REMARKS BY WILLIAM H. WEBSTER DIRECTOR OF CENTRAL INTELLIGENCE BEFORE THE AMERICAN BAR ASSOCIATION TORONTO, CANADA AUGUST 9, 1988

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP99-00777R000400800001-2
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
15
Document Creation Date: 
December 27, 2016
Document Release Date: 
May 12, 2014
Sequence Number: 
1
Case Number: 
Publication Date: 
August 9, 1988
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP99-00777R000400800001-2.pdf611.29 KB
Body: 
Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 REMARKS BY WILLIAM H. WEBSTER DIRECTOR OF CENTRAL INTELLIGENCE BEFORE THE AMERICAN BAR ASSOCIATION TORONTO, CANADA AUGUST 9, 1988 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Thank you very much President MacCrate, Prime Minister Robinson, other distinguished guests and fellow members of the American Bar Association. I am delighted to be with you. I can't resist saying that if some day -- as I'm certain I will -- I am called to account for my sins, I hope that Bob MacCrate is around to impanel the jury. I particularly feel pleased to be here this morning and to follow in the wake of the award of the American Bar Association Medal to my fellow St. Louisan, Bill McCalpin. It is richly deserved. I've known Bill for 40 years as a friend and a colleague and, along with your distinguished past President John Shepherd, we worked together on many projects. I am proud for Bill, I'm proud for St. Louis, and I'm proud for the American Bar Association that Bill has been selected for this high honor. Well, I am here in Canada speaking largely to Americans, and that, in a way, is a relief. I spoke to the Royal Canadian Mounted Police Annual Mess several years ago and discovered at the last minute that I was expected to engage in a bilingual exercise. I stumbled through a few formalities in French about being glad to be there, and then finally I said, "And now, I must return to my own language -- unless you want my views on closing the window or putting the crayon on the table." In a world of disarray, some very interesting things are happening, even as we visit together. The prospect of peace in the Persian Gulf and a cease?fire in the war between Iran and Iraq; the withdrawal of Russian troops from Afghanistan; the Cambodian peace talks and the prospects that the Vietnamese may soon withdraw their troops from that country; the ongoing discussions in Angola and the promise of a cease?fire; and the constructive Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 discussion of possible solutions for the conflict in the Western Sahara. All to the good. In contrast to these developments, we see a faltering effort to provide a permanent solution to conflict in the Middle East; insurgencies in the Philippines; five nations arming the Spratly Islands off the coasts of Vietnam and China; the spread of chemical and biological warfare in the Middle East; and the emergence of China as one of the great munitions makers of the world, now specializing in missiles of great distance. And I guess I have to mention Latin America. Nicaragua, Panama, Honduras, Chile, El Salvador, and Bolivia. I need only mention the names for us to realize how much there is to do to create a safer and more peaceful world. We saw the U.S.?Soviet summit meeting in June, and we saw the recent meeting of the Soviet Central Committee plenum, when Gorbachev gave an amazing speech promofing the principles of glasnost and perestroika. And yet, we know that no essential goals of Soviet domination have changed -- or, at least, the Soviets have made no public statements of such a change. And we see across the world that three problems are emerging again, as they have always been there: espionage, terrorism, and drugs. And we have to ask ourselves what kind of tools we need -- and what kind of tools we can be allowed to use -- to deal with these threats. And, what reasonable limits should be placed on law enforcement and the Intelligence Community in their efforts to bring these worldwide problems under control? Some 15 years ago, while I was still serving on the Eighth Circuit Court of Appeals, I had occasion to review a statute which made it unlawful to carry or attempt to carry a firearm aboard a commercial aircraft. In the opinion 2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 that I wrote, I discussed the evolution of the airport inspection or checkpoint system -- a system that had been challenged not too long before as a gross intrusion into personal privacy. Subsequently, a rash of hijackings brought home the reality of the terrorist threat and the need to balance individual privacy interests with legitimate security interests. I opined then -- and I believe today, with equal force -- that if those checkpoints were removed, there would be a storm of protests from passengers who value the security and protection that they afford and consider such inspections to be a reasonable price for that security. Some of you no doubt attended the morning session run by Dick Friedman, Chairman of the Standing Committee on Law and National Security. Nick Rostow gave some opening remarks about how to balance humanitarian concerns and respect for the rule of law with our national security objectives. This is a tough issue and one that is very much on my mind today. While I was still at the FBI, I often spoke of the balance that must be maintained between each citizen's right to be let alone, and the right to be kept safe and free. Bob MacCrate and I have also talked about this balance. And when Bob asked me to speak to you today, he suggested that I address this topic again from my vantage point at the CIA. And so, today I will try to do that -- to discuss how the work of intelligence can provide greater safety without unreasonable sacrifice of individual liberty. The CIA and other components of the Intelligence Community collect information on a host of issues that affect our national security. Two of the issues that most clearly touch on the relationship between safety and liberty -- issues that therefore demand special safeguards -- are the threats 3 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 posed by hostile intelligence services worldwide, operating against this country, and the threats posed by international terrorists. Our activities in these and other areas are governed by Executive