LAW AND NATIONAL SECURITY INTELLIGENCE REPORT
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP90-00806R000100080015-6
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
10
Document Creation Date:
December 22, 2016
Document Release Date:
September 13, 2010
Sequence Number:
15
Case Number:
Publication Date:
December 1, 1981
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
![]() | 1.03 MB |
Body:
STAT
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
/A ;;\ AMERICAN BAR ASSOCIATION
STANDING COMMITTEE Law and National Security
INTELLIGENCE REPORT
Morris I. Leibman, Chairman December 1981
State Department Documents
Soviet Disinformation and Forgeries
Continued front previous issue
Case Studies
The Soviet Anti-TNF Modernization Campaign in
Europe. The Soviet campaign in Europe against
NATO TNF modernization is a good illustration of
Soviet use of "active measures." After a long and un-
precedented buildup of Soviet military strength in
Europe, including the deployment of new SS-20 nu-
clear missiles targeted on Western Europe, the NATO
ministers in December 1979 decided to modernize
NATO's TNF capabilities. The Soviets immediately
began an ongoing, intensive campaign to develop an
environment of public opinion opposed to the NATO
decision. (Of course, not all opposition to the TNF
modernization decision is inspired by the Soviet
Union or its "active measures" activities.)
In this campaign, Soviet diplomats in European
countries pressured their host governments in many
ways. In one European country, the Soviet ambas-
sador met privately with the Minister of Commerce
to discuss the supply and price of oil sold by the Soviet
Union to that country. During the discussion, the am-
bassador gave the minister a copy of Leonid Brezh-
nev's Berlin speech dealing with TNF. He suggested
that if the host government would oppose TNF mod-
ernization, the Soviet Ministry of Foreign Affairs
might persuade the Soviet Ministry of Foreign Trade
to grant more favorable oil prices.
Moscow has spurred many front groups to oppose
the TN F decision through well-publicized conferences
and public demonstrations. To broaden the base of the
anti-TNF campaign, front groups have lobbied non-
Communist participants, including antinuclear groups,
pacifists, environmentalists, and others. In some
cases, the activities of these broad front groups have
STAT
been directed by local Communist parties. Soviets
have predictably devoted the greatest resources to
these activities in NATO countries where opposition
to the TNF modernization decision is strongest.
In the Netherlands, for example, the Communist
Party of the Netherlands (CPN) has set up its own
front group-Dutch Christians for Socialism. In No-
vember 1980, the Dutch "Joint Committee-Stop the
Neutron Bomb-Stop the Nuclear Armament Race,"
which has ties to the CPN, sponsored an interna-
tional forum against nuclear arms in Amsterdam. The
forum succeeded in attracting support from a variety
of quarters, which the CPN is exploiting in its cam-
paign to prevent final parliamentary approval of the
TNF decision.
Conference on First Amendment,
National Security Planned
The ABA Committee on Law and National Security
and the Center for Law and National Security of the
University of Virginia Law School are presenting a
conference on the First Amendment and national
security. The conference will review recent court de-
cisions, pending legislation, and current problems
faced by those responsible for safeguarding both civil
liberties and national security.
The conference will be held on January 8 (keynote
dinner), 9 and 10, 1982, at the Sugarbird Hotel, Water
Island, St. Thomas, Virgin Islands. Efforts are being
made to charter an Eastern Airlines jet to fly to St.
Thomas from Washington, D. C. (BWI) at $400 round
trip per person. Lawyers interested in attending should
contact Mari Normyle, Administrator of the Center,
at the School of Law, University of Virginia, Char-
lottesville, Virginia 22901, Tel.: 804-924-5066.
Spouses are welcome.
Editor: William C. Mott. Associate Editor: David Martin. Standing Committee on Law and National Security,
ABA, 1155 East 60th Street, Chicago, Ill. 60637.
