; Halkin V. Helms, Civil Action No. 75-1773 (D.D.C.) (legality of warrantless NSA electronic surveillance and lack of harm to First Amendment rights arising out of CIA Operation CHAOS) ; Lamont .v. 17.S. Civil No. 77?c-1029 (E.D.N.Y.) (no liability for illegal mail opening) ; Socialtst Workers Party v. Attorney General, 73 Civ. Action 3160 (S.D.N.Y.) (legality of 40 year surveillance). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 ? CIA-RDP80S01268A000500020027-8 Today we will focus our testimony on the case for the five basic reforms which a statutory charter must institute,: First, the charter must abolish the domestic intelligence jurisdiction of the FBI. Second, the charter must only authorize intrusive investigations pursuant to a criminal standard, excluding conspiracy as a basis for investigation when First Amendment activity may be involved. The purpose of such investigations should be the gathering of evidence for arrest and prosecution. Third, the charter must establish strict statutory procedures governing investi- gations which may intrude on lawful First Amendment activity in order to in- sure that they are properly authorized and conducted so as to minimize the intrusion. Fourth, the charter must establish a judicial warrant procedure governing the FBI's direction of informants or undercover agents to infiltrate associations in authorized criminal investigations. Fifth, the charter must prohibit the FB]I from engaging in "preventive action" or COINTELPRO-type activity. These proposals are embodied in the model legislation, A Law to Control the FBI," and in H.R. 6051," now before the House. Although they are controversial, we hope that over the course of these hearings the Committee and the Congress will become convinced that their enactment is both wise public policy and neces- sary for the protection of fundamental constitutional liberties. THE CASE AGAINST DOMESTIC SECURITY INVESTIGATIONS Domestic security investigations are intelligence investigations undertaken by the Federal Bureau of Investigation primarily to prevent acts of political vio- lence rather than to effect criminal prosecution. Although the FBI never recog- nized such a distinction in the past, domestic security investigations are today defined as distinct from counterintelligence investigations because the violent acts they are intended to anticipate and prevent are not undertaken for or on behalf of a foreign power. Most of the intelligence investigations conducted by the FBI, from investigation of "subversive activities" to investigations of radi- cals and extremists, in fact fall in this category.' Today domestic security in- vestigations are authorized to anticipate and prevent the violent overthrow of the government, civil disorders, and domestic terrorism.' The value of domestic intelligence does not outweigh the risk to civil liberties. Over the course of our history, we have always recognized the tension between maintaining an open, democratic society and protecting that society from violent disruption. Repeatedly we have established "domestic security measures" in re- sponse to perceived threats to our social order. In every case, from the Alien and Sedition Acts through the "Palmer Raids" in the 1920's and the loyalty and 8.1 Committee for Public .Tustice, The American Civil Liberties Union, and The Center for National Security Studies, A Law to Control the FM, Feb. 15, 1977. H.R. 6051, 95th Cong. 1st Sess. April 5, 1977. See also H.R. 4173, 95th Cong. 1st Sess. March 1, 1977. (In H.R. 6051, domestic security investigations are prohibited and criminal investigations regulated in Titles I and II In H.R. 4173, see Tables II and III, including the warrant requirement for the use of informants.) '15 The Church Committee made no distinction between counter-intelligence and domestic security investigations in making its recommendations. See Recommendation 44, Church Committee Final Report, Note 1, sunra, p. But S. 1566. the Foreign Intelligence Surveillance Act of 1977 does recognize a distinction and includes lower standards for counterintel- ligence and counterterrorism investigations involving wiretapping than presently exist for domestic security wiretaps which are governed by The Safe Streets Act under a Probable Cause of Crime Standard. The line is difficult to draw, but the issue is mooted for us by the sure passage of S. 1566 and its House counterpart H.R. 7308, unless we permit lower standards in domestic security investigations. ,A3 See Development of FBI Domestic Intelligence Investigations, Note 10, supra, notes the historical blurring of investigations premised on counteracting communist influence COMINFIL and later investigations of civil rights groups, anti-war activists, civil dis- orders, and the rest. We contend that most of these investigations were premised on "anti- communism" and the belief that violence and disorder were communist insnired. Remove the anti-communist bias and these investigations are investigations of "home grown tomatoes" as the FBI referred to the Socialist Workers Party. But caution that to maintain the "foreign connection" premise or presumption, however developed, would blur the distinction in the future. The Congress will have to deal with the boundary line between counterintelligence and domestic security or criminal investigations. If the boundaries are not drawn in favor of higher standards and a presumption that a foreign power is not involved, domestic security guidelines or statutes prohibiting these investigations will not protect citizens since "foreign connection" is so easy to find and may be involved in most cases. al See Domestic Security Guidelines of March 10, 1976, cited at note 22 supra. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :19AA-RDP80S01268A000500020027-8 security programs in the 1850's, to the recent revelations of massive covert FBI surveillance and disruption of lawful political activity over the last four decades, these measures have proved far more damaging to our society than protective of it. Yet today we are considering the continuation of a domestic intelligence juris- diction for the FBI. The new threat to which we are responding is political terrorism.'s Persistently we rely on these demonstrably dangerous measures be- cause of our stubborn adherence to two basic assumptions: (1) that it is possible "to draw the fine line between legitimate conduct and illegitimate investigation of advocacy and association" and thereby minimize the threat to civil liberties; and (2) that domestic security operations can substantially prevent or reduce political violence. These assumptions permit the assertion that "on balance" the benefits outweigh the risks. The only problem then is to design proper guidelines and effective oversight.89 These assumptions are thoroughly debunked by the evidence. By definition domestic intelligence investigations require surveillance of lawful political ac- tivity. Particularly in times of social turmoil, those charged with a preventive intelligence mission have been unwilling or unable to distingush between vigor- ous citizen dissent and real security threats." At least in part because of this misdirection, domestic intelligence operations have failed to accomplish their goal. Moreover, there is significant evidence that these efforts are counterpro- ductive in stemming political violence and often have the opposite effect. Given these facts of life, sound public policy, based on the need to protect fundamental constitutional rights as well as society from serious violence, must reject this fruitless and dangerous course. Reaching this conclusion in no way implies that we do not consider terrorism to be a serious potential threat to the fabric of our society and to our democratic institutions. Rather it is based on a large body of empirical evidence on the public record which, contrary to traditional dogma, indicates that preventive intelligence, to the extent that it is conducted within "tolerable boundaries," is useless for preventing terrorism and that "less intrusive means" may well be more effective. The evidence indicates that "more of the same" is not what is called for in meeting this serious potential threat. The Committee should use the opportunity afforded by calmer times to make different and wise public policy. 1. Drawing the line is impossible It is not difficult to fathom why the Church Committee found its effort "to draw the fine line between legitimate conduct and illegitimate investigation of advocacy and association" for preventive intelligence investigations "the most difficult . . . to draft.' Nor is it hard to understand why the Justice Depart- ment's effort to do the same is interpreted by some FBI officials to authorize con- tinuing investigation of "subversives." 42 It is simply not possible to make the necessary distinction within the framework of a domestic intelligence authority. If their objective is to permit the FBI to prevent a crime before it occurs, intelligence investigations, by definition, must be initiated without reasonable suspicion that a criminal act has been, is being, or is about to be committed." FBI agents will inevitably focus investigative attention on persons who vigor- ously dissent against government policy or social conditions, or groups who advo- cate the need for radical, or revolutionary change, even though these activities g8 See Statement of Clarence Kelley, Director, FBI, before the Civil and Constitutional Rights Subcommittee of the House Judiciary Committee, February 11, 1976, in House Judiciary FBI Oversight Hearings, note 1, supra, pp. 262-65. See generally, National Advisory Committee on Criminal Justice Standards and Goals, Report of the .Task Force on Disorders and Terrorism (LEAA 1976) Rejecting the focus on "subversives" in the Justice Department Guidelines, the Church Committee recommended a more narrow focus on terrorism. See Recommendation 44 Discussion, Church Committee Final Report Book II, pp. 320-323. How much more narrow this could turn out to be is debatable. 30 A most exemplary statement of this balancing technique in the domestic security area is the reasoning of the Supreme Court in the Keith case. United States v. United States District Court, 407 U.S. 297 (1972). 43 The Keith case, cited in note 39 supra, also contains the warning that domestic security "standards" are overrun as a matter of historical fact in our history. See quote at page 25 Infra from 407 U.S. 297 at 314. 43 Church Committee Final Report Book II, Note 1, supra at p. 321. 49 See discussion, note 24 supra. 43 Recent amendments have changed the National Security Wiretap Standard for target- ing persons engaged in international terrorism from probable cause to a reasonable suspicion because of the need for greater flexibility to prevent the harm from occuring. See Report to Accompany S. 1566 from Senate Committee on Intelligence (Report No. 95-701, 95th Cong. 2d. Sess. March 14, 1978), p. 26. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 124: are constitutionally protected. Dissenters are visible and reasonable targets of intelligence investigations which are supposed to prevent politically motivated violence. Moreover, if the investigative purpose is to piece together a "web of intelligence" which intelligence agents claim to require to distinguish the real threats of political violence from "legitimate conduct," investigators have to gather information about all of the plans, activities, beliefs, associations and memberships of suspect individuals and groups." This danger is particularly acute when the principal investigative technique is the planted informer who cannot be entrusted with the decision to decide what is relevant or significant activity which may signal possible violence." The inevitable result is the very evil which the guidelines and charters are intended to prevent: ongoing investigations of lawful political activity in violation of free speech and associational privacy protected by the First Amendment," unreasonable searches and seizures in viola- tion of the Fourth Amendment,' and a concomitant "chilling effect" on all po- litical activity when citizens are subjected to a fear of investigation, exposure, and reprisal if they engage in unpopular political activity.? Because the specifics of the Justice Department Guidelines and the Church Committee Recommendations are not at issue at this time, we simply point out that we have analyzed them in terms of their potential overbreadth and con- cluded that they can be interpreted to permit many of the kinds of investigations which occurred in the past.? The late Senator Philip Hart expressed our view succinctly in his dissent from the Church Committee's recommendation: "The Committee was concerned about authorizing such extensive investiga- tions before there is a 'reasonable basis of suspicion' the subject will engage in terrorism. The Report offers examples of how this recommendation would work, and indicates our desire to insulate lawful political activity from investigation of terrorism. But these very examples illustrate how inextricable the two may be at the outset of an inquiry into an allegation or ambiguous information. The task of finding out whether a dissident is contemplating violence or is only in- volved in vigorous protest inevitably requires investigation of his protest activities. In the process, the FBI could follow the organizers of the Washington peace rally for three months on the basis of an allegation that they might also engage in violence."' While some may argue that this is a strained reading of the Guidelines and Church Committee recommendations, tumultuous times produce such interpre- tations. President Roosevelt's secret 1939 Executive Directive only instructed the FBI to investigate violations of sabotage, espionage, treason, and violations of the neutrality laws. This Directive became the principal basis for much that followed.0 "For the expression of this view, see Response of former FBI Director Clarence M. Kelley to the GAO FBI Audit and critique of the Guidelines in GAO FBI Audit, note 5 supra, Appendix V, p. 213: "Limiting domestic intelligence investigations to preventing force and violence could restrict the gathering of intelligence information useful for antici- pating threats to national security of a more subtle nature. This is the case because, in our view, such a limitation would protect from governmental inquiry those plotting to undermine our institutions during their preliminary stages of organization and preparation and thus inhibit the development of an intelligence college upon which to base meaningful analysis and predictions as to future threats to the stability of our society." (Emphasis Supplied) "The basis, we believe, for the "vacuum cleaner" metaphor for what informants do with respect to private information?sweep it up without distinctions being made. See "The Use of Informants in FBI Intelligence Investigations" in Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans Final Report Book III of the Select Committee to Study Governmental Operations with respect to Intelligence Activities United States Senate (94th Cong. 2d Sess.) (1976) pp. 225-271. "A line of cases develop these propositions, e.g., NAACP v. Alabama, 357 U.S. 449 (1958) ; Bates v. Little Rock, 361 U.S. 516 (1960) ; Buckley v. Valleo, 424 U.S. 1 (1976) See discussion infra on use of informants without judicial warrant for their exposition. 47 United .States v. United States District Court, 407 U.S. 315,313-14 (1972) : " 'Historic- ally the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure power' Marcus v. Search Warrant, 367 U.S. 717 . . . (1961)." "NAACP v. Button, 371 U.S. 415 (1963) but see Laird v. Tatum 408 U.S. 1 (1972) stating that there is no standing to challenge the existence of an intelligence system merely because it exists. "Allegations of a subjective 'chill' are not an adequate substitute for a claim of specific present objective harm or a threat of specific future harm . . ." Id. at 14. Note however, that the Court noted that the allegations were of surveillance by overt techniques. "We are not cited to any clandestine intrusion by a military agent." Id. at 9. Recent cases have distinguished Laird on this ground, when specific intelligence activities are alleged. E.g. cases cited at note 32 supra. 49 See discussion in Note 24 supra. "Church Committee Final Report Book II, Note 1, supra at 359-60. "See generally Development of FBI Domestic Intelligence Investigations, Note 10, supra, particularly 405-07. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 :f2114-RDP80S01268A000500020027-8 2. Preventive intelligence is. ineffective and counterproductive The inevitable costs of these intelligence activities require the Congress to carefully assess their value before authorizing them. Based on the public record, the Bureau's "offer of proof" to support its mission, and the General Accounting Office s intensive audit of FBI Domestic Intelligence, and its follow-up study appropriately titled "FBI Domestic Intelligence Operations: An Uncertain Future," 52 there is literally no evidence to support the value of domestic intelli- gence in anticipating or preventing acts of political violence. According to the Church Committee, "between 1960 and 1974, the FBI con- ducted over 500,000 separate investigations of persons and groups under the 'subversive' category, predicated on the possibility that they might be likely to overthrow the government of the United States. Yet not a single individual or group has been prosecuted since 1957 under laws which prohibit planning or advocating action to overthrow the government According to the GAO audit of some 17,528 FBI domestic intelligence investi- gations of individuals in 1974, only 1.3% resulted in prosecution and conviction, and in only "about 2%" of the cases was advance knowledge of any activity? legal or illegal?obtained!' In reviewing 101 organization files, the GAO found only 119 instances where activities where anticipated by the FBI. Only 12% of these activities could con- ceivably involve violence. There is no record of whether the FBI prevented any of this potential violence. The FBI contends these statistics might be unfair because they concentrate on individuals rather than groups. In response, GAO states that its "sample of organizations and control files were sufficient to de- termine that generally the FBI did not report advance knowledge or planned violence." In most of the 14 instances where such advance knowledge was ob- tained, it related to "such activities as speeches, demonstrations or meetings? all essentially non-violent." 