Order 12333, which outlines the duties and responsibilities of the CIA as well as the limitations upon intelligence activities undertaken by the Agency. The order reflects the requirements of the National Security Act of 1947, the CIA Act of 1949, and other laws, regulations, and directives, as well as intelligence policies. In addition to following the executive order, the CIA and other agencies within the Intelligence Community are required to develop and have approved by the Attorney General their own guidelines and procedures. The procedures at the CIA were developed to: 11 encourage legitimate intelligence activities; ? provide legal protection to employees by providing authority for intelligence activities; ? and -- I think this is of major importance -- assure the American public and the intelligence oversight committees that all CIA activities involving U.S. persons are lawful and related to legitimate intelligence objectives. For instance, we file an annual report with the House and Senate intelligence oversight committees spelling out significant intelligence activities, and we follow up with briefings if necessary. Our activity in this area is closely monitored by the oversight committees, which act as surrogates for the Congress as a whole and as surrogates for the American people. The first of the issues that I mentioned, counterintelligence, is critical to our national security, and clearly a legitimate intelligence objective. In 4 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 fact, an effective and comprehensive counterintelligence program has never been more important to our nation, because the threat against us has grown. The number of operations against us has certainly increased, and the number of intelligence services involved in such operations has also grown. Over the past three years, we have discovered more penetrations of the U.S. defense and intelligence communities than at any time in our history. The costs of these compromises are estimated in the billions of dollars. Two major espionage cases which affect our country have surfaced in Canada this summer. Stephen Ratkai was arrested in June for attempting to pass U.S. naval secrets to the Soviet Union. And during that same month, the revelations of a Soviet defector, Yuriy Smurov, led to the expulsion and barring of 17 Soviet officials who were trying to steal Canada's advanced commercial and military technology. Although many countries engage in intelligence operations against the United States, the Soviet intelligence services, the KGB and GRU, represent by far the most significant intelligence threat in terms of size, ability, and intent to act against U.S. interests -- both at home and abroad. And despite Soviet glasnost and perestroika, we have actually seen an increase this year in Soviet attempts to recruit U.S. sources. Because we can protect ourselves best if we understand what our adversary wants, I think it's worth considering just what is being collected. The highest Soviet collection priority is information on U.S. strategic nuclear forces. Other high-priority subjects are key foreign policy matters, congressional intentions, defense information, advanced dual-use technology the kind of technology that is civilian in nature but can be adopted to 5 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 military purposes -- and, not surprisingly, U.S. intelligence sources and methods. The Soviets also target NATO intensively, partly as a means to obtain, through information that we share there, U.S. foreign policy and military information. And the methods employed by the Soviets to get the information they want are becoming more aggressive and more sophisticated. We expect to see greater Soviet efforts to recruit U.S. personnel abroad; increasing use of third countries for clandestine meetings with American agents -- the better we get here, the more likely they are to meet outside this country; greater efforts to penetrate allied governments that might be privy to U.S. secrets; and greater emphasis on exploiting the intelligence collection capabilities of Warsaw Pact allies. But the methods the U.S. Intelligence Community uses to counter this threat are also impressive. And the most impressive of those methods is the increased cooperation among the various agencies within the Community. For example, the FBI and CIA are today working closely together in mounting both offensive and defensive measures against hostile intelligence services. In recent years the FBI has made great strides in countering the intelligence activities of the Soviet Bloc countries. The Bureau has improved the quality and sophistication of its intelligence systems and, as a result, has succeeded in disrupting hostile intelligence operations aimed at critical U.S. targets at home. The FBI's main tactic has been to "spiderweb" known or suspected intelligence operatives. In spinning webs with physical and electronic surveillance -- and, incidentally, all electronic surveillance must be court 6 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 authorized under the Foreign Intelligence Surveillance Act -- U.S. intelligence has been able to weave a barrier between hostile agents and our citizens. Those of you familiar with FISA will recall that there is a much higher threshhold required to direct electronic surveillance against U.S. persons. To provide the information that will allow enforcement agencies to protect our citizens, we have bolstered counterintelligence efforts throughout the Community. For the CIA, such efforts include collecting information outside the United States on Americans who are or may be engaged in activities on behalf of a foreign power, and collecting information in circumstances where an American may be the target of a foreign power. Our own procedures dictate that we must use the least?intrusive collection technique feasible to obtain the intelligence required. To make the best use of that intelligence and to improve the effectiveness of counterintelligence activities both within the CIA and in the Intelligence Community, I created a new Counterintelligence Center at the Agency. The center works to protect the Agency's foreign operations and the security of all Agency components against penetration by foreign security or intelligence services. This center was badly needed and, for historical reasons I don't