Copyright ?1981 American Bar Association
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Soviet Disinformation and Forgeries
Con tinue d.frorn page l
The Soviet Campaign Against Enhanced Radiation
Weapons (ERW). The Soviets, throughout 1977 and
early 1978, carried out one of their largest, most ex-
pensive, and best orchestrated "active measures"
campaigns against enhanced radiation (neutron) weap-
ons. (Again, not all opposition to the U. S. decision to
produce the enhanced radiation weapon is Soviet
inspired.)
This Soviet campaign has had two objectives: first,
to halt deployment of ERW by NATO; second, to
divide NATO, encourage criticism of the United
States, and divert Western attention from the growing
Soviet military buildup and its threat to Western
Europe and the world.
? Phase one occurred throughout the summer of
1977. The Soviets staged an intense propaganda blitz
against ERW and the United States, involving numer-
ous demonstrations and protests by various "peace
councils" and other groups. This phase culminated in
a Soviet-proclaimed international "Week of Action."
? Phase two began in January 1978 with Soviet
propaganda exploitation of a letter from Leonid
Brezhnev to Western heads of government warning
that production and deployment of ERW constituted a
serious threat to detente. A barrage of similar letters
from members of the Supreme Soviet went to Western
parliamentarians. Soviet trade union officials for-
warded parallel messages to Western labor counter-
parts.
? Phase three came in early 1978 with a series of
Soviet-planned conferences, under different names
and covers, designed to build up the momentum of
anti-ERW pressure for the U.N. Special Session on
Disarmament of May-June 1978. These meetings and
conferences, held throughout February and March,
were organized either by the World Peace Council or
jointly sponsored with established and recognized in-
dependent international groups.
The Soviet campaign succeeded in complicating
allied defense planning and focusing criticism on the
United States. A top Hungarian Communist Party offi-
cial wrote that "the political campaign against the
neutron bomb was one of the most significant and suc-
cessful since World War Two." The propaganda cam-
paign did not end in 1978; it was incorporated into the
anti-TNF effort. With the recent U. S. decision to
proceed with ERW production, the Soviets have be-
gun a new barrage of propaganda and related "active
measures."
Soviet "Active Measures" Toward El Salvador. Com-
plementing their overt public support for the leftist
insurgency in El Salvador, the Soviets have also en-
gaged in a global "active measures" campaign to
sway public opinion. These activities include a broad
range of standard techniques, including forgeries, dis-
information, attempted manipulation of the press, and
use of front groups. The obvious dual purpose has
been to increase support for the insurgency while try-
ing to discredit U. S. efforts to assist the Government
of El Salvador.
In 1980, Salvadoran leftists met in Havana and
formed the United Revolutionary Directorate (DRU),
the central political and military planning organization
for the insurgents. During the same period, the Salva-
doran Revolutionary Democratic Front (FDR) was
established, with Soviet and Cuban support, to repre-
sent the leftist insurgency abroad. The FDR and DRU
work closely with Cubans and Soviets, but their col-
laboration is often covert.
The FDR also supported the establishment of Sal-
vadoran solidarity committees in Western Europe,
Latin America, Canada, Australia, and New Zealand.
These solidarity committees have disseminated prop-
aganda and organized meetings and demonstrations in
support of the insurgents. Such committees, in coop-
eration with local Communist parties and leftist
groups, organized some 70 demonstrations and pro-
tests between mid-January and mid-March 1981 in
Western Europe, Latin America, Australia and New
Zealand.
The FDR and DRU are careful to conceal the So-
viet and Cuban hand in planning and supporting their
activities and seek to pass themselves off as a fully in-
dependent, indigenous Salvadoran movement. These
organizations have had some success in influencing
public opinion throughout Latin America and in West-
ern Europe. The effort of the insurgents to gain legit-
imacy has been buttressed by intense diplomatic ac-
tivity on their behalf. For example, at the February
1981 nonaligned movement meeting in New Delhi, a
30-man Cuban contingent, cooperating closely with
six Soviet diplomats, pressed the conference to con-
demn U. S. policy in El Salvador.
At another level, the Soviet media have published
numerous distortions to erode support for U. S. policy.