55 invited to supply more supportive information to the Church Committee, the FBI produced a memorandum in which 3 cases of prevention were detailed.56 The general finding of the GAO establishes that the anticipation or preven- tion of violence by the FBI just does not happen. "Investigations of sabotage, certain bombings, and riot violations, and protection of foreign officials, al- though handled as part of the FBI's domestic intelligence oeprations, usually involved criminal acts committed before the investigations were initiated." 57 One of the main reasons advanced for expanded collection of information about urban unrest and anti-war protest was to help responsible officials cope with possible violence. However, as the Church Committee reports, a "former White House official with major duties in this area under the Johnson Adminis- tration has concluded in retrosepct that 'in none of these situations . . . would advance intelligence about dissident groups [have] been of much help,' and that what was needed was 'physical intelligence' about geography of major cities, and that the attempt to 'predict violence' was not a successful undertaking:: 58 The Bureau's failure occurred during a period when it operated covertly "with no holds barred." 58 None of the major outbreaks of political violence which are cited to support the need for a preventive intelligence jurisdiction were antici- pated or prevented: the civil disorders of the 1960's, the campus disorders of the 1970's, the Capitol Bombing, the political assassinations and attempts, the violent activities of the Weather Underground or the KA.? So long as "prevention" remains the goal of domestic security investigations, new restrictions and procedures will further insure failure. The often heard criticism that these restrictions, necessary to protect civil liberties, will "tie the hands" of the FBI's intelligence agents is not unfounded." The follow-up Report 42 Followup GAO FBI Audit, Note 18 supra. 43 Church Committee Final Report Book II, Note 1, supra, p. 19. 54 GAO FBI Audit, Note 5, supra, pp. 140-144. 44 Ibid. p. 144. 55 Church Committee Final Report Book II, Note 1, supra, p. 18, fn 101. 61 GAO FBI Audit, Note 5, supra, pp. 3-5. '58 Church Committee Final Report Book II, note 1, supra. p. 19. Testimony of Joseph Califon?. 42 "This is a rough, tough, dirty business, and dangerous. It was dangerous at the times. No holds were barred. . . . This is a rough, tough business." as William C. Sullivan the late and former Assistance to the Director put it. "COINTELPRO : The FBI's Covert Action Programs Against American Citizens" in Supplemental Reports. Note 16 supra, p. 7. 65 See examples cited by Clarence M. Kelly in his testimony cited as note 38 supra. 62 See Report on Disorders and Terrorism, Note 38 supra, pp. 145-148: "Many of the approaches to legislative regulation now under discussion would seriously compromise the ability of police to cope with the problems of criminal disorders and terrorist activities." Id. at 146. Approvediroilgelease 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 126 of the General Accounting Office Report, FBI Domestic Intelligence Operations: An Uncerta4n Future, realistically describes the dilemma: "Despite the improvements in the direction and control of domestic intelligence, there are still few visible results. . . . Realistically this may be the best that can be expected, particularly in view of the greater investigative restrictions now placed on the FBI and [in view of] its past record when there were fewer restrictions and less control." [Emphasis supplied.] " Moreover, there is considerable evidence that preventive intelligence measures are in fact counterproductive. Instead of serving to detect and prevent violence, they have the opposite effect of making crime detection more difficult and violence more likely. By focusing on the dissenters and protesters in order to ferret out potential violence, intelligence agencies play into the hands of terrorists. As the aim of the terrorist is to both intimidate and create symapthy for his or her cause by convincing people that repression makes violence necessary, overreaction by authority is a key element in the strategy. If police investigate innocent persons or those sympathetic to the "cause" of the terrorist, the police confirm or appear to confirm the 'truth about repression. By violating constitutional rights, intelli- gence agencies unwittingly help to promote the success of terrorist tactics." By engaging in overbroad surveillance, intelligence agencies create paranoia and distrust of the police which makes detection of terrorists more difficult. To cite just two examples, the reason why the FBI has had great difficulty in over- taking the SLA and Weather Underground is that a significant segment of the public has been unwilling to establish their whereabouts to the police and some people have helped these groups stay underground. Intelligence investigations have made them "enemies" of the police and they wrongly but understandably identify with other "enemies" of the police. Without public trust in police authority, which is undermined by surveillance or fear of surveillance, FBI criminal investigators are hindered in legitimate efforts to enforce the law." Finally, by taking "preventive actions" or using illegal means, an intelligence agency becomes the mirror image of the terrorists it is supposed to thwart. When a police agency becomes a kind of terrorist organization using intimidation and violence to achieve public ends, that is a far worse threat than Black Septem- ber or FALN, or SLA. Official terror is the ultimate evil in modern times,' and the FBI, as the public record shows, used tactics in its intelligence mission which we associate with police states: from the compilation of emergency deten- tion lists to COINTELPRO. A total change in emphasis is required. Instead of focusing on political dissent, the FBI should zero in on illegal conduct. The appropriate alternative is criminal investigations conducted under strict standards and procedures. Both the admin- istration and key elements of the Congress are apparently coming to the same conclusion." When we first testified in favor of prohibiting domestic intelligence investiga- tions two years ago, only the Pike Committee and 87 a number of public organiza- Followup GAO FBI Audit, Note 18 supra, o 6. 53 Hacker, Frederick J., M.D., Crusaders, Criminals, Crazies: Terror and Terrorism in Our Time (Norton 1976). " Ibid. 137-78. "Between seven and twelve people succesfully evaded literally thousands of FBI and other security forces mobilized for the specific purpose of discovering them. The SLA members did not even feel compelled to keep a low profile. They popped up periodically in Berkeley or in San Francisco . ." Id. at 158. "Five hundred ninety-one days passed betwen Patty's totally involuntary kidnapping by the SLA and Tania's totally involuntary capture by the FBI." Id. at 169. 65 Ibid. p. 4: "Even in democratic societies, counterterrorist activities can, by use of electronic surveillance, clandestine infiltration, illegal searches, and similar actions, compound the violation of the values that they intended (or pretend) to protect. Inad- vertently or by design, counterterrorist campaigns often adopt the tactics they presumably abhor and for the sake of efficiency, become as terroristic as the activities against which they fight." See Hacker Generally on this point. See also, Rosenbaum, Jon H. and Seder- berg. Peter C., eds. Vigilante Polities: Order without Law. Defining the problem, they use the term "Official vigilantism." Id. at 16. " As Hacker states, "Lip service is readily given to the novelty of the phenomenon of modern terrorism, but nobody dares touch the traditional law enforcement routines . . . These days everybody is willing officially to acknowledge the necessity for novel measures In meeting moral challenges; but when it comes to brass tacks, the brass wants to depend on the old methods that have failed . . ." Ibid. at 246. 07 Recommendations of the House Committee on Intelligence, Feb. 11,1976, House Report 94-833 (recommending abolition of the Internal Security Branch of the FBI). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CleDP80S01268A000500020027-8 tions," including the United Automobile Workers and Common Cause, advocated a similar flat ban." Both the Justice Department under former Attorney General Levi " and the Senate Select Committee on Intelligence Activities (the Church Committee) 71 recommended that the Congress authorize limited preventive in- telligence investigations because of the necessity to "anticipate and prevent" political violence before it occurs. Recently, however, a number of House members,72 including the Chairman of the FBI Oversight Committee of the Judiciary Committee, the newly constituted Senate Intelligence Committee, and the Justice Department have taken the posi- tion that criminal investigative standards under strict procedures should be used in domestic security related cases. Chairman Don Edwards of the FBI Oversight Committee has introduced legislation which would accomplish this result (HR. 1040)." The Chairman of the Senate Intelligence Committee, Senator Birch Bayh, also a member of this Committee, announced on February 9 of this year that the Intelligence Committee had declined to include domestic security investigations in the foreign intelligence charter, S. 2525, "because they should be treated as law enforcement rather than intelligence functions." 74 Now the Attorney General has adopted a similar view, which he described in recent testimony before the House Judiciary Committee: "Last year we begav, efforts to draft legislation dealing with the domestic security investigations of the FBI. It quickly became apparent, however, that it is unsound, both legally and practically, to isolate this particular subject from other areas of FBI criminal investigative responsibility. There is no real differ- ence between investigations of criminal enterprises bent on violence for political motives and criminal enterprises bent on violence to extend the influence of organized crime for economic gain. Murder, assault, bombing and extortion are weapons equally adapted to calling attention to a political cause or enforcing a loan-sharking or kickback agreement. Whatever the motivation, the same inves- tigative techniques come into play in attempting to identify the persons or organi- zations behind these acts, determining who provides the leadership and bringing a halt to such crimes. The only distinction is that greater safeguards for the protection of First Amendment rights should be provided by the investigation of crimes undertaken for political reasons. [Emphasis supplied.] " The FBI's current policy in the domestic security area is itself a compelling argument for the appropriateness of abolishing the dometstic security jurisdic- tion. The Bureau has transferred all domestic security investigations to its Criminal Division. Despite the arguably broad jurisdiction granted by the Justice Department Guidelines, the Bureau, in its own "quality over quantity" approach, has limited itself to investigating only "Individuals and organizations involved in crimes against the U.S. which involve acts of violence.' Instead of wasting time and resources and infringing rights by trying to prevent violence before it occurs, the Bureau seems to be trying to prevent violence by detecting and prosecuting those who commit crimes of violence in order to deter such acts. PROHIBITING OTHER DOMESTIC SECURITY INVESTIGATIONS In order to close down the Bureau's domestic intelligence jurisdiction, the charter must preempt all executive orders and limit the FBI to the conduct of criminal investigations. The charter must also carefully define the FBI's investi- gatory responsibility in the areas of civil disorders and background investiga- 68 Most recently, the committee on Federal Legislation of the Association of the Bar of the City of New York. See New York Bar Report, note 26 supra. 6' See Letter to Senate Intelligence Committee on FBI Charter Recommendations, March 11, 1976 (on file at Center for National Security Studies). 7? See Testimony of Attorney General Levi cited at note 1, supra. 71. Recommendation 44, Church Committee Final Report Book II, note 1, supra, p. 321. 'N For example, H.R. 6051 has 29 co-sponsors, a low number only because the bill also bans all Covert operations abroad and espionage by the United states except in time of War. n 95th Cong. 1st Sess. December 15, 1977. 70 News Release Senate Select Committee on Intelligence, Statement of Senator Birch Ilayh, Chairman, Senate Select Committee on Intelligence on the Introduction of the Na- tional Intelligence Reorganization and Reform Act of ble9f7o8, Feb.9 70 Statement of Griffin B. Bell, Attorney General, re the S1.1' b1c9oiM8'mpitt7e.e on Civil and Constitutional Rights Committee of the Judiciary, U.S. House of Representatives, February 28, 1978, p. 15--16. " Justice Department and FBI 1977 TefftiMOIty, note 23 supra. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 128 tions. These functions must no longer constitute a basis for intelligence investigations:8r Civil disorder information gathering must be strictly limited. The Attorney General must authorize collection only if there is a clear and immediate threat of violence likely to require the calling out of federal troops. Only temporary (30 days) collection should be permitted and the FBI should be limited to the use of overt techniques unless a full criminal investigation is authorized. The Bureau's authority to gather information 78 about planned demonstrations should be similarly restricted. The scope of the Bureau's authority to conduct background and security in- vestigations should be reassessed and explicitly defined. No background investiga- tion should be conducted without the subject's consent. Only information relevant to the legitimate purpose of the investigation should be collected or maintained; dissemination should be tightly controlled. Because of the inherent tension be- tween the FBI's counterintelligence and background investigative functions, the Committee should seriously consider the transfer of most of this authority to the Civil Service Commission.28 A STANDARD FOR FBI CRIMINAL INVESTIGATIONS The Congress must define carefully the FBI's criminal investigatory authority. The charter should mandate that the primary purpose of a criminal law enforce- ment investigation is to "detect . . . crimes against the United States," identify- ing the perpetrators and gathering evidence to establish the basis for arrest and prosecution. The Congress can thus insure that the FBI will not conduct "intelligence" investigations. Of particular importance, the Congress must establish an investigatory stand- ard which the FBI must meet before it can conduct a convert, intrusive criminal Investigation. We believe the FBI may not conduct an intrusive investigation unless it has a reasonable suspicion, based on specific and articulable facts and rational inferences from such facts, that the subject of an investigation, whether a person or a group, has committed, is committing, or is about to commit a specific act which violates a federal criminal statute. The Supreme Court in Terry v. Ohio' held that a reasonable suspicion stand- ard must be met to justify a search pursuant to an investigation. Specifically, the Court stated that:, "in justifying the particular intrusion the police officer must be able to point to specific and articulable facts which, taken together with rational inferences from those facts reasonably warrant that intrusion. 81 This holding does not resolve the issue of what kind of "reasonable suspicion" justifies a full criminal investigation. But the "specific violation of law" basis for investigation is a logical extension of the Terry decision to the "particular intrusion" we are considering here. In Terry the police were only required to have a reasonable suspicion that "criminal activity may be afoot," 82 but the Court emphasized that this was only a limited "stop and frisk" and not a "full-blown search." 83 An on-going criminal investigation, which involves covert, intrusive techniques such as continuous physical surveillance, inspection of private records, and use of paid and directed informants is more akin to a "full-blown search" " For authority to assist President in assessing need for troops in civil disorders as basis for FBI intelligence gathering, see Development of FBI Domestic Intelligence Investi- gations, note 10 supra, pp. 489-518. For history of background investigations as basis for authority to collect intelligence by FBI, see Id. at pp. 431-35. la This a stricter version of the Justice Department Guidelines on Civil Disorders and Demonstrations Involving a Federal Interest Reporting Guidelines, note 22 supra. And also stricted than Recommendations 45-46, Church Committee Final Report Book II, pp. 323. 19 Consent is now a requirement under Justice Department Guidelines on White House Personnel Security and Background Investigations, note 22 supra. But the dissemination rules need to be tightened. See Recommendation 47, Church Committee Final Report Book II, pp. 323-24. Transfer to the Civil Service is mandated by Law to Control the FBI and recommend for consideration by the New York City Bar Association Report, note 26 supra, p. 35. Actually more generally a transfer to "another agency." " 392 U.S. 1 (1968). 81Id. at 21. Id. at 30. Id. at 19. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 129 requiring a higher degree of certainty that criminal conduct is involved than to a "stop and frisk"." In such investigations, where the FBI does not have probable cause to arrest or does not use techniques which require a search warrant," we believe the Constitution requires the Bureau to meet the standard we have proposed. We do not propose a "probable cause" standard, which both the Attorney General and FBI Director have indicated might be workable," because we are attempting to articulate a standard of investigation that is not premised on "conspiracy" statutes. In our view, reasonable suspicion of a specific act in viola- tion of law is a tighter investigatory standard than probable cause of conspiracy, and the only standard that can protect constitutional rights adequately, In the past, the FBI has conducted massive investigations of lawful political activity premised on the violation of conspiracy statutes such as the Smith Act (18 U.S.C. 2385) and Voorhis Act (18 U.S.C. 2380) which on their face punish lawful speech and advocacy.' We recommend the repeal of these statutes by this charter legislation.' However, even if they are repealed, the use of general con- spiracy statutes (18 U.S.C. 371) in conjunction with statutes prohibiting substan- tive conduct as a predicate for intrusive investigation perpetuates the problem. The Report accompanying the recently enacted S. 1437 which repeals the Smith A?ct poses the issue: The Code more appropriately leaves this area to the general conspiracy pro- visJon (section 1002), which will make It an offense to conspire to violate either sectiOn 1101 (Treason) or 1102 (Armed Rebellion or Insurrection)." In case law, the courts emphasize the inherent danger in prosecuting persons engaged in First Amendment activity under conspiracy statutes." Constitution- ally protected conduct could be punished. Conspiracy statutes, on their face, pro- hibit associations established for illegal purposes. An overt act, which may be lawful, is sufficient to prove the crime. Alternatively, if the association for the purpose that would be illegal can be shown, then an illegal act by one associate may be attributed to all other members of that association.' ( The problem in the First Amendment area is that vigorous dissent by political associations often involves advocacy of acts which would be illegal if committed ' (e.g. overthrow of the government or disruption of a governmental function). Overt acts which might suffice to prove conspiracy in a criminal case such as attending meetings and raising funds are the stuff of political activity. Con- sequently, the courts have required a showing of specific intent in the prosecution "In Terry, the Court made much of the danger the officers faced in the situation but also that this was an area of conduct where "necessarily swift action predicated upon the on-the-spot observations of the officer on the beat?which historically has not been, and as a proctical matter could not be, subjected to the warrant procedure. Id. at 20. The Court stressed that "we do not retreat from our holdings that the police must, whenever practicable, obtain advance judicial approval of searches and seizures through the warrant procedure." rd. While we are not requiring a warrant here, the Court's reasoning is strongly suggestive that a higher standard is required in -circumstances where a warrant might be renuired. "The Church Committee recommended warrants based on probable cause for mail- opening and surreptitious entry. Recommendations 53 and 54. Church Committee Final Report Book II, Note 1, supra, p. 328. No statute is necessary to require this in the domestic security area, since these warrantless surveillances were generally recognized as "clearly illegal." Legislation is necessary to define foreign intelligence or counterintelligence war- rant standards since the President has asserted inherent power to conduct warrantless surveillance for these purposes. Executive Order 12036, January 26, 1978. We also recom- mend warrants for use of undercover agents and intrusive record searchea. See discussion infra. Wiretapping in the domestic security area should be prohibited US a "general search" violative of the Fourth Amendment. "Testimony of Attorney General Griffin Bell before the Subcommittee on Government Information and Individual Rights of the House Government Operations and Individual Rights of the House Government Operations Committee, June 6, 1977; Testimony of William Webster, Director of the FBI on PBI Authorization Legislation before the Senate Judiciary Committee, April 18, 1978. 87 See Text accompanying note 53 supra. "See Section 4 of H.R. 10400 introduced by Don Edwards of California. renealing certain laws to eliminate color of authority : (Chanter 102 (relating to riots) of Title 18, Sections 2384 (relating to seditious conspiracy), 2385 (relating to advocating the overthrow of Government). 2386 (relating to registration of certain organizations), 2387 (relating to peacetime interference with loyalty, moral, or discipline of military forces). and 2391 relating to temporary extension of wartime penalty for interference with loyalty, morale, or discipline of military forces) of such title 18 are all repealed. Renort of the Committee on the Judiciary, United States Senate, to accompany S. 1437 ? Criminal Code Reform Act of 1977 (Rept. No. 95-605 Part 1) (95th Congress 1st Sess..), pp. 185-86. 06 scales v. United States, 367 U.S. 203 (1961) ; Yates v. United States, 354 U.S. 298 (1957). 01 United States v. Spook 24. 165 (1st Cir. 1969). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 130 of First Amendment related cases. Further, because the motives for participation may have legal or illegal aspects, the courts have refused to attribute the illegal acts of one associate to others in the group." Applying the courts' observations concerning prosecuting political conspiracies to investigating such conspiracies illustrates the shortcomings of such a basis for investigation. Reading conspiracy statutes literally, advocacy of illegal acts by persons in association justifies investigation. Moreover, commission of wholly legal overt acts, inextricably intertwined with the political process, could also justify investigation. A standard of probable cause of such activity Is easily met. Even if there is no specific intent to violate the law by one or all of the associates, conspiracy statutes permit intrusive investigation of First Amendment activity. Investigatory discretion to proceed under these statutes renders a "criminal standard" an illusory protection against future investigative abuses. The prosecutorial requirement of specific intent must be paralleled in the standard for investigation. Persons or groups should not be targeted for investi- gation unless there is reasonable suspicion that the substantive crime (rather than conspiracy) is about to be committed. For example, if the FBI obtains evidence of a specific threat of illegal activity by an association together with specific and articulable facts indicating that a member has purchased weapons the FBI would have reasonable suspicion that a criminal act was about to 1:.) committed. Rather than "any" overt act, only an overt act which would c(,)n, stitute an element of the substantive crime would justify reasonable suspi0ion of specific intent or imminence of illegal conduct," the same requirement Which the courts use to narrow the overbreadth of conspiracy prosecutions. This/stand- ard would protect First Amendment and Fourth Amendment rights - "iiiithout undermining the FBI's law enforcement efforts. The FBI would not be required to "sit on its hands" until a substantive crime occurred. The criminal standard allows a full investigation before the law has been violated. More important, it should not bar the Bureau from conducting preliminary inquiries using less intrusive techniques. A charter, providing for a Preliminary criminal inquiry, would allow the FBI to check its own records, conduct interviews, contact established sources of information, and use other such means to find out whether the basis for a full investigation exits." Without meeting a reasonable suspicion standard, the FBI could check out specific threats, credible allegations, incidents and the like. On the oth r hand, if the allegation is unfounded, or in the ease of a full investigation, if the substan- tive crime does not occur, the Investigation must terminate. Rather than hinder the Bureau, the standard would make the FBI more effective in carrying out its law enforcement responsibilities. Conspiracy pred- icated investigations lead to overbroad investigations which are a waste of resources on virtually fruitless attempts to prevent crime. On the assumption that prevention may be more effective if criminals are apprehended and prosecuted, the narrower criminal standard would cause the FBI to focus its resources on solving serious crime. In point of fact, the standard we propose is a statutory embodiment of the "quality versus quantity" approach that has caused the FBI to make an internal decision to focus investi- gations on persons or organizations who have committed serious or violent crimes for political or economic motive. Moreover, since most such criminal conspiracies come to the attention of the FBI after a crime has been committed, most investigative activity (within stricter procedures) that now go on would be permissible under the reasonable suspicion standard. The "primary" purpose is to investigate and to gather evidence of crime, the FBI might still prevent crime before it occurs. The FBI could "prevent a crime" reasonably believed to be about to occur, using traditional means such as arrest, warning potential victims, and the like. The statute, as we later suggest, must prohibit COINTELPRO activities. 92/4. See also Scales v. United States, 367 U.S. 203 (1961). cs, Brandenburg v. Ohio, 395 U.S. 444 (1969) in which the Court held that political groups are within their legal rights to advocate any course of action including the "use of force or law violation except where such advocacy is directed to inciting or producing imminent lawless action and is likely to incite or produce such action." Id. at 447. 04 This is essentially along the lines of the preliminary inquiry in the Justice Department Domestic Security Investigation Guidelines. March 10, 1976. Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 1RA-RDP80S01268A000500020027-8 The narrow standard we propose is required when First Amendment activities may be investigated. The same standard is probably not constitutionally re- quired in other criminal investigations. However, Fourth Amendment con- siderations remain; a criminal standard is therefore required. The public policy issues raised by organized crime "intelligence" investiga- tions are not unlike those raised by the debate over domestic security issues. Efforts to thwart organized crime have been largely ineffective. A recent GAO report concludes that $80 million tax dollars have been wasted by organized crime strike forces in the last decade.''' As in the domestic security area, a major problem has been the inability to define "organized crime." 96 Although differences between these two areas of investigative concern exist, important constitutional and practical similarities can also be noted. These similarities argue for a tight criminal standard governing organized crime in- vestigations, perhaps the same standard which governs First Amendment related activities. We look to the Justice Department and the FBI to explain why a uniform standard would not be practicable. SPECIAL PROCEDURES FOR FBI CRIMINAL INVESTIGATIONS As important as it is to set standards for initiating FBI criminal investiga- tions, the charter must also establish procedures to ensure that investigations are conducted so as to minimize interference with constitutional rights. Par- ticularly strict procedures are necessary in cases which involve investigations of persons or groups engaged in First Amendment activities. Whenever the FBI has reason to believe that a crime has been committed. pro- cedures are needed to prevent overbroad surveillance of lawful First Amend- ment activity which could "chill speech" and intrude on the privacy of political association. As Justice Powell stated the case for a special vigilance in this investigative area: "The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eaves- dropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society." The type of procedural safeguards required is illustrated by one example from the recent past: the FBI's live and a half year continuous investigation of the Institute for Policy Sttidies, a well-known left-liberal research organiza- tion in Washington, D.C. The Institute was the victim of both unregulated, unwarranted targeting and overbroad surveillance of lawful political activities resulting from other legitimate criminal investigations. The Institute's case indicates the need to mandate procedures to regulate every stage of the investiga- tive process. Based on discovery in a civil suit, we know that: The FBI initiated the IPS investigation in 1968 "to determine whether the activities of the Institute and its personnel were in violation of Title 18, United States Code (USC), Sections 2383-85, relating to rebellion and insurrection, seditious conspiracy, and advocacy of the overthrow of the Government." In other words it was an investigation initiated on the basis of criminal statutes but without any evidence. The investigation continued a full year before a "confidential source" advised that Marcus Reskin of the Institute had made all of the arrangements for a Pan- 05 Report to the Congress by the Comptroller General of the United States, War on Organized Crime: Falterng?Federal Strike Forces Not Getting the Job Done (GAO March 17, 1977). " Id. at : "There is no agreement on what organized crime is and consequently, on precisely whom or what the Government is fighting." One dangerous consequence of this should be noted. In several state inquiries into operations of state and local police "Organized Crime Intelligence Units" funded with LEA A funds, the major finding is that organized crime for economic gain has been ignored while the police conducted intelligence investigations, sometimes on massive scale, of organized "political activity" suspected to be illegal or subversive. E.g. Report on the Operations of the Intelligence Division From Chief of Police, District of Columbia To Mayor Walter E. Washington, March 7, 1975; Improper Police Intelligence Activities, A Report By the Extended March 1978 Cook County Grand Jury, October 10, 1975; Report to the Senate of Maryland By the Senate Investigating Committee Established Pursuant To Senate Resolution 1 and 151 of the 1975 Maryland General Assembly, December 31, 1975; Staff Report To Michigan House Civil Rights Committee Members Regarding Inquiry into House Bills 4923, 6408, and 6409 Dealing with Police Intelligence 0,,erations, September 1976: State Police Surveillance, Report of the N.Y. State Assembly Special Task Force on State Police Non Criminal Files, September 1977. 57 United States v. United States District Court, 407 U.S. 297, 314 (1972). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 132 African Conference in Algiers with money allegedly provided by IPS. Because the "tone and direction of the Conference was the result of significant Soviet influence" according to the confidential source, the investigation was continued on the basis of possible violation of 18 U.S.C. 2383-85. The dearth of evidence in this ease also indicates the license permitted by the conspiracy standard. By this time in 1969, the investigation was more than a preliminary one, since the FBI had infiltrated the Institute with informants. Further, because Richard Barnett of IPS publicly stated that he had visited Hanoi, the FBI determined that he might be acting in violation of Title 50, U.S.C. Sections 851- 58 pertaining to failure to register as an espionage agent of a foreign power. Neither the Title 18 or Title 50 investigations were ever reviewed by the Justice Department to determine whether the evidence amounted to a reasonable suspicion of a crime to warrant the investigation. The Justice Department did enter the picture in August of 1971 when As- sistant Attorney General Robert Mardian requested the FBI to resolve the "FBI investigation" which had "determined" that IPS had bought copies of the "McNamara Papers" in 1970. Eleven months after the "determination," in other words, the FBI was instructed to investigate IPS for possible violation of Title 18, U.S.C. Sections 792-98 relating to espionage. The Justice Department and FBI officials made no effort to "minimize" the investigation or make any determination that less intrusive techniques would have been sufficient to check out the allegations of illegal activity. Assuming arguendo that a criminal standard had been met, the only named targets of investigation were Marcus Raskin (Algiers Conference) and Richard Barnett (visiting Hanoi) ("buying" the Pentagon Papers) of the Institute. Yet the FBI collected information through intrusive surveillance of all IPS personnel and associates and all IPS political meetings. Extensive files were maintained. In 1971, the FBI investigation of the whereabouts of the Weather Under- ground resulted in a new avenue for investigation of IPS. On the basis that one member of the Underground "reportedly" obtained money from Arthur Waskow of IPS, prior to becoming a fugitive and that another fugitive allegedly "visited IPS offices," the FBI continued its total coverage of IPS and its political activities on the grounds that persons associated with IPS may have violated Title 18, U.S.C. Section 1071 relating to Concealing a Person from Arrest. No effort was made to prevent this legitimate criminal investigation from resulting in overbroad surveillance of IPS' First Amendment activity. In 1971, apparently because an IPS staff associate sponsored a conference which adopted views (in the Bureau's opinion) which "identified with Arab guerillas" and later requested Marcus Raskin of IPS to finance a trip of his to the Middle East to study the political situation, the FBI determined that IPS might be involved in possible violation of Title 18, Sections 1541-46 relating to violations of Passport and Visa Matters. The investigation continued. Between 1972 and 1974 no other "evidence" of illegal activity came to FBI attention but the investigation was not terminated until February 28,1974, after a civil lawsuit was filed by IPS charging illegal surveillance. Other than Assistant Attorney General Mardian's request in 1971 and an FBI Headquarters review in April 1973 (11 months before the termination of the investigation and almost five years after its commencement), there is no evidence of FBI supervision of the IPS investigation. Over the course of the investigation, the Bureau paid or directed over 50 informants to gather information on IPS, obtained confidential documents, personal mail (from trash covers), membership lists, research documents, plans of meetings, detailed reports of what went on at meetings, and built a massive file on the organization. , In February 1974, upon discontinuing the investigation, the FBI concluded after "careful analysis" that there "was insufficient evidence to support prosecu- tion of IPS leaders or members under existing Federal statutes." The U.S. Attorney's Office was never involved. The Justice Department and the FBI continue to defend the conduct of this investigation as legal and propene' The charter must include requirements for procedural safeguards which ensure: (1) accountability for the authorization and conduct of investigations; (2) that 98Response by Defendant Clarence M. Kelley To Interrogatory No. 4 of Plaintiff's Second Set of Interrogatories To Federal Bureau of Investigaff on, January 23, 1978. Institute for Policy Studies v. Mitchell (Civ. Action No. 74-316) (D.C.D.). Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-ROP80S01268A000500020027-8 no investigation is initiated without statutory basis; (3) that criminal investiga- tions do not become a pretext for open-ended intelligence investigations; (4) that the least intrusive technique necessary to obtain evidence is emp.oyed ; (5) that investigations are not overbroad; and (6) that privacy is not violated by unnecessary maintenance and d"ssemination of information. Special provisions to achieve these ends are laid out in A Law to Control the FBI. They include (1) requirements for written authorization and certifications; (2) time limits for investigations; (3) Justice Department review, authorization. and supervision of continuing investigations; (4) special authorization and Justice Department mandated procedures to govern the use of intrusive tech- niques; and (5) requ!rements that minimization procedures be established. These provisions are not detailed regulations, which the Justice Department and the Bureau seem to fear. Rather they simply mandate that the Justice Department established procedures according to statutory criteria. They set appropriate limits on administrative discretion. All of these procedures should apply in criminal cases involving First Amend- ment activity. But many protect against Fourth Amendment privacy violations and should apply to all criminal investigations. WARRANTS FOR INTRUSIVE TECHNIQUE'S Special procedures to minimize FBI interference with First Amendment rights must be reinforced by a warrant requirement for criminal investigative tech- niques which may intrude on rights of political privacy. For the same reason that a warrant is required to conduct a wiretap, it should be used to guide and restrict the use of informants and searches of private records. The target of each of these techniques is speech, albeit different forms, unit the only way to ensure that the purpose and conduct of the search are limited to the seizure of criminal evidence is to require prior judicial approval. Nowhere is tile need for judicial supervision greater than in cases involving domestic security, where First and Fourth Amendment rights are simultaneously jeopardized. As tile Supreme Court pointed out in Keith: National security cases . . . often reflect a convergence of First and Fourth Amendment values not present in cases of 'ordinary' crime. Though the investi- gative ?duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. . . . History abundantly documents the tendency of government?however benevolent and benign its mo- tives?to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs." The First Amendment, of course, guarantees freedom of speech, of the press, of assembly and of the right to petition for redress of grievances. The Supreme Court has often observed that the effective exercise of these rights requires as- sociational privacy. Citizens must be able to meet and associate privately to discuss their political beliefs and plans and to consider what lawful actions to take to promote their ideas. Records relating to these associational activities are protected unless they contain evidence of crime. The right of associational privacy was firinly established by the Supreme Court in repelling the effort of the State of Alabama to compel disclosure by the NAACP of its membership lists. NAACP v. Alabama, 357 U.S. 449 (1958). It was sustained and emphasized most recently by the Court in its decision modify- ing certain intrusive disclosure provisions of the Federal Election Campaign I% et. Buckley v. Valco, 424 U.S. 1 (1976). As Chief Justice Burger pointed out in his concurring opinion: [S]ecrecy and privacy as to political preferences and convictions are funda- mental in a free society. . . . This Court has seen to it that governmental power cannot be used to force a citizen to disclose his private affiliations, even without a record reflecting any systemic harassment or retaliation. . . . For one it is too late in the day to recognize an ill-defined 'public interest' to breach the his- toric safeguards guaranteed by the First Amendment.' If the First Amendment prevents the government from compelling disclosure of information related to lawful political and other associational activity, it must also reouire restraints to be imposed on the use of intrusive investigative tech- 00407 U.S. at 306. '??424 U.S. at 20, Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 200514/23 : CIA-RDP80S01268A000500020027-8 niques to gather such information. In fact, it is for this reason that the re- straint of a warranted procedure has been imposed upon government wiretapping. Surely the First Amendment is no less violated if the FBI obtains a copy of the membership or contributor lists of the Socialist Workers Party through the use of paid informers or the search of the Party's bank records than if the Party's membership and contributor information is obtained through a wiretap or as a result of the campaign reform law. Indeed, the First Amendment violation is compounded when it results from an intrusive search which also raises Fourth Amendment questions. This is why we believe that a warrant requirement should be imposed on the use of informers and record searches in criminal investigations. I. Informers The FBI record on the use of paid informers in political groups shows a mas- sive violation of First Amendment rights. Although the worst abuses in the last three decades occurred in the undercover provocations of the COINTELPRO and COMINFIL programs, the Church Committee documented many examples of routine informer activities which cut deeply into associational privacy. The Committee's Final Report points out that during the 1904-76 period : The FBI expanded its use of informers for gathering intelligence about do- mestic political groups, sometimes upon the urging of the Attorney General. No significant limits were placed upon the kind of political or personal information collected by informers, recorded in FBI files, and often disseminat ed out side the Bureau.' These vast informer operations were typified by the following : By 1972, 7,402 "ghetto informants" (e.g., "the proprietor of a candy store or barber shop") had been put in place as FBI "listening posts" to provide infor- mation about "racial activities [and] identify extremists" passing through or locating in the ghetto area; 102 In 19(14 the FBI had infiltrated the Communist Party USA at: a ratio of one agent for every 5.7 members ;103 In 1970 FBI Director Hoover lifted restrictions against recruiting 18 to 21 year old informers, and field officers were urged to take advantage of this "tre- mendous opportunity" to expand coverage of "New Left collective, communes and staffs of underground newspapers ;" 101 Between 1966 and 1976 the Chicago FBI office paid more than $2.5 million to 5,145 informants and investigated or opened files on 27,900 organizations and individuals ; 105 The General Accounting Office reports that 43% of all domestic security in- vestigations are initiated on the basis of information provided by an FBI in- former?a percentage almost three times higher than the next most commonly used source for opening an investigation; 103 As recently as Fiscal Year 1976 the FBI budget allocates $7,401,000 for its intelligence informant programs?more than twice the sum for organized crime informers.' These statistics reveal the magnitude of the informer issue and its impact on associational privacy. But the issue is even larger than the statistics indicate. Informers are at once the most complex, comprehensive and unpredictable in- vestigative tools that the Bureau employs. While the informer is, as the Church Committee pointed out, a "vacuum cleaner" for information, the information is often distorted or inaccurate and in this respect is far less reliable than in- formation obtained by a wiretap. Furthermore, an informer who pretends to be a member of a political group cannot simply gather information. lie or she must participate actively in the decisionmaking of the organization, taking stands on issues and seeking to enhance credibility by influencing the positions the or- ganization takes and the actions it engages in. Inevitably, as Alan Dershowitz has pointed out in his penetrating account of a Jewish Defense League murder ease in which his client turned out to be an informer, the informer corrupts the organization: 101 Intelligence Activities and the Rights of Americans, Final Report of the Select Com- mittee to Study Government Operations with Respect to Intelligence Activities, United States Senate, 94th Cong., 2d Sess., BK. II, p. 68 ['Church Report"]. 103 Id., p. 75. "3 Marwick, "The Government Informer," First Principles, March 1977, p. 3. Church Report, P. 78. In Washington Post, April 9, 1978, p. A3. in 1976 GAO FBI Audit, Note 5, supra, p. 105. 107 Supplementary Detailed Staff Reports on Intelligence A ctivi ties and, the Rights of Americans, Church Committee Report, BK, III, p. 229. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-MP80S01268A000500020027-8 Violence inevitably stems from a police system that recruits (and educates) secret informers and provocateurs within a radical movement. The recruited agent, almost by definition, is an unstable, psychotic, or psychopathic individual. His temptation to improve his status by engaging in or encouraging violence is almost irresistable. This is what touches off the fatal chain reaction. Violence feeds on violence and the question of who is informer, who is terrorist, becomes confused beyond comprehension even by the individual involved.m In our view, the case for informer warrants is overwhelming. While it is true that the Supreme Court has held that an individual has no independent Fourth Amendment right to be free from warrantless informer surveillance, Hoffa v. United States, 385 U.S. 293 (1966), the Court has never directly addressed the question of what restrictions may be constitutionally required when informers are used to conduct surveillance of private political or other associational activ- ities. The Court has intimated, however, that here the balance would shift and a warrant would be required. As Justice White put it in his opinion in United States v. White, 401 U.S. 745, 752 (1971), upholding the legality of a "wired informer" targeted at an individual, "our problem, in terms of the principle an- nounced in Katz v. United States, 389, U.S. 397 (1967), is what expectations of privacy are constitutionally 'justifiable'?what expectations the Fourth Amend- ment will protect in the absence of a warrant." Since an expectation of asso- ciational privacy is constitutionally justifiable, the First and Fourth Amendments converge to require a warrant for the use of informers in criminal investigations of groups. To sum up, Congress should enact a warrant procedure similar to Title III of the Omnibus Criminal Control and Safe Streets Act for the use of paid and di- rected undercover agents by the FBI to investigate criminal acts by members of a group."' No warrants should be issued authorizing the infiltration of political organizations not suspected of engaging in specific criminal conduct. This new procedure is necessary to protect First as well as Fourth Amendment rights, and is urgently required to ensure that political freedom will not again be trampled upon by FBI domestic security activities. 2. Records searches Another form of intrusive search which raises both First and Fourth Amend- ment questions is the warrantless inspection of private records. Most people be- lieve in the privacy of their personal tax records, bank records, employment records and other recorded "third party information" about how they lead their lives. This expectation of privacy has often proved to be unjustified, although in constitutional terms it would certainly appear to be justifiable. As the California Supreme Court recently pointed out in invalidating a warrantless search of copies of cancelled personal checks in the custody of a bank: "For all practical purposes, the disclosure by individuals or business firms of their financial records to a bank is not entirely willful since it is impossible to participate in the economic life of contemporary society without maintaining a bank account. In the course of such dealings the depositor reveals many aspects of his personal affairs, opinions, habits, associations. Indeed the totality of bank records proildes a virtual current biography. The development of photocopying machines, electronic computers and other sophisticated instruments have ac- celerated the ability of government to intrude into areas which a person normally chooses to exclude from prying eyes and inquisitive minds. Consequently, the judicial interpretations of the reach of the Fourth Amendment constitutional protection of individual privacy must keep pace with the perils created by these new devices." 11.0 Informal investigative searches of private records have become increasingly routine in recent years. With the arrival of new computerized storage systems and methods of facilitating access to and exchange of computerized information (e.g., the bank industry's fledgling "electronic funds transfer" system), govern- ment investigations have turned increasingly to private records: .At the same time, legislation such as the Bank Secrecy Act of 1970 has facilitated record searching by requiring private records to be retained for longer periods of time. In short, a revolution in information technology has far outstripped the expec- tations people have about the privacy of their personal records. 108 Dershowitz, et a/., "The IDL Murder Case: The Informer Was Our Own Client," Civil Liberties Review, April/May 1976, p. 59. 100 Burrows v. Superior Court, 13 Cal. 3d 238, 243-44, 529 P. 2d 590, 593-96 (1974). no Marin County Independent Journal, April 20, 1972, P. 1. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 136 There are many recent examples of informal access to bank records. Congres- sional investigations and ACLU lawsuits have uncovered the following. A California supporter of radical causes discovered that his checking account statement had been reviewed by FBI agents when an internal bank memo was mistakenly sent to him which read: "This memo is to authorize you to read checks to the FBI before sending the statement to the customer."'" As part of a series of FBI domestic security investigations, the bank accounts of Jane Fonda, Dr. Benjamin Spock, Floyd McKissick and other anti-war and civil rights activities were inspected without legal process; "2 A memo to FBI field offices from Director Hoover in 1968 stated: "there is a need to compile in a single investigative report a clear-cut picture of the entire New Left Movement which will identify its . . . sources of funds. . ." The FBI inspected and copied the checks of civil rights activists in Philadel- phia and Detroit to make a record of their professional activities, including, in one case, a lawyer-client relationship."' Records searches are an important and permissible criminal investigative tech- nique. Nevertheless, they can intrude substantially on associational privacy and therefore raise the same First and Fourth Amendment issues that arise in the case of informer searches. Although the Supreme Court has held that a warrant procedure is not constitutionally required for bank records searches, United states v. Miller, 96 S.Ct. 1619 (1976), statutory guidance is clearly needed in this area. We propose several principles as a point of departure. First, a person's privacy interest in bank, tax, credit and employment records should be recognized by statute. Second, a person's standing to-assert his or her privacy rights over rec- ords in the hands of third parties should be conferred by statute, on the same basis as if the records were in his or her personal possession. Third, government investigators should not be able to obtain access to the records without legal proc- ess--i.e. an administrative summons, subpoena or search warrant issued on a showing appropriate to the method of process. Fourth, in all instances except the issuance of a search warrant, the record subject should be given prior notice of the proposed inspection and a reasonable time to assert his or her rights before disclosure. These proposals are set forth in more detail in Title II of H.R. 6051, and they parallel various other pending record privacy bills. There is a mystique about the use of record searches in law enforcement. The trail of paper and computer tape is said to be somehow different from the trail of physical evidence so much so that the "old-fashioned" rules do not apply. Though there has been much talk about the need for broad search powers to fight organized crime and white collar crime, the restriction of investigative methods within recognized constitutional boundaries would not prevent vigorous law en- forcement efforts against these types of criminal violations. Where the impact would be the greatest is where the abuses have been the greatest in the use of secret, unrestricted governmental access to private records for the collection of political intelligence; access to the telephone toll records of newspaper reporters to pinpoint the sources of politically embarrassing "inside stories ;" access to the bank records of antiwar and civil rights groups to identify their contributors access to the records of political opponents in election campaigns or outspoken critics of government policies, or indeed anyone at all, for the intelligence gatherers have long had a completely free hand. Elimination of these abuses iM the purpose of the procedure we are proposing. STATUTORY PROHIBITIONS REQUIRED The statutory charter should include two flat prohibitions: 1. The FBI should not be permitted to investigate any person or group solely on the basis of First Amendment activities." .11. Hearings of the Subcommittee on Financial Institutions. Committee on Banking, Housing and Urban Affairs. United States Senate, 92d Cong. 2d Sess. (1972), at 136-37. 