have time to discuss, too many things were falling between chairs in the absence of this new and important development. The Counterintelligence Center not only provides analysis of hostile intelligence threats and past espionage cases, it also provides instruction for our people going abroad. The CIA is authorized to collect information on yet another problem: the targets, the victims, and the hostages of international terrorist 7 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 organizations. This is a very important role for intelligence. The CIA is also authorized to collect information on Americans who may be engaged in international terrorist activities. During the past three and a half years, there have been 253 cases in which some sort of counterterrorist actions -- efforts to prevent terrorism -- were taken on the basis of intelligence information collected and disseminated by the Agency. We can't say in all of those cases that the information or measures taken were solely responsible for the preventions, but they clearly had a role and that is important to us. In one such case, the Agency received a report that terrorists planned to assassinate a senior American diplomat in a Middle Eastern country when he arrived for a meeting. When the diplomat was informed of the report, he confirmed that he was to have such a meeting. At the last moment, he arranged for the meeting to be held elsewhere, thus escaping an attempt on his life. On numerous occasions in recent years, the Agency has received reports of planned terrorist attacks on our embassies in several parts of the world, particularly the Latin American countries of Colombia, Peru, and El Salvador. In each case, the embassy, upon receiving such a report, increased its security. On several occasions, a source has subsequently informed us that this increased security persuaded the terrorist group to cancel its plans to attack. But in spite of such successes, last year the property and citizens of over 84 nations were the victims or targets of international terrorist attacks -- attacks that resulted in nearly 3,000 casualties. Information collected for this year indicates that the citizens and property of almost 70 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 ? countries already have been the victims of international terrorism. These figures support a trend. Since 1981, we have noticed a steady increase in international terrorism worldwide. In 1981, we recorded close to 500 incidents, in 1985 almost 800 and, if early trends continue, we could register almost 900 acts of international terrorism by the end of this year. And I think that we should keep in mind that about half of these international terrorist incidents are directed against U.S. persons, U.S. property, or U.S. institutions around the world. The CIA, cooperating with other intelligence and law enforcement organizations in accordance with the National Security Act of 1947, has collected valuable information about terrorist groups. Some of the most useful information has come from walk?ins -- terrorists who wish to defect from their organizations. By protecting, and in some cases resettling, these individuals, we have been able to gain their cooperation. They have told us about their former colleagues, about who finances and protects their organization, the location of their headquarters, and the names of their leaders. Such information is often vital in protecting both U.S. and allied interests overseas. We learned, for example, that the Palestinian terrorist, Abu Nidal, had an extensive international commercial network that dealt in the gray arms market. This network had key offices in Poland, East Germany, and several other countries. By using this information, the U.S. State Department delivered a series of diplomatic demarches to the governments of these countries expressing U.S. concern about the presence of these businesses As a result, the companies were closed down. 9 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 We also keep track of the movements of wanted terrorists. If our government has an outstanding warrant for the arrest of such individuals, we are able to make this information available to judicial authorities so that they can locate and apprehend them. In some cases, the United States asks for extradition. In other cases, as in that of Fawaz Yunis, wanted for the June 1985 hijacking of a Jordanian airliner which carried U.S. citizens, our information enabled the FBI to arrest Yunis in the Mediterranean. We worked with the Trevi Group, the organization of the ministers of interior for the European free countries who are united in an effort to end sanctuary for terrorists. An important effort if we are going to succeed against terrorism. We share information with foreign governments on names of potential terrorists, including aliases used and false documentation, that allows them to add these names to their watchlists. Such improved, border control enabled one government to arrest a well-known supporter of several terrorist organizations. Information has also been used to deny entry and safe haven to known terrorists and their associates. I understand today that there was an important development in the Hammadi case -- the terrorist arrested and now on trial in West Germany. And over the summer we were instrumental in giving positive identification of one of the principal terrorists who planted an underseat bomb in an airplane going from Tokyo to Honolulu a few years ago -- an incident resulting in the death of a young Japanese boy. I'd like to say just a brief word about what the FBI is doing in the United States because I think that it is a record that has gone largely unnoticed, and it shows that considerable credit is due to the men and women who are out there laboring to make it possible for us to be safe and free in 10 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 this country. While this trend has been developing worldwide, the number of bombings and terrorist incidents in the United States has gone from about 100 a year when I took office to less than a dozen in the last two years. And there have been very few casualties. They have done this not just as police officers, because that's after the fact. They've done it by developing good intelligence on the workings of international and domestic terrorist groups in the United States