THE CIA ON AMERICAN CAMPUSES: MASSACHUSETTS INSTITUTE OF TECHNOLOGY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP88-01315R000300550015-6
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
3
Document Creation Date:
December 16, 2016
Document Release Date:
September 17, 2004
Sequence Number:
15
Case Number:
Publication Date:
May 1, 1979
Content Type:
MAGAZINE
File:
Attachment | Size |
---|---|
![]() | 250.97 KB |
Body:
Appr ved F I,se 2(~Q ~4~13 : CIA-RI~P$8y0A315F, 0(~~8~067' 6~
The CIA on American
Campuses: Massachusetts
These excerpts are from the "lrtterirn Report of the Ad Hoc
Committee on M.I.T. and the hnteltigeirce Agencies... pub-
(lished in Masssachusetts Institute of Technology Tech Talk,
1 April 11. 1979, Vol. 23, No. 30.
Institute of Technology
Editor's Note: M.I.T. has become the latest in a growing line of
American universities to reexamine the relationship between the
intelligence community and the academic community.' The
M.I.T. Report provides a detailed and thoughtful discussion of
some of the problems, conflicting values, and solutions. The
INTERIM REPORT of the
AD HOC COMMITTEE ON
MIT AND THE INTELLIGENCE
AGENCIES
excerpts which are reprinted below explain why the covert
intelligence role is in fact a serious threat to the well-being of the By Kcrnreth Hoffman, chairinan; Lords Menarrd 111; Ascher H.
academic community. Shapiro; Phyllis A. Wallace: Myron Weimer and John M. Wynne.
But a few words should also be said about another, related set
of problems, which the Report does not deal with directly but
which are reflected everywhere in its recommendations that
academics exercise caution. For instance, while one recommenda- The MIT Report defines the critical issues:
Lion that we reprint makes it clear that no one connected with
M.I.T. should knowingly become a covert operative for the CIA, There are a few issues, however, which almost uniquely
the Report's discussion of gray areas shows that there is a limit to involve our relations with intelligence agencies, and with
what the well-intentioned academic can do in the. face of the intel- the Central Intelligence Agency in particular. Most of these
ligence community's clandestine habits. concern the clandestine recruitment and/or surveillance of
How, for example, is an academic to know if a State Depart- foreign citizens who are members of the MIT community.
ment official who wants to chat about some foreign country is In our opinion, these are simultaneously the most serious
really a CIA operative using a State Department cover? And how issues we face and the most difficult ones to deal with.
is an academic to decide what to do when a friendly and knowl-
edgeable contact is rumored to be a CIA agent? Or, in the case of
recruitment, an academic might offer information about students The MIT Report cites responsibilities
to an intelligence operative using a private organization as cover. within the academic community:
In such situations, safeguarding academic freedom depends not
only on the good faith of the academic community, but on the ,..
willingness of the clandestine agencies to abide by university
guidelines. As a second principle we cite the need to maintain a high level
This brings us to the context in which the M.I.T. Report, like of mutual trust among the members of our university community.
comparable sets of university guidelines around the country, ap- Without it, the kind of openness we seek is not possible. We
pears. When Harvard University became the first institution to would like to comment on three aspects of the trust we should
follow the Church Committee's recommendation and to set up have in one another.
guidelines for the members of its community to follow, it also (i) The foundation of this trust is the knowledge that the
became embroiled in drawn out discussions with the CIA. In primary dedication of each member is to the intellectual
these, CIA Director Stansfield Turner has made it clear that the enterprise which we pursue. Hidden motives tend to break
CIA will not honor the standards set up by a university. Ap- clown the bonds of trust that open communication
parently, if the Agency can induce professors, administrators, or requires. This is true whether the hidden motive is the
students knowingly to violate a university code of conduct, the coveting of personal gain and recognition or the patriotic
CIA will do so. And that being the case, it goes without saying desire to help an outside agency gather information about
that the Agency's options with unwitting academics are likewise other members of the community. The special kind of
open. openness which surrounds our activities is something
The M.I.T. Report does not mention the Turner intransigence, which requires a very special kind of dedication, a dedica-
but its discussion of gray areas implicitly acknowledges that the tion which is almost total.