112 Church Report, BK, VI, at 667-75. Church Report, Vol. 6, at 669-75. 114 Jabara v. Kelley, C.A. No. 39065 (RD. Mich.) ; Kenyatta v. Kelley, C.A. No. 71-2595 (ED. Pa.). n5 Such a proviso has been added to S. 1566, the Foreign Intelligence Surveillance Act of 1977. See Report To Accompany S. 1566 from Senate Committee On Intelligence (Report No. 95-701, 95th Cong., 2d Sess. March 14,1978) p. 28-30. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RIAp80S01268A000500020027-8 2. The Charter must ban preventive action and COINTELPRO-type To enforce these prohibitions the charter should establish criminal penaltie,s for their international violation and a civil cause of action for victims. OVERSIGHT OF THE FBI The charters should establish effective oversight mechanisms. Within the Justice Department, the Attorney General should be required to ensure Depart- ment and Bureau compliance with the law and to conduct a periodic review of agency investigative activities.' The Attorney General must have full and com- plete access to Bureau files.' Within the Congress, the Judiciary Committees should also have access to all FBI files under appropriate privacy safeguards and should be required to con- duct prior review of all procedures designed to impliment the legislation. The Attorney General shall be required to report FBI violations of charter provisions which violate constitutional rights to the committees. Public oversight is also necessary and requires the statute to mandate that all investigatory guidelines and regulations be published in accordance with the Ad- ministrative Practices Act.' Thank you for the opportunity to appear before this committee. 116 While Attorney General Edward Levi struck from the Justice Department Guidelines all reference to "preventive action" because of congressional criticism, he did not rule out authorizing such activities on a case by ease basis. In testimony before this Committee. FBI Director William Webster has stated that in some cases the FBI must take preventive action measures. (April 20, 1978 Testimony). It is critical to insure that this does not include inciting dissension, dissemination false or anonymous information to discredit per- sons or groups, or any of the other "preventive" measures engaged in by the FBI in its COINTELPRO operations. Ili According to the GAO, the Justice Department has deactivated the high level com- mittee that reviewed domestic security investigations. Such a committee must be mandated by the Charter. Followup GAO FBI Audit, Note 18 supra, p. 6: "(T)he Justice Department's Investigations Review Unit, which is responsible for providing policy guidance on the FBI's domestic intelligence operations, is currently without staff and its future undecided." us Until recently the FBI never allowed the Justice Department or even the Attorney General to have access to its case information, even though the FBI is under the supervi- sion of the Justice Department. A statute must mandate this access. See Development of FBI Domestic Intelligence Investigations, note 10 supra for a running account of this refusal or failure to disclose. I" Congress must mandate that it be kept "fully and currently" informed about FBI activities. An investigation continues into the failure of the FBI to turn over all flies relating to break-ins after 1966. Washington Post, April 22, 1978. The GAO has never been given complete access to FBI files, and has had to work with summaries. Part of the cur- rent investigation includes possible misleading information supplied to the GAO for its audit. ,20 Today the Domestic Security Guidelines are published. On the other hand the Foreign Counterintelligence Guidelines are secret and withheld under the Freedom of Information Act Exemptions. Secret directives have been the cause of much overreaching. Standards should be public and subject to criticism and possible revision by the Justice Department. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 APPENDIX ADDITIONAL SUBMISSIONS FOR THE RECORD ASSISTAN T TTORNEV GENERAL LEGISL A TIV E AFFAIRS Department of 3.1ustirt as4ingtan, D. Qt. 211530 May 19, 1978 Mr. Michael Glaser Printing & Editing Assistant Subcommittee on Antitrust United States Senate Room A-517 Washington, D. C. 20510 Dear Mr. Glaser: In the course of Attorney General Bell's testimony on a legislative charter for the Federal Bureau of Investigation on April 20, Senator Kennedy requested that the Department supply materials indicating the investigative standards used by other agencies of the Executive Branch. Enclosed are materials provided by a number of agencies in response to Senator Kennedy's request; this material is not exhaus- tive but it indicates the nature of the standards used. Sin7ply, Patricia M. Wald Assistant Attorney General Office of Legislative Affairs (139) Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 140 I A CCESS Reports/April 18, 1978 Page '3 ,t violatek another person's pAvacy, disclose a source's identit or hamper future investigati4e capabilities. Iniaddition, the GAO's auditors concluded that courts have Sometimes im- posed their own. deadlines on FBINrequest processing. This disrupts the FBI's ability to handle other requests efficiently, Lowe said.', - - - , ... In ithe Rosenberg case, for example, the FBI was forced to use \73 full- time and 21 part-time employees between August and November 1975 to\meet a'-'-' court-imposed deadline. Lowe said, "Ire people represented over half of the personnel then assikned to the branch., The diversion of these resources was , the major reason for\the rapid increase\in the backlog at the time. '..The back- log roselby 2,000 requests during this three-month period." : A year ago, the bIreau began its Pro ect Onslaught, which was de.igned to reduce the backlog, wh ch by then had grows to almost 8,000 cases. IA addi- tion tots other FOIA 'and Privacy Act staff, the bureau used as many s 282 - special gents at a time\and spent $2.8-millon to attack the growing backlog. Although' it did not eliminate it, the projectsucceeded in reducing i from . . 7,566 to 4,910 requests in five months. - '- Lowe said that unless. the law is amended o give the FBI special on-. .- . sideratfon, the bureau wil fall behind again with answering requests. 'Tte,. GAO estimated that requestwwould be about 20,500 in 1978 and 23,400 i, 9. Lowe saci the GAO recommended that the FBI be required to acknowledge aire- quest igthin 10 days and that it provide a full response within an additdonall- 30 days.4, In exceptional circumstances it should give a firm date when it ex- pects to-complete its response. A 1 . A \ According to the report, additional improvements are also needed intFBI i management of its information processing. It conctuded that effective idple- mentation of the acts is hinderdd by, uncertainties'toncerning what constitutes an unWairanted invasion of persohal privacy, what a\confidential source ill and , how such information should be made public in pending investigations. ' G./61) therefore recommended th t the attorney gejtalAireci the Justi e Departmenes'Office of Privacy and Information Appeal: to provide. all depart- ment components with its decisions' so they can be used in future cases; t. up- date its own processing guidelines and give them to all department components; and make random checks on FBI information processingf7 public release. ' l agents to process requests. . Exemptions relied tpon as the basis Or The GAO also suggested that tjreau should use more analysts and f wer specia withholding information should be marked on each document, the auditors recom- mended and the Justice Department an its components should be required tol, give such additional information as number of pages in a file and number denied to persons who make FOIA requests. A . NEW REGULATIONS MARE IT HARDER TO OPEN MAIL -- EXCEPT IN PRISON Government opening and reading of private mail has been made more restric- tive in most instances by several recent policy changes and new Federal agency regulations. However, a new Postal Service rule explicitly authorizes opening and censoring prison inmates' mail. Mail security regulations of the U.S. Postal Service, printed in the April Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 141 Page 4 ACCESS Reports/April 18, 1978 5 Fetleral Register, permit prison authorities to read and censor incoming mail .addressed to prisoners. Although prison officials have long done just that, the Postal Service concluded that its absence of regulations seemed to imply that the activity was prohibited. If an inmate consents to receive mail at the prison, authorities can censor it. If he does not consent, prison officials can either deliver the mail un- opened or return it to the Post Office marked, "Refused." In other areas, however, new regulations at the Postal Service and the Customs Service place greater limitations on warrantless mail openings, and in most cases forbid reading of contents in opened letters. In a related action the Defense Department announced the end of a program in which suspicious letter mail from servicemen overseas was referred to the department by the Customs Service. - In general, the Postal Service regulations prohibit any opening of sealed mail without a search warrant, "even though such mail may be believed to con- tain criminal or otherwise nonmallable matter or evidence of the commission of a crime." However, some categories of personal correspondence may be sent as unsealed mail postage free, and the regulations permit opening such mail to determine its eligibility. Even though this mail may be opened, strong provisions pro- tect the privacy of the sender or addressee and the confidentiality of the con- tents of any correspondence. Included in this category are Braille letters and sound recordings for the blind and letters of certain other handicapped persons. For regular categories of sealed mail, postal employees would be able to open and detain letters only in a dead mail office in accordance with dead mail regulations, with the consent of the sender or addressee, or to execute a valid search warrant. Postal rules also permit authorized agents of the Customs Service or the Agriculture Department to open certain categories of mail. Customs Service. In conjunction with the Postal regulations, Customs r( /5ezic::iemta:27:: elordnfzzl=!ustoms officials to open1ri11istng=ict a The regulations, which go into effect May 8, prohibit warrantless openings unless letters are suspected of containing contraband. .As a matter of policy, the Customs service also will refuse to give mail to other agencies without a warrant. PLUS PUBLICATIONS, INC. PUblishen Ray Henry Edllor-In?Ohletr Marketing/Production Direetim: Edit ri I Di ? Richard C. Henry Use this order form to subscribe to or renew ACCESS REPORTS AccessReports,P.O.Boa 64014, BaltinterePAL 21284 Walks E. McClain. Jr. (Public An airs) Controller: Hellen. Seld o I'd like to subscribe for one year (24 issues)?$127 Warren Rogers (Politics) Assistant to Publishers Donna Chin 0 Two years-.$240 Wayne M. Welch (Social Welfare) Administrative Aeelstante: 0 Three years ?$332 Senior Ninon,: Gretchen L. Con ey. Jefferson G. Hills. Susan U. Reinirel. 0 Renew my subscription for 0 1 yA-ar 0 2 years 0 3 years Karen J. Fling, Joyce Lynn. Dominique M. Simon Payment enclosed 0 Bill me 0 J. Paler Segall Associate Editors: Edward I. Levrie Editorial Interne: Robert V. Plaid. Rhonda J. MoMilkor. Phyllis Myers. Alison J. lapeline Name Title Janet PA. Walker Production Editors: Gayle S. Beyer. Barbara Posey Address Editorial Delco,, 2626 Pennsylvania Ave., N.W./Washington, D. C. 20037 City State Zip PlusPublkationsdAwbnsbesthwabhwwklynernlefterm L... kx.55Remosm,....rim.maro...Ni..14.QmpaignN.u015u2Daycw,.&ao.044!Eiezmi.w.11-wratio. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 142 nw.ta neputt.wmpt t,1 to, two Page 5 Mail privacy and openings by the Customs Service have been the focus, of Controversy for some time. Last June, the Supreme Court ruled in U.S. v. Ramsey, 97 S. Ct. 1972, that the Customs Service acted constitutionally in open- ing without a warrant mail sent from Thailand. The service said It had reason- able cause to believe that the letters contained drugs. Although the Supreme Court said such openings were authorized by law, it did not rule.on the consti- tutionality or legality of reading correspondence without a warrant. .L On July 28, 1977, the Customs Service published proposed regulations to bring the agency's policies into line with the Ramsey decision, and to cover the unresolved area of reading correspondence.' - In addition, last year the SubcomMittee on Government Information and In- dividual Rights of the House Government Operations Committee held hearings Lw: the problem. Among the subcommittee's conclusions,was one that_mail opening presented questions.of privacy invasion which should be settled by legislation:. "Any in- trusion into the right of privacy in correspondence should be structured as an exception to that right; the right should not be granted merely because other, considerations permit. Any such exceptions should be expressly passed upon by the Congress." - Congressional sources said such legislation is being considered, but con- ceded that any final action by Congress is unlikel this year. . A spokesman for the Customs Service said the subcommittee's hearings and recommendations and comments received from the public went a long way toward setting the tone of the final regulations.. He added that the regulations would govern agency activity until such time as legislation is passed. . . . _ The final regulations are somewhat more restrictive than the proposed?. guidelines, the agency spokesman said. In the proposed rules, Customs would ' have been able to turn over virtually all mail to other agencies for follow- up investigations. . According to the final regulations, correspondence in sealed letter class mail cannot be turned over to any other agency without a warrant. However, packages that contain certain goods such as foods, drugs, cosmetics and haz- ardous substances may be given to agencies that have jurisdiction over such-- items for examination and clearance before being sent on to the addressee. Mail can also be turned over to the Postal Service for controlled delivery without a warrant to agencies such as the Drug Enforcement Administration for further investigation. Another change concerns the opening of mail in the Virgin Islands, con- sidered outside the United States for customs matters but inside for postal activities. In the proposed regulations, Customs would have been allowed to open mail arriving in the Virgin Islands ILTithe United States. The final regulations appear to prohibit such openings by the Customs Service Without a judicial search warrant or the consent of the sender or addressee, even if there is reason to believe the letters contain contraband. Both the Postal Service and the Customs Service regulations require that a postal employee must be present whenever a Customs official opens mail. Re- cent agreements by the two agencies set forth the procedures for implementing this provision. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : C1tRDP80S01268A000500020027-8 Page 6 ACCESS Reports/April 18, 1978 - According to the agreement, public confidence that Customs is carrying out its pledge to."safeguard the privacy of correspondence" can be enhanced "by providing for independent observation of customs sealed letter class mail open- ing and examination by a responsible postal employee." Mail can be opened by Customs only in a facility jointly designated by the two agencies for that purpose. No mail can be opened by Customs unless a postal employee is present. After a letter has been opened, the contents cannot by examined "unless a responsible postal employee is present to observe the exami- nation, or measures are taken to prevent the contents of the mail item which appear to be correspondence from being exposed to view." In its explanation of the final regulations, published in the April 6 Fed- eral Register. the Customs Service said it "is acutely aware of the sanctity of privacy in correspondence. At the same time, Customs must perform its obliga- tions-to examine all importations, whether by mail or otherwise. The Customs Service feels that this document balances those interests in a satisfactory manner." Department of Defense. In a related action, the Defense Departmentan- flounced last month that as of April 30 it would terminate its "military suspect letter class referral program." Under the program, the Defense Department received approximately 445 pieces of mail a month from the Customs Service. Customs had seized the letters from servicemen stationed overseas on suspicion that they contained contraband. Up to August 1976, Customs also gave the Department correspondence, a department witness told the Government-Information and Individual Rights Subcommittee. Brig. Gen. Nathaniel R. Thompson wrote the Customs Service that "the value . of the program to DOD was minimal and did not warrant continuation." He said examination of mail by Customs seemed adequate to handle any problems that might exist with respect to mailing of contraband by servicemen abroad. . SUPREME COURT BLOCKS ACCESS TO SIRIGA'S WHITE HOUSE TAPES Access to copies of White House tapes in the possession of U.S. District . Court Judge John Sirica has been blocked by the Supreme Court. In a 7-2 decision on April 18, the court refused to allow a recording company and the three major television networks to have access to the tapes, which were played in court during the Watergate cover-up trial of several aides to former President Nixon. Approximately 20 hours of tapes were played in the trials. The networks wanted to distribute copies of them to the general public through the National Archives. The court, in an opinion delivered by Justice Lewis Powell, said the common-law right of access to court records was not absolute, but rather was at the discretion of the trial judge. . Moreover, the court reasoned, the public had an alternate means of access to the tapes. Under the Presidential Recordings and Materials Preservation ? Act, the General Services Administration was directed to take possession of all Presidential materials, including tapes, and screen them for eventual availa- bility to the public. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 144 Deportment of the TREASURY 4.-7,-.5.*AniRreeAVW7ler,16 MS:-:SERVIC 2028 82475::'. FOR RELEASE UPON RECEIPT April 20, 1978 CUSTOMS TIGHTENS REGULATIONS FOR MAIL INSPECTIONS The United States Customs Service announced April 6 that a new and tightened regulation governing the examination of letter class mail will go into effect in May, 1978, thirty dayS after its publication in the Federal Register. The policy statement accompanying the, new. regulation points the way . toward nationwide uniformity in the examination of international mail by stating the most common circumstances that constitute "reasonable cause to suspect" that contraband or merchandise is contained within the letter. The regulation prohibits Customs officers from reading the contents of any correspondence they discover in the course of the examination without first obtaining a search warrant or written authorization. Likewise, a warrant must be obtained before Customs can transfer correspondence to any other law enforcement agency. All openings of letter class mail must be carried on by Customs officers or employees in the presence of a Post Office Department official. , Among the circumstances considered "reasonable cause to suspect" are: (more) Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : R-RDP80S01268A000500020027-8 * the alerting of a detector dog trained to uncover either narcotics or explosives; * the X-ray detection of merchandise or contraband in the letter; * the weight, shape, feel, or sound of an international letter class item which indicates merchandise or contraband is present; * information from reliable sources which indicates that an identifiable mail article contains merchandise or contraband; * special insurance on a piece of letter class mail; * unusual packaging; and/or * a fictitious addressee. Notice of the amendment was published in the Federal Register of April 6, 1978 on page 14451. FOR FURTHER INFORMATION CONTACT: Alan Bernstein (202) 566-5286 PIN 4-06 A:PI: ABB xADM 9-03 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 146 14451 [4810-22] ? Till. 19?Custonts DuHos CHAPTER I?UNITED STATES CUS- TOMS SERVICE, DEPARTMENT OF THE TREASURY tT.D. 78-1021 PART 145?MAIL IMPORTATIONS Examination of Sealed' Letter Class ' rMall by Customs Officials ? AGENCY: United States Customs Ser- vice, Department of the Treasury. ACTION: Final rule and policy state- ment. SUMMARY: This document contains an amendment to the Customs Regu- lations and a policy statement relating to the examination of seated letter class mail by Customs officials. The amendment and policy statement are being made because ole recent United States Supreme Court decision which upheld the right of Customs official., to examine sealed letter class malt in certain circumstances. It Is intended that the amendment and policy state- ment win offer guidance as to when and how Customs will open and exam- ine sealed letter class mail. EFFECTIVE DATE: May 8,1978. FOR FURTHER INFORMATION CONTACT: Stuart P. Seidel, Office of the Chief Counsel, U.S. Customs Service, 1301 Constitution Avenue NW.. Washing- - ton, D.C. 20229, 202-568-5476. SUPPLEMENTARY INFORMATION: . . BACKGROUND ? Section 145.3 of the Customs Regu- lations (19 CFR 145.3) provides that no Customs officer or employee shall , read, or authorize or allow any other person to read, any correspondence contained in sealed letter mall unless a search warrant has been obtained. In United States v. Ramsey, 97 S. Ck 1972 (1877), the U.S. Supreme Court af- firmed the right of Customs officials to open and examine sealed letter class mail without first obtaining a search warrant under certain circum- stances. In the Ramsey case, a Customs of 11- car Inspecting a sack of incoming in- ternational mail from Thailand spot- ted eight bulky envelopes winch he be- lieved might contain merchandise. AU of the envelopes appeared to have been typed on the some typewriter. were addressed to different locations In Washington, D.C., felt as if there were something other than plain paper inside, weighed three to six times the normal weight of s letter, and came from a country which Is a known source of narcotics. Upon in- Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 MA-RDP80S01268A000500020027-8 spection, the envelopes were discov- emd to contain heroin. The dpening of these letters without first obtaining a search warrant was challenged as unconstitutional. The Supreme Court rejected this assertion and held constitutional the statute, P.S. 3061 119 U.S.C. 482), which autho- rizes the opening of envelopes coming into the United States with respect to which a Customs official may have reasonable cause to suspect there is merchandise which is subject to duty or which is imported contrary to law. The Court also found that the circum- stances under which the letters were opened provided "reasonable 'cause to suspect' that there was merchandise or contraband in the envelopes." ? ? The Commissioner of Customs deter- mined that, inasmuch as 1145.3 of the Customs Regulations was silent as to when the opening of sealed letter class mail is authorized, that section should be amended to reflect the statutory standards as interpreted in the Ramsey case and the existing Customs practice on the subject. Therefore, on July 28, 1977, a notice of proposed ru- lemaking which would amend 1 145.3 was published in the FEDERAL REGISTER (42 FR 38393). The notice proposed to add to 1145.3 a provision that no Cus- toms officer or employee would open sealed letter class mall which appeared to contain only correspondence unless a search warrant had been obtained in advance of the opening. It also pro- posed to add a provision that Customs Officers or employees could open and examine sealed letter mail -which ap- peared to contain matter in addition to, or other than, correspondence, pro- vided they had reasonable cause to suspect the presence of merchandise or contraband. The notice also contained a proposed policy statement which set forth the policies which the Customs Service would follow in examining sealed letter class mall. The policy statement supplemented the regulations by pro- viding guidance as to the circum- stances which constitute reasonable cause to suspect that merchandise or contraband Is contained in sealed letter class mall. Interested parties were given until September 26, 1977. to submit data, views, or arguments in regard to the proposals. Several comments were re- ceived in response to the proposals. A discussion of the substantive com- ments follows: DISCUSSION OF SUBSTANTIVE COMMENTS WHAT MAIL IS SUBJECT TO CUSTOMS EXAMINATION I. International transit mail One Comment pointed out that the pro- posed rule and policy statenment could be read so as to subject interna- tional transit mail to Customs exami- nation. International transit mail is that mail which passes through the United States but Is not to be deliv- ered therein. This point is well taken. Section 145.2 therefore has been amended to make it clear that mall must be destined for delivery in the Customs territory of the United States or in the U.S. Virgin Islands to be con- sidered subject to Customs examina- tion. 2. Virgin Islands mail. In one of the comments submitted, the authority of the Customs Service to Open first class mail arriving in the U.S. Virgin Islands from the United States was Ques- tioned. It was asserted that such open- ing could not be done merely upon finding a reasonable cause because of 39 U.S.C. 3623(d), which provides that first class mail "of domestic origin" shall not be opened unless authorized by a search warrant or by the address- ee, or except by the Postal Service Co determine the delivery address. While maintaining that it is autho- rized to examine all mail coming into the U.S. ?Virgin Islands from the Cus- toms territory ' of the United States, the Customs Service agrees that the legal authority to open first class mail - merely upon the finding of reasonable cause to suspect the presence of mer- chandise or contraband Is uncertain. For this reason, and because the inci- dence of openings of first class mall ar- riving in the U.S. Virgin Islands from the Customs territory of the United States would be relatively low, the Customs Service will ' refrain from opening such mail unless authorized to do so. Section 145.3 therefore had been amended to provide for this ex- ception. 9. Only at 'bonder"? One comment asserted that without a search war- rant. Customs has no authority to ex- amine any mail wlaich has already Passed through an exchange office. This contention is based on the theory that the "border search" exception to the Fourth Amendment prohibition against tarrantless searches ceases to exist after mail passes through an ex- change office. This contention cannot be accepted. The Customs Service relies on 19 U.S.C: 1499 and United States v. Ring, 517 9'.2d 350 (5th Cir. 1975), as author- ity for the proposition that Customs may examine mail after it has passed through an exchange office but has not been delivered to the addressee, at least when Customs did not inspect the mail previously. In the court case, envelopes had entered the United States at San Francisco and had been routed to Birmingham, Ala.. without having been inspected. The court found Customs examination and open- ing of the envelopes in Birmingham, upon reasonable cause to suspect the _presence of contraband, to be lawful. The court added that an Individual's expectation of privacy in a mail article which enters the United States at San Francisco but is destined for Birming- ham is no more offended by opening the envelope in Birmingham than in San Francisco. DEFINITIONS ARE INADEQUATE 4, Definitions. Several comments were directed toward the fact that var- ious terms such as "sealed", "letter mail", and "letter class mail" were either not defined or were used incon- sistently in the proposed rule and policy statement. In addition, it was noted that several definitions were qualified as as to be vague in the proposed Appendix. These points are well taken. Section - 145.1 has been amended to define three terms ("mail article", "letter class mall", and "sealed letter class mail"), and these terms exclusively- have been used in the regulations. Furthermore, the definitions in the Appendix have been made clearer and more precise. For example, it is specifi- cally stated that bulky envelopes and packages are included In the term "letter class mail" as long as the arti- cle Is mailed at the letter rate or equiv- alent class or category of postage. RECORD EACH MAIL OPENING 5. Record should be made. Several comments urged that a record of every opening of sealed letter class mail should be made, whether or not a sei- zure occurs. The comments suggested that the factors which present a rea- sonable cause to suspect the presence of merchandise or contraband should be recorded. Some comments proposed that the mall article itself be endorsed as opened by Customs, citing the rea- sonable cause, the examiner's name, and other relevant information. These suggestions have merit and will be adopted in part. The Customs Service currently uses a stamp to en- dorse sealed letter class mail that has been opened. The stamp contains the mail examiner's identifying number and the place of opening. In the future, the mail article will be en. domed to also contain a code indicat- ing the reason(s) why the mail article was opened. The examiner's number will be maintained because no useti purpose will be served by identifyine the opener by name. Customs also will make a record o: each opening of sealed letter alas: mail, whether or not a seizure results including the reasons for the opening "REASONABLE CAUSE TO SUSPECT" 6. Examples are overly broad.. On- comment contended that the example given in paragraph 13.7 of the pm posed Appendix of "reasonable coos to suspect" the presence of merchar disc or contraband are overly broac Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 148 Another comment questioned whether Customs would remain rigid in adher- ing to the given examples if experi- ence shows that their reliability is sus- pect Paragraph B.7 of the proposed Ap- pendix indicated the following factors constituted reasonable cause; The sender of the mail article is a known mailer of merchandise or contraband. or the mail article contains writing or typing of a unique character which has previously -been found on mail ar- ticles containing merchandise or con- traband. We agree that each of the named factors alone should not provide rea- sonable cause. These factors are there- fore being transferred to the list of factors which, standing alone, do not provide reasonable cause to suepect the presence of merchandise or con- traband. COOPERATION WTITIOTHER AaEoalta 7. Referring mail articles to other agencies. Many comments were _re- ceived concerning paragraph F of the proposed policy statement, which net forth the conditions under which -arti- cles -of mail -may be turned over to other agencies for a controlled -deliv- erytoma follow-up investigation. One comment asserted that -there is DO legal authority to turn over -any mail article to any agency except the Postal Service without a search war- rant if Customs has not seized the ar- ticle. This assertion may apply to cor- respondence in sealed letterclass mail. but clearly -does not apply to all -mail articles since 19 CFR 145.57 provides that certain .goods, such as plants and plant products, food, drugs, cosmetics, and hazardous or -caustic and corrosive substances, are subject to examination and clearance by appropriate agencies before release to the addressee. Para- graph F is therefore being revised to specify that mall articles which do not contain correspondence may be re- ferred to other agencies without a warrant for examination and clear- ance in accordance with 19 -CFR 145 57. , Another comment pointed out that only the Postal Service can effect a controlled delivery, and that the provi- sion of paragraph F that mail may be turned over to the Drug Enforcement Administration (DEA) or other Feder- al agencies without a warrant -to effect a controlled delivery therefore was er- roneous. It was suggested that the pro- talon be changed to provide that mail may be turned over to the Postal Ser- vice to effect a controlled delivery in cooperation with DEA or other Feder- al agencies, This suggestion is being adopted. a Mail covers, Postal Regulations Provide for the use of "covers", or sur- veillance, of mall when certain facts, such as the corenession of a crime, are RULES AND REGULATIONS suspected (see .39 -CFR 233.2). Authori- zation for mall -covers must be ob- tained from the Postal Service. One comment suggested that the cir- cumstances presented in paragraphs B.4 and 7 of the proposed Appendix, listing examples of "reasonable -cause to suspect", call for mail covers rather than the opening of the mail article. The example in subparagraph 7 has been deleted from the llst and subpar- agraph 4 has been reworded to read, "Information from a source previously shown to be reliable indicates that an identifiable mail article contains mer- chandise or contraband." The Cus- toms Service's authority, as outlined in the Ramsey case, to open and exam- ine sealed letter class mall is indepen- dent of any other authority to engage in surveillance of mail. Inasmuch as the quoted example provides the nec- essary reasonable cause, there is au- thority apart from the mail cover pro- cedure to open such mail. For this. reason, this suggestion is not being adopted. -9: Interagency agreements. It -was 'urged that Customs seek to standard- ize ita cooperative agreements with other agencies concerning mall exami- nation. Moreover, it was suggested that the agreements be treated as rules requiring public notice and op- portunity for comment. The Customs Service is attempting to standardize these agreements with Other agencies- to -the fullest extent possible. It must be recognized, howev- er, that some differences necessarily will occur because of different inter- ests and procedures involved. . On the other hand, interagency agreements of this type are not rules requiring public notice and opportuni- ty for comment within the meaning of 5 U.S.C. 551. In addition, any agree- ment would -have to comport with both Agencies' regulations and policies on the subject. For these, reasons, the suggestion that public notice and op- portunity for comment be given for in- teragency agreements on alai' exami- nation v;fll not be adopted. ARE MORE SAPECEARDS NEEDED? 