For example, an article in the December 30, 1980
Pravda falsely stated that U. S. military advisers in
El Salvador were involved in punitive actions against
noncombatants, including use of napalm and herbi-
cides. In another particularly outrageous distortion, a
January 1, 1981 article in the Soviet weekly Literatur-
naya Gazeta falsely stated that the United States was
preparing to implement the so-called centaur plan for
"elimination" of thousands of Salvadorans.
Campaign Against the U. S.-Egyptian Relationship
and the Camp David Process. In the Middle East,
Moscow has waged an "active measures" campaign
to weaken the U. S.-Egyptian relationship, undermine
Continued on hack page
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
The First (and Last?) Published
Opinion of the Intelligence Court
The United States Foreign Intelligence Surveillance
Court (FISC) issued its first, and perhaps its last, pub-
lished opinion on June 11, 1981. Since it is not to be
found in any official reporter, as a service to the pro-
fession it is published in full below. Its genesis, how-
ever, is more interesting than its content-and more
revealing of the secret operations of the court.
The FISC was established by the Foreign Intelli-
gence Surveillance Act of 1978 (FISA), 92 Stat. 1783,
50 U.S.C. ? 1801, with the sole function "to hear ap-
plications for and grant orders approving electronic
surveillance ... under ... this Act." It is not a full-time
court nor even, we understand, a court that ever as-
sembles en bane except for an annual conference. All
its judicial business can be conducted by its judges
acting individually-and perhaps must be conducted
in that fashion since the Act provides for applications
to "a judge," 18 U.S.C. ? 1804(a), issuance of orders
by "the judge," 18 U.S.C. ? 1805(a), contains no pro-
vision for rehearing en bane, and routes all appeals
from denials of applications to a separately consti-
tuted appellate panel, 18 U.S.C. ? 1803(b). But cf.
Textile Mills Corp. v. Commissioner, 314 U. S. 326
(1941). The full court consists of seven district
court judges designated by the chief justice of the
United States.
The problem which led to creation of the court is
simple enough to understand: Ordinary warrants for
electronic surveillance, issuable under Title III of the
Omnibus Crime Control and Safe Streets Act, 18
U.S.C. ? 2510, are unsatisfactory with respect to for-
eign intelligence and counterintelligence investiga-
tions for a number of reasons: (1) Sometimes the re-
quirement of "probable cause" to believe that crim-
inal activity is involved cannot be met-especially
when intelligence (as opposed to counterintelligence)
information is sought. (2) The requirement for serv-
ice of the warrant-even if it is only complied with (as
Title III permits) after the surveillance is completed-
will often destroy the usefulness of the operation.
(3) District courts in general do not have secure facili-
ties adequate for the protection of the top-secret infor-
mation which the applications contain (highly desired,
needless to say, by the intelligence services of other
countries).
Before passage of the FISA, foreign intelligence and
counterintelligence surveillance was simply extra-
judicial. The authorizing official was the attorney gen-
eral, who was charged by executive order with assur-
ing the existence of conditions that would prevent the
electronic "search" from being "unreasonable" and
hence unconstitutional. (The text of the Fourth
Amendment, of course, does not categorically require
warrants for all searches, but merely prohibits searches
that are "unreasonable." Other examples of warrant-
less searches exist, such as searches in the course of
arrest.) The Watergate era shattered public confidence
in the adequacy of this arrangement, and the FISC
was the result.
It is noteworthy, and central to the present story,
that the FISA covers only electronic surveillance. If it
seems strange that foreign intelligence and counterin-
telligence wiretaps should require a warrant while
physical searches for the same purposes (so-called
"black-bag jobs," to use the pejorative term) should
not, the explanation depends upon whom you ask.