CIA will not cooperate with university guidelines. As it stands, (ii) Members of our academic community should be able to
the hapless academic cannot determine who is or is not a CIA rely on the fact that the views they express, whether they
agent. Only CIA agents know who they are, and if they are be on physics, philosophy or politics, will be judged in the
under instructions to disregard university guidelines, the integrity community solely on the basis of their intellectual merit
and reputation of American institutions of learning will be com- and will be used only as part of the intellectual enterprise.
promised in the world community. Should we become aware, for example, that some
And indeed, as the M.I.T. Report also points out, this is not a members of our community were transmitting to outside
purely hypothetical concern. The M.I.T. community has already agencies political views which other members had, ex-
had the experience of foreign sources refusing to discuss matters pressed in the course of our ongoing dialogue, it would be
of scholarly interest for fear that the scholar was really working quite destructive of trust.
for the CIA. Approved For Release 2004/10/13 :CIA-R 1 p& O()080(6514046k?rgues that we work
p p ove WaSe 2 _ _ /10t1-3-
toward the elimination of secrecy, not only in the conduct
of the intellectual enterprise but in all matters we deal
with except those which are clearly private or personal.
To put it simply: in general, the more things about which
we are open, the more each of us will believe that open-
ness obtains in our intellectual discourse.
Our third principle is of a different character. It concerns a
basic responsibility to which we must devote special attenticin,
because it is important for maintaining an atmosphere of open-
ness and mutual trust: not putting other individuals at risk or in
jeopardy. TF.ere are several ways in which we have to be careful
about this, many of which apply quite broadly to our scholarly
contacts, both here and abroad. We shall mention the two most
basic ones now.
(1) The bonds of mutual trust which we develop become, in
many cases, almost familial in nature. The private or per-
sonal information we thereby acquire about another
member of the community should not be shared with
others without the consent of the individual involved. We
must be particularly cognizant of this in an age during
which centralized information storage and retrieval are
growing so rapidly. If, for example, a security clearance is
conducted on an individual, it is virtually impossible for
anyone to say with certainty exactly who will have access
to the information gathered and (therefore) for what pur-
pose it ultimately may be used. This is true of many less
formal inquiries as well. We believe the sound posture to
adopt is that the transmission of personal or private in-
formation about an individual-whether it is given to a
government agency, an industrial concern, another univer-
sity, or even another person-potentially exposes the indi-
vidua.i to risks and the decision as to whether those risks
are to be taken should be made by the individual in-
volved.
(ii) The openness which surrounds communication in a
university is not common to many other parts of society,
nor is the style in which debate is carried out. We must,
New
Documents
CIA/POLICY ON RELATIONSHIPS WITH
JOURNALISTS 'MATERIAL SENT TO INTEL-
LIGENCE COMMITTEES; 1973-1976; 47
pages. After liti:ration under FOIA, these doc-
uments were released to Judith Miller in
response to a request for all material on CIA
use of journalists sent to the House and Senate
Intelligence Committees and the Rockefeller
Commission. The file consists mostly of mem-
oranda organizing the Agency's response to
Senate Select Cc-mm. requests for information,
but also include, statements of CIA policy.
Certain comments in the file raise the possi-
bility that CIA contacts with journalists were
more extensive than reported to the Commit-
tees. (Order CNSS Library No. C-47,
r $4.70; copy)
CIA/RESISTANCE/PEACE AND FREEDOM
PARTY; 1968-1474: 85 pages. This file was
obtained by the Peace and Freedom Party
under FOIA. Th,! party was an object of CIA
domestic surveillance under Project Resistance.