10. Are time limits feasible? Several comments requested that time Limits be set for obtaining search warrants and for Customs processing of mail. Five days. was suggested as a reason- able time for obtaining search war- rants, -while it was suggested that the time period for processing mall be based on the classes of mail examined. Customs has experimented with set- ting a specific time limit for obtaining search warrants. In particular, Cus- toms has required other agencies to obtain search warrants with regard to correspondence within 3 working days. This -has proved to be too restrictive, especially for the military services. Customs intends to continue to study ? 14453 this matter, but at this time no specif- ic time limit can be identified as eats- factory to all interests. It is for this reason that the term "promptly" has been used in the policy statement. As to Customs processing of mail. the only delays which occur now are when a seizure or detention is made, when a search warrant is sought, or when the mail is referred to another inspectional agency, such as the De- partment of Agriculture. Other than In these cases, the mail is processed rapidly and promptly returned to postal channels. At least some of the above-mentioned delays obviously are not within Customs control. For that reason, and because most mail Is pro- cessed rapidly in any event, a specific time limit is not believed .to be feasi- ble. Customs, however, will remain open to such a possibility should un- necessary delays or abuses be found. 11. Reading correspondence. Several suggestions urged Customs to empha- size the prohibition against reading correspondence without a search war- rant, One suggestion was that the pro- hibition against reading correspon- dence in sealed letter class mail found to contain merchandise or contraband. or with a green label or Customs decla- ration, should be expressed in the reg- ulations. Section 145.3(c) unqualifiedly pro- hibits the reading -of correspondence in any letter -class mail without a search warrant or consent of the sender or addressee. This section clear- ly encompasses the. situations where merchandise or contraband is found in the letter class mail or where a green label or Customs declaration is at- tached. The regulation, therefore, is considered to be sufficiently explicit in this regard. However, as a further safeguard, the explanatory material in the policy statement has been amend- ed to refer specifically to these two sit- uations. Another suggestion was that Cus- toms officers and employees should be reminded of the possibility of criminal Penalties -under 18 U.S.C. 1702 for ob- structing correspondence. In response to this suggestion, the policy state- ment has been amended to remind Customs personnel that any violation of the regulations or policies regarding the examination of letter class mail Will lead to administrative sanctions. as well as possible criminal prosecu- tion under-18 U.S.C. 1702. LENERAL 12. Customs received general recom- mendations that it remain flexible as to what constitutes reasonable cause. that it pursue the standardization of mail openings and the like, and that alternative privacy safeguards be con- sidered. The Customs Service is acutely aware of the sanctity of privacy in cor- . Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 149 .r41.54, . respondence. At the same time, Cus- aims must perform its obligations to examine all importations, whether by mail or otherwise.' The Customs Ser- vice feels that this document balances those interests in a satisfactory manner. Customs will. of course, remain flexible In regard to mail ex- aminations, particularly to the extent that practice indicates the reliability, or lack thereof: of certain facts provid- ing reasonable cause. In sum, the Customs Service consid- ers the safeguards provided in this document to be adequate to protect the right a privacy. If these safe- guards do not In fact prove adequate. Customs will seek alternative mea- sures to minimize the Intrusiveness of mail.examinations. OTHER CHANGES After review of the proposal and consideration of the comments submit- ted. it was decided that certain other changes to the proposal were needed. The notice proposed to amend only 1145.3- of the Customs Regulations. However. it became apparent that other sections would be affected by such an amendment. Therefore, ?3145.0 through 145.3 have been amended as appropriate. Part 145 referred throughout to the term "package" or its equivalent to mean., in effect, any mail article. Be- cause packages can in fact be mailed at the letter rate, or equivalent class or category, this had caused confusion-- These amendments therefore replace the term "package" or -Its equivalent with the term "mail article." Proposed ? 145.3 provided that war- rants were required to read correspon- denoe or to open letter class mail unless there was reasonable cause to suspect the presence of merchandise or contraband. That section has been changed to also allow such reading or opening when the sender or addressee gives written authorization to do so. Thus the interested party may be able to expedite the processing of mail by avoiding the delay associated with ob- taining a search warrant. The proposed policy statement has been amended to incorporate the In- teragency agreement requiring the presence of a Postal Service employee whenever sealed letter class mail is opened. In addition to the above changes, a nmnber of editorial and stylistic changes have been made to the text of the proposed amendment and policy statement. DRACTING INFORMATION The principal authors of this docu- ment are Stuart P. Seidel, Office of the Chief Counsel, and Richard M. Be- langer, Office of Regulations and Rul- ings. U.S. Customs Service. However, Other personnel in the Customs Ser- RULES AND REGULATIONS vice and in the Department of the Treasury participated in its develop- ment. AMENDMENTS TO THE REGULATIONS Part 145 of the Customs Regulations (19 CFR Part 145) Is amended in the following manner: 1. Section 145.0 is amended by adding the following as the first sen- tence in that section: ?145.0 Scope. The provisions of this part apply only to mail subject to Customs exami- nation as set forth in ?145.2. ? ? ? ? ? ? 2. Sections 145.1, 145.2, and 145.3 are amended to read as follows: 145.1 Definitions. (a) Mail article. "Mail article" means any posted parcel, packet, package, en- velope, letter, aerogramme. box, card, or similar article or container, or any contents thereof, which is transmitted in mail subject to customs examina- tion. (b) Letter class mail. "Letter class mall" means any mall article, includ- ing packages, past cards, and aero- grammes, mailed at the letter rate or equivalent class or category of post- age.. - (c) Sealed letter class mall. "Sealed letter class mail" means letter class mall sealed against postal Inspection by the sender. ?145.2 Mall subject to Customs examina- tion. (a) Restrictions. Customs examina- tion of mail as provided in paragraph (b) Is subject to the restrictions and safeguards relating to the opening of letter class mail set forth in ?145.3. (b) Generally., All mail arriving from outside the Customs territory of the United States which is to be delivered within the Customs territory of the United States and all mail arriving from outside the U.S. Virgin Islands which is to be delivered within the U.S. Virgin Islands, is subject to Cus- toms examination, except? (1) Mail known or believed to con- tain only official documents addressed to officials of the U.S. Government; (2) Mail addressed to Ambassadors and Ministers (Chiefs of Diplomatic Missions) of foreign countries; and (3) Letter class mall known or be- lieved to contain only correspondence or documents addressed to diplomatic missions, consular posts, or the offi- cers thereof, or to international orga- nizations designated by the President as public international organizations pursuant to the International Organi- zations Act (see ?148.87(b) of this chapter). Mall, other than letter class mail, addressed to the designated in- ternational organizations is subject to Customs examination except where the organization certifies under its of- ficial seal that the mail contains no dutiable or prohibited articles. Any Customs examination made shall, upon request of the addressee interna- tional organization, take place in the presence of an appropriate representa- tive of that organization. ? ?145.3 Opening of letter class mail; read- ingot correspondence prohibited. (a) Matter in addition to corresion- deuce. Except as provided in para. - graph (e), Customs officers and em- ployees may open and examine sealed letter class mail subject to Customs examination which appears to contain matter in addition to, or other than, correspondence, provided they have reasonable cause to suspect the pres- ence of merchandise or contraband. (b) Only correspondence. No Cus- toms officer or employee shall open sealed letter class mail which appears - to contain only correspondence unless prior to the opening? (1) A search warrant authorizing that action has been obtained from an appropriate judge of United States magistrate, or (2) The sender or the addressee has given written authorization for the opening. (c) Reading of correspondence. No Customs officer or employee shall read, or authorize or allow any Other' person to read, any correspondence contained in any letter class mall, whether or not sealed, unless prier to the reading? (1) A search warrant authorizing that action has been obtained from an appropriate judge or United States magistrate, or (2) The sender or the addressee has given written authorization for the reading. (d) Other types of correspondence. The provisions of paragraph (c) shall also apply to correspondence between school children and correspondence of the blind which are authorized to be mailed at other than the letter rate of postage in international mall. tel Certain Virgin Islands mall. First class mail originating in the Cus- toms territory of the United States and arriving in the U.S. Virgin Islands, which is to be dellvered within the U.S. Virgin Islands, shall not be opened unless? (1) A search warrant authorizing that action has been obtained from an judge or United States magistrate, or (2) The sender or the addressee has been given written authorization for the opening. ?181.4 (Amended] 3. Section 145.4 is amended by sub- stituting the term "mail article" for Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 150 the term "package from abroad" wher- ever It appears. ?145.40 [Amended) 9. Section 145.40(c) is amended by substituting the term "mail article" for the term "mall package" wherever it-appears. - 4. Part 145 is further amended by substituting the term "mail article" for the term "package" wherever it ap- pears, and the term "mail articles" for the term "packages" wherever it ap- pears. (RS. 251, as amended, R.S. 3061. area. 498. 499, 581 824, 46 Stat. 728, as amended, 747, as amended. 759 (19 U.S.C. 66, 482, 1998, 1499. 1561, 1621).) Z. The followtng policy Statement Is added at the end of Part 145, Pout., Szarsacearr ISADIECRATION 01,36/IIED LEITER MASS MALL A..Custorre officers and employees shall not .8050 11151 class mall arriving 151 the U.S. -virgin Islands tor delivery there, if it .origi- nated In the Customs ten-Rory of the United States, unless a search warrant .or 'written authorization of the sender or ad- dressee is obtained. Customs offIcers.or em- ployees may open and examine all other sealed letter class mail which Is subject to the Customs mall regulations (see 19 CFR Part 145) and which appears to contain matter In addition to, or other than, corns, spondence. provided they have "reasonable muse to suspect" the presence of merehan- dise or contraband. B.-Customs officers and employees shall not open any sealed letter class mall which appears to contain only correspondence unless a search warrant or written authori- zation nf the sender or-addressee is obtained kradvance of the opening. C. Customs officers and employees are Prohibited from reading, or euthorlaJng or allowing others to read, anti correspondence contatned In any letter class mail -.less there has been obtained In advance either, search warrant or written authorization of the sender or addressee. This prohibition, which will continue to be -strictly -enforced, also applies to correspondence between school children and correspondence of the blind which are authorized to be mailed .at other than 'the letter rate of postage in in. ternational mail. D. If a violation-of law is discovered upon opening any mail article referred to in para- graph C. and It is believed that the corre- spondence may provide additional informa- tion concerning the violation and Is there- fore needed for further investigation or use in court, a search warrant shall be obtained before any correspondence Ls seized, read, or referred to attacher agency. Search warrants shall be promptly sought. Correspondence may be detained while a .search warrant is being sought. E. If no controlled delivery Is arranged and correspondence is not to be otherwise seized pursuant to a search warrant (see "F" below), the item which constitutes the viola. lion shall be removed and any correspon. deuce shall be replaced In the wrapper, aria a new wrapper If the original wrapper has been seized pursuant to 19 U.S.C. 15350. The wrapper shall then be resealed, marked In Indicate It was opened by Customs, and RULES AND REGaILATIONS returned to postal channels. Appropriate seizure notices shall be sent in accordance with 19?CFR 195.59(b). F. Na mail article may lie referred to an- other agency without a search warrant (I) Any correspondence has been removed and the mail article is being referred for ex- arnination and clearance under 19 CFR 145.57, (2) ally correspondence has been removed and the mall article has been lawfully seized by Customs, 131 The mail article Is being referred to Postal Service channels to effect a con- trolled delivery Pi cooperation with other law enforcement agencies, or (9) The mall article is being returned to Postal Service channels for normal process- ing. G. Whenever sealed letter class mall Is opened, the factors giving the Customs offi- cer or employee "reasonable cause to sus- pect" the presence of merchandise or con- traband shall be recorded on the appropri- ate form and on the opened envelope or other container by means of appropriate coded symbols. Should a seizure rmult. these factors shall also be recorded on the seizure report. 11. Sealed letter class mail with the green Customs label on a Customs declaration may be opened without additional cause. Correspondence in such o.1 is subject to the restrictions reg.ding the detention, reading, and referral of mail to other agen- cies fo.d In paragraphS C through F. I. Whenever any sealed letter class mall -Is opened for any of the reasons set -forth iso the above paragraphs, a Postal Service em- ployee shall be present and shall observe the opening. J. Any violation of the Customs mall regu- lations.or any at-these policies will -lead to appropriate administrative sanctions, as wen as possible criminal Prose...UM Posaus ant 10 10 U.S.C. 1702, ILOPSIMIX A. Scope. The Customs -Service Is autho- rized to examine. with certain exceptions for diplomatic and governmental mail, all mail arrivinglram outside the Customs ter- ritory -of the United States ICTUS) which is to be ?delivered within the CTUS. and all mail arriving from outside the U.S. virak. Islands which Ls to be delivered within .the U.S. Virgin Islands. The term "Customs ter. ritory of the United States. is limited to the States, the District. of Columbia, and Puerto Rico. Consequently. mail arriving from other 'U.S. territories and possessions Is sub- ject to ?Customs examination even though it is designated "domestic" mail for Postal Service purposes. Likewise, mall in the APO/FPO military postal system is subject to Customs examination, even though It also is designated "domestic" mail for Postal Service purposes. The Customs Service therefor is responsible for examining all in- ternational mall to be delivered In the CTUS and certain limited categories of so- called .q10MeStiC mall". B. .Definitions. Under various Internation- al conventions and bilateral agreensents, in- ternational mall falls within two main classes, Parcel Post and Postal Union mail. Parcel Post in not permitted to contain correspondence but is to be used for the transtnlasion of merchandise and is fully slit:sleet to Customs examination in the came manner as other ?merchandise ehiPments leg., luggage, cargo. Containers. etc.). Postal 14-155 Union mall Is -dlvided into "LC" maLl (Lettres et Cartes) and "AO" mail (Autres Objets). "LC" mall consists of lertera -packages Paid at the letter rate of postage, post cards, and aerogrammes. The term "letter class mail" as used in the Customs Regulations and in this policy statement means "LC" mail as well as equivalent articles in -domes- tic" mail subject to Custom. examination. Equivalent articles in "domestic" mail would include articles Mailed at the lesser rate. or equivalent class or category, in the APO/FPO military system or from a U.S. territory or possession outside the CMS. Since the term "letter class mall" thus in- cludes paekages and bulky envelopes as long as they are mailed at the letter rate, or equivalent class-or category, the restrictions relating to opening and reeding of corre- spondence apply equally to sueh Packages or bulky envelopes. -AO" mall is to be treated let the same manner as Parcel Post mail since the 5301. vernal Postai Union Convention requires that they "be made up in such a manner that they-maybe easily examined" and gen- erally are not permitted to "contain any document having the character of current and personal correspondence." Exceptions to the latter requirement exist for matter for the blind and certain correspondence be- tween-school 'children. Because of these ex- ceptions. the prohibition against reading correspondence without a search warrant or authorization of the sender or addressee ap- plies to correspondence of the blind and cor- respondence between 'school -children con- tained in "AO" mall. "AO" mail cart ...Il)be idesstiLled by the lollovring words: "Int- prime?or "Printed Matter". "Cecogmem." of "Literature for the 1311.nd'S "Petit ParIllet" or "Small Packet"-or similar terms or their equivalents. p. Reasonable Cause to Suspect Deterrnin- ing whether there is "reasonable came to suspect" that merchandise or -contraband is contained insealed letter class mail Ls ulti- mately -a matter of Judas:item for each Cus- toms official, based on all relevant facts and circumstances. This Judgment should be ex- ercised within the frail:mamma of the -Eas- ton. regulation that sealed letter class mall which appears to mntain only correspon- dence is not .10-be opened unless -a search warrant or written authorization from either-the senderor-the addressee hoe beets obtained in advance of the opening. Past practice Indicates that the following circumstances (which are illmtratise and not exhaustive) -provide "reasonanie cause In suspect" and permit the opening of sealed letter class mall without a search warrant or authorization of the sender or addressee. 