The president and his lawyers would maintain that,
in extremis, even wiretapping does not require ajudi-
cial warrant, despite the FISA-that if, in a particular
case, the procedures of that legislation should impair
the president's ability to protect the national security
he would be authorized by his powers under the Con-
stitution to proceed without them. Civil libertarians,
on the other hand, would maintain that there is no
presidential authority to proceed without a judicial
warrant for either electronic or physical searches. But
a nonargumentative and entirely accurate (if less sub-
stantive) explanation is simply that, when the FISA
was passed, the civil libertarians would not accede to
the issuance of warrants for physical searches with-
out "probable cause" to believe the existence of crim-
inal activity; and since the president believed he had
the power to conduct such searches even without stat-
utory authorization, the point was simply finessed. As
the House Intelligence Committee report disingenu-
ously explained:
Although it may be desirable to develop legis-
lative controls over physical search tech-
niques, the committee has concluded that
these practices are sufficiently different from
electronic surveillance so [sic] as to require
separate consideration by the Congress. The
fact that the bill does not cover physical
searches for intelligence purposes should not
be viewed as congressional authorization for
such activities. H. Rep. 95-1283, 95th Cong.,
1st Sess. at 53 (1978).
Then, after passage of the FISA and during the term
of a Carter administration imbued with civil libertarian
concerns (and perhaps concerned also with self-pro-
tection against civil and criminal liability), the plot
thickens. Attorney General Civiletti took the position
that the FISC had authority to approve physical
searches, and the Justice Department sought and was
granted three such warrants. It is not clear how thor-
oughly the issue of jurisdiction was briefed for the
issuing judges, nor whether they consulted with their
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Intelligence Court Opinion
Continued from page 3
colleagues. Since it is difficult (no, to be frank, utterly
impossible) to find any jurisdiction to issue warrants
for physical searches in the FISA, the department pre-
sumably relied, if it addressed the issue, upon a theory
of "inherent or implied authority"-a sort of doctrine
of "necessity" because Fourth Amendment considera-
tions were involved. (This was the position set forth in
a department memorandum to FBI Director Webster.
Memorandum from Kenneth C. Bass III to William H.
Webster, Oct. 14, 1980, reprinted in H. Rep. 96-1466,
96th Cong., 2d Sess. at 8 (1980).) Even that theory is
difficult to sustain, since to the extent there is a Fourth
Amendment "necessity," it is a puzzlement why the
necessity should be met by the FISC-which the leg-
islative history clearly demonstrates was not intended
to have the power-rather than by the regular district
courts.
The Civiletti applications sought to meet this prob-
lem, apparently, by seeking the warrants from the
FISC judges "in their dual capacities as U. S. district
court judges and as judges designated to serve on the
Foreign Intelligence Surveillance Court." Bass memo-
randum, supra, H. Rep. 96-1466 at 9. But this is an
attempt to make one strong link by joining two weak
ones; the district judges assuredly have explicit au-
thority to approve physical searches (which the FISC
does not possess), but they lack explicit authority
(which the FISC does possess) to proceed without
probable cause, to accept as adequate the manner of
proof specified in the FISA, and to dispense with serv-
ice of the warrant. It is most difficult to find all the
latter details constitutionally "inherent" or "implied."
In all of this, the Civiletti Justice Department (judg-
ing, again, from the Bass memorandum) sought to
maintain the position that though the warrants were
obtainable they were "neither constitutionally nor
statutorily required." "The Judiciary," it asserted,
"has concurrent jurisdiction with the Executive
Branch to authorize physical searches for intelligence
purposes." Id., H. Rep. 96-1466 at 9. The problem
with this is that one of the few apparent certainties of
Fourth Amendment law is that when a judicial war-
rant can be obtained (without imparing the govern-
ment function for which it is sought), it must be ob-
tained, and the search is ipso facto "unreasonable,"
and hence unconstitutional, without it.
Enter the Reagan administration, which probably
was troubled by the last point, and certainly did not
believe that the judges of the FISC (even while wear-
ing their district court robes beneath their FISC
cloaks) had the authority to issue physical-search war-
rants. Consider, however, the position of the depart-
ment officials: The FISC had issued warrants three
times; and since it is true that a warrant which can be
obtained must be obtained, the attorney general would
be acting with reckless disregard of the Fourth Amend-
ment rights of the surveillance targets (not to mention
his own financial security and physical freedom) to
gamble on the most recent department interpretation
of the law. The resourceful solution sought by the de-
partment was to apply to the FISC for a warrant and
to argue that the court had no authority to grant the
application.