This file shows taat more than 50,000 names of
therefore, exercise caution in commenting on the views of
other members of the academic community unless we
comment openly and as part of the on-going intellectual
discourse. A portion of the views which one of us has
about nuclear power plants, recombinant DNA or Karl
Marx may be used by others in unpredictable ways. The
transmission of an individual's views, especially out of
context, can expose the individual to risks. Let each indi-
vidual decide whether the risks should be taken.
The MIT Report on participation
in covert operations:
There is one possible limitation on consulting for an intelligence
agency which we think should be addressed institutionally. We do
not think that any member of the MIT community should (know-
ingly) act as an agent for an intelligence organization. This point
will be ;made several more times in this report, when we discuss
Briefing/Debriefing, Recruitment, and Surveillance. It arises in
connection with consulting in cases where the consultant passes
from the role of advisor/analyst to the role of information
gatherer, i.e. the agent for gathering intelligence: "On your next
trip to 0z:, why not bring back the following pieces of informa-
tion we need in addition to the things you need for your scholarly
work?"---that sort of thing. It is our belief that engaging in such
activity places an academic in a compromised position. His or her
presence and "assignment" will be known to US government per-
sonnel in the other country, activities probably will be monitored
and thus scholarly freedom compromised. We are well aware that
there are gray areas in this type of matter, and we want to
discuss these with members of the MIT community. But we feel
strongly that the general principle is sound: none of us at MIT
should act: as agents for an intelligence organization, because the
bonds of mutual trust we depend on will thereby be weakened.
These indexes were retained at least as late as
May 1974. (Order CNSS Library No. C-46,
C $8.50/copy)
DEFENSE INTELLIGENCE AGENCY (DIA)
DOCUMENTS ON NATIONAL SECURITY
NEWSLEAKS SUBMITTED TO THE SENATE
INTELLIGENCE COMMITTEE; 1973-1977; 71
pages. This file, released to CNSS through the
FOIA, contains nine instances of apparent na-
tional security newsleaks to Fred S. Hoffman and
other reporters. In each case the original news
story is reproduced, followed by records of DoD
investigations. The source of the leaks was not
located in any of the eight cases found to involve
unauthorized disclosures of classified informa-
tion. (Order CNSS Library No. A-17,
$7.10/copy)
DOCUMENTS REFERRED TO IN "COVERT
ACTION IN CHILE 1963-1973"; September
1970 and undated; 11 pages. This file contains
three CIA documents released to CNSS
through the FOIA, which describe events in
Chile during September 1970. The reports de-
scribe alleged attempts by the Chilean Com-
munist Party to take over media outlets, splits
FBI/MEDIA MANIPULATION/INFOR-
MANTS/WILLIAM TURNER; July 1962-
August 1973; 123 pages. William Turner is a
former Special Agent who was dismissed from
the FBI in 1961 for his poor attitude toward
Hoover and the Bureau. Subsequently he made
a career as an author, writing extensively (and
critically) about the FBI. These documents,
obtained under the FOIA, focus on the
Bureau's 11-year long attempt to discredit
Turner and his writings. (Order CNSS Library
No. 1-18, $12.30/copy)
FBI/REQUEST FOR MAIL COVER ON SWP;
January 1973; 5 pages. These documents,
released through discovery in Paton v.
LaPrade, consist of FBI memoranda and a for-
mal request for a mail cover from L. Patrick
Gray to the U.S. Postal Service. The stated
purpose of the cover is to develop general
information about the SWP and its contacts,
rather than to gather evidence of crime. (Order
CNSS Library No. 1-30, $0.50/copy)
PFP members from a single roweidef;dr Re be&Beo2Qf34/l,9Lt3rialFti" lPi 6,TO1315MONG 55S Or1t"udies Library. Prepaid
by Resistance: the figure given by the Church /character and career. (Order CNSS Library No. , orders only. For complete list of available
Committee was 1.2-16,000 names nationwide. l C-31, $1.10/c6py) documents, order Abstracts, p. 15.
Approved For Release 2004/10/13 : CIA-RDP88-01315R000300550015-6
Approved For Release 2004/10/13 : CIA-RDP88-01315R000300550015-6