1. A detector dog has alerted to the pres- ence of narcotics or explosives in 0, spectfic mail article. 2. X-ray or fluoroscope examination indi- cates the presence of merchandile or con- traband. 3. The weight, shape, feel, or mond of the mail article or its contents may Indicate that merchandise or contraband re.g., a hard object which may be Jewelry, a stack of paper which may be counterfeit money, or coins) could be in the mall article. Con- tents of a mail article which feel lumpy, powdery, or spongy MaY, for example, indi- cate-the presence of narcotics. 4. Information from a source prevlomly shown to be reliable Indicates that an iden- tifiable mail artirienontahits caerchandiseor contraband. Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 iFIA-RDP80S01268A000500020027-8 14156 5. The mall article to InSUred. [4 6. The mall article is a box, carton, or wrapper other than a thin envelope. 7. The sender or addressee of the mall ar- ticle is known to be fictitious. On the other hand, certain facts standing alone generally will not provide "reasonable cause to suspect" the presence of merchan- case or contraband and therefore do not permit the opening of sealed letter class mail. For example, sealed letter class mail may not be opened merely because; P 1. The mail article is registered. 2. The feel of a letter-size envelope suff. erste that It contains one or a limited' number of photographs. 3. The mall article appears to be part of mass mailing. 4. The mall article to from a particular country, whether or not a known source country of contraband . 6. A detector dog ha.s alerted to the pres- ence of narcotics or explosives somewhere within a tray of mall (the Individual articles of mall must then be examined ton. 6. The sender or addressee of the mall ar- ticle is known to have mailed or received contraband or merchandise in violation of law in the post. '6. The wrapper contains writing or typing similar to that previously found ori articles of road which contained contraband or mer- chandise in violation of law. In cases where any one of the above facts is present, additional evidence ? isadst exist which in conjunction with that fact provides reasonable cause to suspect the presence of merchandise or contraband. St. E. CHASM. Commissioner of Custom& Approved: March 20,1978. Berra B. ANDERSON, Under Secretary of the Treason,. lF5t Doc. '76-9125 Filed 4-5-78; 8:45 am) Approved For Release 2005/11/23: CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 152 RULES AND REGULATIONS [7710-12J ? Title 39?Pastel Service CHAPTER I?U.S. POSTAL SERVICE PART III?GENERAL INFORMATION ON POSTAL SERVICE Mail Security Regulation,. ? AGENCY: U.S. Postal Service. ACTION: Final rule. ? SUMMARY: These regulations, which are a revision of proposed regulations ? published in the Fromm. RathsTXR on AMII 8, 1977, 42 FR 18 754-18 758, pre - ? ? scribe Postal Service policy as to when it is permissible to delay. detain, or - ? open mail, and establish procedures for handling requests from Govern- ment agencies to delay, detain, or open mail. Generally, the regulations do not ? significantly change the provisions of the proposal, except that provisions have been added to protect the privacy ?, of certain correspondence permitted to ; be sent as unsealed mail (such as the . _ ? correspondence sent by the blind in ? ' and a new provision has been added which would explicitly reflect t the- authority of prison. jail, and cor- ?; rectional institution personnel to ! open. examine, and censor mall ad- - dressed to inmates who consent to re- calve their. mail at the Institution through the bastitutional authorities. - .1 EFFECTIVE IDATM May 5, 1978. - ADDRESS: Comments on these regu. ? latiOns -are welcome and will be consid. ? aced with a view towards reeking ? changes In the regulations in the ? . I future. Written comments should be , directed to Assistant General Counsel. . Special Projects. U.S. Postal Service, 475 L'Enfant Plaza West, SW., Wash- ? tnaton. D.C. 20260. Copies of all writ- - ten comments received are available ! for public inspection and photocopy- log between 9 a.m. and 4 p.m., Monday through Friday, outside Room 9000. FOR FURTHER INFORMATION . I CONTACT: ? ; Charles R. Braun 202-245-1620 or ? William 'I'. Alvis 202-245-4630. ? SCrPPLMMIENTARY INFORMATION: On April 8, 1977, the Postal Service Published in the FEDERAL REGISTER, 42 FR. 18.754-18.758, a notice of proposed ' ? rulemaking on mail security. On the .; basis of the comments It received, its own further mall security experience and further internal consideration of ? the proposed regulations. the Postal . Service has decided to adopt Its pro- posed regulations with only slight modifications. Because of the impor- tance of adopting regulations of this . ? kind, and the Postal Services Judg- ment that major changes In its propos- .. al are not warranted, the Postal Ser. 14308 vice has decided to promulgate the re. ? alsed regulations as a final rule. A dis- cussion of the general basis and pur- pose of these regulatior.s accompanied the proposal published last year. 42 FR 18,754-18,756. The Postal Service here explains its reasons for adopting changes in the proposal. The Postal - Service also invites further comments ? on the regulations Which, anyone -wishes to submit. There is no time? lmit for submitting such comments, - and any comments submitted will be-- considered with a view toward making' - amendments of these regulations in the future. The subdivisions of these regula- - lions generally concern the same sub- ject matters as the subdivisions of the proposal. There have been added a new provision (115.24) on the corre- spondence of handicapped persons and school children permitted In unsealed - mail, and a new provision (115.97) on Prisoner mail. Changes have been made in proposed 115.91 and 115.92(a), concerning customs-- clearance and plant quarantine inspections of mail entering the Customs Territory of the- United States. Clarifying changes have been added to proposed 115.21; concerning the privacy of the contents of sealed matt proposed 115.231 and 115.232 defining sealed and unsealed mail; and proposed 115.62 and 115.63, concerning search warrant execution - Procedures. We anticipate that the propesedchanges in 331, 42 FR 18,758. will be-adopted without change.' 'No comments were received on Proposed 331. Amendments of Chapter-3 of the Postal - Service-Manual such as 331. since they gen- erally consist of bsternal operational Lostructlons to postal employees. are not promulgated in the Front. Rzomma. The text of proposed 331 follows 33L11 Requests for Surrender of Malt "Any employee served with legal Proms& other than a search warrant issued under Rule 41 of the Federal Rules of Criminal Procedure (see section 115.0), purporting to require the, surrender of mail, shall respect- folly refuse to surrender it and shall refer t he matter to the Regional Counsel for fur- ther information. "See 111.31 for permissible detention of the mail. 131.12 Access to Mall and Mail Handling Areas. "Access to mall and mail handling areas in postal installations IS restricted to acme, nzed postal employees and mail contractors on official business, and to other persons specificalig permitted access by the installa- tion head or superior authority for the proper conduct of the official business of Use Postal Service. the General Accounting Office, or a congressional committee. Such other persons must be accompanied by a Donal employee on duty. Federal, State, or local law enforcement or public safety au- thorities may be given access to mail and to mall handling areas to remove potentlallY dangerous mall matter In accordance with section 115.4. In appropriate circumstances, the installation head may allow Federal. State, or local law enforcement authorities Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/1142A: CIA-RDP80S01268A000500020027-8 ? There follows a detailed discussion of the changes that have been adopt- ed- Ity?todey of Personal Correspondence of Handicapped Persons and School Children Permitted in Unsealed Mail. The proposal did not offer any protec- tion of the privacy of certain personal correspondence which is permitted to be sent as unsealed mail. Although normally personal correspondence is required to be sent as sealed mail, the blind and certain other handicapped persoms are permitted to send their personal -Correspondence and certain other materials in the form of raised or special characters or sound record- Inge as unsealed mail free of domestic postage and at reduced international rates of postage. 39 U.S.C. 3404 (1970): Universal Postal Convention. arts. 18- . 19: Detailed Regulations, art. 128: Lau- . _ _sauna 1974, No. 8231. While the law and the postal convention ex- ' PresalY provide that such mail is to be "'Unsealed; see- section 3404 and arti- cle 128; a postal. inspection may read. Up-be conducted by opening such mail _and inspecting the materials inside to magi sure that they are eligible for the special or free rate- of postage claimed by the sender, without laved- -Ing the privacy of any personal corre- spondence found inside by disclosing the contents of personal messages. Similar considerations apply to certain personal correspondence between school children permitted at the Inter- .. national printed matter rate. The reg- -tilatlons therefore contain, a new 110.24 explicitly stating that the con- - tents of such personal correspondence permitted to be enclosed in such un- - sealed mall shall not be divulged except with the consent of the ad- . dresses- or sender or to a person ex- ecuting a valid search warrant. A con- _ forming change is made in 115.91. on customs clearance of mall. . --Prison openings of mail addressed to tfOlt614.7. The proposal contained no Provision which would expressly permit, and therefore would arguably have prohibited, the opening and In- spection of mall addressed to persons confined in prisons. Jails, or other car- . .recidoruil Institutions. It was therefore suggested that a provision which rec- ognized the long-standing practice of prisons. Jails, and other correctional institutions of censoring mail entering prisons and other places of confine- ment should be included in the regula- tions. It was also suggested that such a provision would, in addition. clarify . the duties, and responsibilities of prison officials in handling prisoner mail and the limitations on their au- thority to detain, open, or return mail addressed to prisoners. Since prison censorship of Inmate road entering the prison is lawfully access to mall and mall handling areas. to deal with conditions dangerous to life. limb, or property. such as fires or flooding, or to make lawful agrees." ? RULES AND REGULATIONS conducted with the consent of the Inmate-addressee, an explicit excep- tion for such censorship did not appear to be absolutely necessary. However, so as to avoid unnecessary disputes as to whether postal regula- tions prohibit such censorship. the regulations include a new provision, 115.97, which would explicitly permit Jail, prison. or other correctional insti- tution officials, within the limits of the law, to open, inspect, and censor incoming mail addressed to inmates to the extent that the inmates consent to receive their mail at the prison through the prison authorities. The implied exemption for such prison mail censorship from the literal re- qulrements of 18 U.S.C. 1701-1702 Ls generally well-established, at least where the inmate consents to receive his mall at the prison through the prison authorities. Procunier v. Mar- tin.es, 416 U.S. 398 (1974): 1 Op. Solis. P.0; Dept No. 289 at 719 (1882): 9 Op. Salle. P.O. Dep't No. 811 at 240 (1949). The permissible scope of such prison censorship, however,' has been a matter- of controversy. Section 115.97 would prescribe an appropriate excep- tion only for such prison mail censor- ship as may be authorized and lawful. Section 115.97 would prescribe the minimum safeguards necessary to pro- tect the uncontroverted rights of pris- oners regarding correspondence ad. dressed to them through the U.S. moni and of the persons addressing mail to them through the mails. The regulations, however, do not at- tempt to clarify all unresolved and controversial issues in this area. There are many State. Federal. and military places of confinement, operating under different authorities and Lacing different prison security conditions. It has not been shown that there Is a strong need for uniform, nationwide rules on all details of prisoner mail rights that overrides the interests of the various prison authorities in having latitude to provide for the se- curity of prisons. Moreover, the Postal. Service's authority is limited by law to matter originating in the U.S. mall system: it does not extend to prisoner- originated "mail" before the prison au- thorities permit it to be deposited in the U.S. mails. Many of the details of Prison mail censorship may best be left to the appropriate prison authori- ties, Congress and the State legisla- tures, and the State and Federal courts.' _ COS foists clearance of incoming marl The proposal would have permitted designated personnel of the U.S. cus- toms Service, without a search war- rant but upon reasonable suspicion, to open and inspect the contents of mail originating outside the Customs Terri- tory of the United States ("CTUS") and addressed for delivery inside the CTUS? except sealed mail addressed 14.3C' for delivery in the Dirmict of Co:um- Ma_ The proposal would have prohibit- ed Customs officials from.reas.g, cor- respondence in sealed mail without a search warrant. Several comments re- ceived by the Postal Service objected that the' customs opening of mail with- out a search warrant was an unjusti- fied invasion of privacy, and that a search warrant should be required on grounds of constitutional law and for Policy reasons. Other comments- ex- pressed approval of such customs mall openings as may appear neceiwarl for the enforcement of Import prohibi- tions, but stressed that the privacy of correspondence should be proteried. After the publication of the propos- al, the United States Supreme Court. reversing a decision of the United States Court of Appeals for the Dis- trict of Columbia Circuit, held that. evidence obtained' when Customs Ser- vice personnel opened and inspected the contents of sealed letter mail from Thailand, without a search warrant. was admissible, when the opening was authorized by Joint postal-customs regulations, the customs inspector had. reasonable cause to suspect that the mail contained dutiable or prohibited Items, and the reading of the corre- spondence Inside without a warrant was prohibited. The Court concluded that such openings and inspections of such sealed letter mall were autho- rized by. law and were not unconstitu-' _tonal. United States w. Ramsey. 431. U.S. 606 (1977). The Court emphasized that. its opinion did not express an opinion on the constitutionality or le- gality of reading correspondence with- outs search warrant. - We believe that so long as the priva- cy of correspondence is protected, some program of providing for cus- toms clearance of Incoming mail should be continued. The incoming letter mails may contain not only cor- respondence but merchandise as well. In recognition of the varied nature of the contents of letter maiL the Univer- sal Postal Convention, which generally regulates the exchange of Internation- al letter post items, specifically autho- rizes each postal adz:Innis-oration acting In accordance with Its domestic law to open letter post items for customs clearance. Universal Postal Conven- tion, art. 34: Detailed Regulations. Arc. 118; Lausanne. 1974, T.I.A.S. No. 8231. Although the Postal Service In accor- dance with domestic law does not permit its employees to open sealed letter mail without either consent or a search warrant. Ex parte Jackson. 96 U.S. 727, 733 (1877) (dictum). United States v. Van. Leettwen, 397 U.S. 249 (1970), 18 lJ.S.C. 1702. 1703(a) (19761. the Postal Service believes that it would be inconsistent with the laws regulating and taxing Imports for the Postal Service not to cooperate with the Customs Service in any fashion - Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 Approved For Release 2005/11/23 : CIA-RDP80S01268A000500020027-8 154 -and thus establish the international mails as a. secure means of bringing .dutiable raerotandisp and prohibited Items Into the United States, without ? observing the-custom requirements of lawn. In view of the Ramsey case, the constitutionality and legally of the- Proposed cooperation are not in doubt. After the Rconseff case was decided, a bill was 'introduced in Congress to re- quire a search warrant for customs openings of sealed letters, and over- sight hearings were begun by the Sub- committecon Information and Privacy ? of the Some Government Operations Committee_ concerning. the question of whether- he a -search warrant. A preliettisaremport bas been issued - by the .0rementtee. "Investigation of ? IfaS Opening by the Customs Ser. trice; If_ra- Rep- No. 95-794. 95th ,, -Cong.. 1st e.