There was, apparently, reason to believe that the
court would agree with the new department position.
Even before the change of administrations -and per-
haps prompted by concerns expressed by the Senate
and House Intelligence Committees (reflected in their
subsequently issued reports cited herein)-the FISC
judges had apparently had second thoughts about the
physical-search subpoenas they had issued, and re-
quested a memorandum on the subject from their law
clerk. This was produced on Oct. 30, 1980, and con-
cluded that no authority existed. H. Rep. 96-1466
at 17.
In any case, the Reagan Justice Department pro-
ceeded with the physical-search application it hoped
to have denied, and it won-which is to say it lost-
by which I mean the application was denied. Judge
Hart, to whom the application was made, found lack
of jurisdiction. The last paragraph of his opinion sum-
marizes his reasoning:
In view of the clearly expressed intent of
Congress to withhold authority to issue or-
ders approving physical searches, it would be
idle to consider whether a judge of the FISC
nevertheless has some implied or inherent
authority to do so. Obviously, where a given
authority is denied it cannot be supplied by
resort to principles of inherent, implied or
ancillaryjurisdiction.
The opinion is careful to negate authority on the part
of judges under either FISC cloak or district court
robe-which is important, because uncertainty as to
whether a regular district judge could issue the war-
rant would perpetuate the department's dilemma.
Judge Hart noted, moreover (gratuitously, perhaps,
but most helpfully), that "the other designated judges
of the FISC concur in this judgment."
The episode is surely bizarre; indeed, it must be
super-bizarre, for otherwise it would not stand out
from the rest of the landscape in the foreign intelli-
gence field. It may contain, however, some useful
lessons. One of the criticisms levelled against the
concept of a foreign intelligence surveillance court
when it was first proposed was the incompatibility of
secret action with courts of law. Public and profes-
sional scrutiny of actions and of the stated reasons for
Continued on page 6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Seminar on Intelligence
For Teaching Faculty Planned
The Consortium for the Study of Intelligence (CSI),
a project of the National Strategy Information Center,
will sponsor a second annual faculty seminar on the
teaching of intelligence from July 16-25, 1982, at Bow-
doin College in Maine. The objectives of the seminar
are to deepen substantive knowledge of the intelli-
gence process and product, expand and improve
teaching of intelligence-related concerns, and to pro-
mote professional contacts among scholars in the field.
The seminar format will include: lectures by spe-
cialists with diverse experience and perspectives; in-
tensive discussions following each lecture; workshops
on teaching methods, review of various teaching and
research_ resources; and display of materials collected
or developed by the CSI staff.
Applications are invited from law professors, espe-
cially those interested in constitutional, international,
national security and intelligence-related law. CSI
will pay transportation and room and board costs.
Approximately 25 teaching faculty from a variety of
disciplines will be selected, and final notifications will
be mailed by the middle of March.
For further information and application forms
contact:
Dr. Roy Godson, Coordinator
Consortium for the Study of Intelligence
1730 Rhode Island Avenue, N.W., Suite 601
Washington, D. C. 20036
Tel.: 202 - 296-6406
The deadline for applications will be February 17,
1982.
Dezinformatsiya or
Misleading the Adversary
Editor's Note: The Chairman of the ABA Standing
Committee on Law and National Security has passed
on to its a request from a reader of the Intelligence
Report that we publish a selected bibliography of
books and mini-books on the subject of intelligence
and national security law. Fortuitously, the National
Strategy Information Center, which has close ties
with the committee in that its President, Frank Bar-
nett, is the committee's educational consultant, has
just published the fourth in a series of books on the
subject Intelligence Requirements for the 1980's. The
latest hook in the series, Covert Action, is reviewed
below.