and by developing criminal, prosecutable cases against them. And they've done it with strict adherence to Attorney General guidelines on terrorist investigations which permit this form of intelligence?gathering. And I know that such investigations are always sensitive and apt to attract criticism when they do not go 100?percent as one would wish. In the past year there has been considerable speculation -- and I think undue criticism -- about one particular terrorist investigation, mostly because of its mischaracterization. It was said that this investigation was a widespread investigation of the critics of the Reagan Administration. It had nothing at all to do with the Reagan Administration. It was said that it involved the investigation of over 150 individuals and organizations. My understanding is that it involved about a half dozen organizations. It was said that it was massive. My understanding is that it involved five man years per year for two years, ten man years in all. Hardly massive. It has been charged that it involved highly sensitive and intrusive techniques. It did not involve electronic surveillance. It did not involve undercover operations. It did not involve searches. The investigators were criticized for taking down some license numbers and taking some photographs. This case did not produce an 11 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 indictment and it was closed a few years ago. It is only now receiving scrutiny and criticism. And if there were flaws in it, and I'm sure there were, they will be brought to light. , But I think that we have to take into account the security that good intelligence has produced for this country in asking ourselves whether or not we can afford the taking of a few license numbers and a few photographs in the interest of our national security and our personal safety. I have been making the point that effective counterintelligence and counterterrorism programs are critical to our national security. And they are certainly critical to the physical security of our citizens. But I want to emphasize as well that how the CIA and other intelligence agencies carry out their responsibilities is of equal importance to our country. We are subject to specific laws and we operate under internal procedures approved by the Attorney General. In addition, my General Counsel's staff briefs employees -- both at home and abroad -- to ensure that those Agency employees who deal with issues that affect the constitutional rights of American citizens know what our laws and procedures are. My Office of General Counsel also works closely with the Office of Intelligence Policy and Review at the Department of Justice in dealing with those types of activities that may require Attorney General authorization. They work together to examine relevant issues and obtain the necessary approvals, consistent with applicable requirements of our law. We want to catch spies and curb terrorism, but we will not circumvent our own laws to do so. We must maintain absolute fidelity to our laws and our rules -- rules imposed to ensure our citizens that we are indeed accountable. I do not think the CIA, or the FBI, or any member of the Intelligence 12 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Community is exempt from this principle. In fact, I believe that it is the key to public acceptance of our vitally necessary work. We must, in the end, have both safety and liberty. The balance between the right to be let alone and the right to be kept safe and free is central to our profession and to our heritage. And in our ability to strike that balance true, lies our future as a land of ordered liberty. Former Supreme Court Justice Robert Jackson must have had this balance in mind when he observed that the constitutional Bill of Rights of the United States was not a suicide pact. The protections it includes and affords to us must be rationally applied if we are to prevail against those who would threaten our national security. I really believe that we have sufficient legislative restraints and that we should stop looking for legislative solutions to problems as they emerge, because such "solutions" can impede necessary work in the interest of national security. Rather, what is needed is a better understanding of the requirements of existing law and the discipline -- the iron determination to see that these laws are scrupulously observed. And then there are people, the people who work for you in law enforcement and in the Intelligence Community. I am looking for a certain kind of person and I am getting them, with applications coming in at the rate of over 1,000 a month. People who are risk takers, but not risk seekers. People who are not particularly interested in fame or fortune, but who see in our work an opportunity to pursue their highest aspirations for a safer and a better world. This blend of requirements and balancing was best expressed by an old friend -- Sir William Stephenson. And I can think of no better place to 13 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2 recall his words, than in this, his homeland of Canada. In the introduction to the book, A Man Called Intrepid, which chronicled his remarkable intelligence accomplishments during the Second World War, Sir William wrote: "Perhaps a day will dawn when tyrants can no longer threaten the liberty of any people. When the functions of all nations, however varied their ideologies, will be to enhance life, not to control it. If such a condition is possible, it is in a future too far distant to foresee. Until that safer, better day, the democracies will avoid disaster, and possibly total destruction, only by maintaining their defenses. "Among the increasingly intricate arsenals across the world, intelligence is an essential weapon, perhaps the most important. But it is, being secret, the most dangerous. Safeguards to prevent its abuse must be devised, revised, and rigidly applied. But, as in all enterprise, the character and wisdom of those to whom it is entrusted will be decisive. In the integrity of that guardianship lies the hope of free people to endure and prevail." I subscribe fully to this statement and I believe deeply that a nation dedicated to the rule of law can protect itself and its heritage in no other way. Thank you. 14 Declassified and Approved For Release 2014/05/12 : CIA-RDP99-00777R000400800001-2