Covert intelligence is an arcane art which is part
and parcel of the whole Soviet effort to defeat the
West. Readers of this Report will recall Ily Dzhirk-
velov, the KGB defector, in his interview published
in our July 1981 issue described the KGB disinforma-
tion service and some of its covert operations around
the world. Similarly, Galina Orionova, the defector
from Georgy Arbatov's American Institute, stated in
our September 1981 issue: "Disinformation of for-
eigners, particularly of the Americans, is the first duty
of every ISKAN employee."
Yet General Vernon Walters in Covert Action ac-
curately describes the Soviet impression ofAmerica in
these words:
Their attitude toward intelligence is typical of
their guilt-ridden state. They have always
been ambivalent toward it. When they do not
feel threatened, they regard it as immoral or
else disband it entirely.
It's almost as though we were back in the days when
Secretary of War Henry Stimson said of code-break-
ing operations in 1940, "Gentlemen do not read each
other's mail."
The Soviets have no such compunctions. Their atti-
tude toward intelligence was perhaps best described
by Winston Churchill when he told Secretary For-
restal the Soviets
had no understanding of such words as "hon-
esty," "honor," "trust," and "truth"-in fact,
they regard these as negative virtues. They
will, he said, try every door in the house, enter
all rooms which are not locked, and when
they come to one that is barred, if they are
unsuccessful in breaking through it, they will
withdraw and invite you to dine genially that
same evening.
The term "covert action" is essentially an American
one that came into use during the post-World War
II period. Few other nations make such a distinction
between overt and covert activities. This particular
instrument of influencing people and events is viewed
by most as a routine means for carrying out policy.
And indeed, the ability to penetrate and influence for-
eign nations is an important instrument in the hands of
any ruler. The Soviets have developed an impressive
array of covert action instruments, while the U. S.
has been engaged in unilateral disarmament in this
area. Soviet disinformation, clandestine broadcasting,
media penetration, agents of influence, blackmail and
forgery sew dissension and confusion in the West, but
have elicited almost no counter action. Many U. S.
leaders have taken the view that these measures are
immoral, or could get us into trouble, making even dis-
cussion of them unseemly. The result has been a fail-
ure to make use of covert action to support U. S. ob-
jectives, as well as to defend the United States against
the covert measures of foreign governments.
Continued on page 6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Misleading the Adversary
Continued from page 5
A new study on Covert Action by the Consortium
for the Study of Intelligence in its series Intelligence
Requirements for the 1980's examines how this has
happened, and includes many prescriptions to revive
Western covert capabilities. The study is edited by
Dr. Roy Godson of Georgetown University, the Co-
ordinator of the Consortium.
Contributors to the study made the following
observations
- Soviet covert action will continue on a global
scale. KGB penetration has proceeded with remark-
able ease in the open societies of the West.
-There are political, economic and social weak-
nesses in the Soviet Union which, should we choose
to do so, can be targeted and exploited. In the face of
adversaries for whom "active measures" are basic
tools of influence and power, Western lack of response
may prove extremely damaging.
- Our past record in covert action reveals a crip-
pling failure to integrate covert action into foreign
policy.
- Insurgencies will threaten pro-Western nations in
the 1980's. U. S. paramilitary operations alone may
ensure survival of some friendly nations. The U. S.,
however, must be willing to initiate such actions, in-
cluding support for coups and countercoups, rather
than merely reacting to them.
-Specific measures should be undertaken to raise
morale "in the trenches," to revive covert action plan-
ning staffs, and to encourage recruitment and training
of Americans and foreigners.
An exceptional group of contributors addressed
these themes combining the insights of former intel-
ligence professionals, academics, and active congres-
sional and executive branch experts. Dr. Adda Boze-
man, Professor of International Relations at Sarah
Lawrence College, dissects the cultural blinders which
have disarmed the West, and General Vernon Walters
(former deputy director of Central Intelligence and
now an ambassador-at-large and an advisor to Secre-
tary of State Haig) suggests how the U. S. might iden-
tify and exploit the vulnerabilities in the Soviet em-
pire. Dr. Angelo Codevilla (of the staff of the Senate
Select Committee on Intelligence) surveys the par-
ticular vulnerabilities in democratic, authoritarian and
totalitarian societies: Theodore Shackley assesses
paramilitary threats and possible responses based on
30 years as a CIA station chief; and Donald Jameson,
a former CIA covert action specialist, lays bare the
persistence of Soviet aggression by covert means.
Each chapter of Covert A ction includes both an orig-
inal paper contributed by the author with informed
and lively commentary by discussants, including Dr.
Paul Seabury, now a memberof the President's Foreign
Intelligence Advisory Board; John Barron, author of
the book The KGB: Ray Cline, former deputy director
for intelligence, CIA; Sen. Malcolm Wallop and Reps.
C. W. "Bill" Young and Les Aspin, members of the
Senate and House Intelligence Committees.
They all agree that our ability to sustain the Western
alliance and to reverse the influence of pro-Soviet and
anti-Western elements in the Third World demands a
re-thinking of the role of covert measures as an inte-
gral part of foreign policy.
Covert Action is the fourth volume in the series In-
telligence Requirements for the 1980's produced by
the Consortium for the Study of Intelligence, a project
of the National Strategy Information Center. This
series is unique in its attempt to explain the four major
components of intelligence -analysis and estimates,
counterintelligence, clandestine collection, and covert
action -and their symbiotic relationships.
Since 1979, the Consortium has sponsored five
research colloquia for which papers have been com-
missioned from high-ranking former intelligence pro-
fessionals, congressional intelligence experts, and aca-
demics with special knowledge of this subject.
Other volumes in the series are: Elements of Intel-
ligence (1979); Analysis and Estimates (1980); Coun-
terintelligence (1980), and Clandestine Collection,
due out in spring 1982.
Intelligence Requirements for the 1980's: Covert
Action is $7.50 (paperback), and is distributed by
Transaction Books. It and the volumes listed above
may be obtained from the National Strategy Informa-
tion Center, Inc., l l l East 58th Street, New York,
N.Y. 10022.
Intelligence Court Opinion
Continued from page 4
actions was, it was said, the traditional check against
judicial arbitrariness and the sole assurance of judicial
responsibility. And publication of opinions was the
only means of achieving consistency through a body
of rational precedent. Ordinary warrants, even though
issued ex parte, were not insulated from this process,
since they would often be challenged and reviewed in
the course of subsequent public criminal proceedings.
Intelligence warrants, by contrast, were meant never
to see the light of day.
The outcome of the present case does not vindicate
that concern, and may well indicate that it is exagger-
ated. Even before the change in administrations, the
FISC appeared en route to correcting its error, per-
haps because the oversight activities of the House and
Senate Intelligence Committees performed the func-
tion that public and professional scrutiny normally
discharges. It may be that there was something dis-
tinctive about the makeup of the committees or about
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
the nature of the issue which precludes the generaliza-
tion that oversight will always perform this role. Even
so, it must at least be acknowledged that the system
worked in the present case.
It was also said, at the time the FISC was created,
that the expectation of greater protection from ajudi-
cial panel was a grand illusion; that, especially in such
matters involving national security, the courts would
rarely second-guess the determinations of the Execu-
tive. The warrant procedure, these voices warned,
would in fact reduce protection of civil liberties, by
trading this meaningless judicial involvement for the
greater exposure to civil liability (and hence the greater
attentiveness) that executive action without the pro-
tection of a warrant entails. And questions of civil lia-
bility aside, it would diminish the sense of responsibil-
ity of the attorney general-making what is, as a
practical matter, his final decision appear to be only an
application on his part to a higher tribunal. These con-
cerns do seem to be vindicated by the present case. If
the FISC could have been misled by the Justice De-
partment so easily on a pure point of law, how much
of an obstacle can it possibly present with respect to
the more problematic and debatable factual issues
bearing upon the propriety of a warrant?
The statistics suggest (though they can certainly
not be said to demonstrate) that the FISA has made
electronic surveillance easier. According to testimony
given by Attorney General Levi to the Senate Select
Committee to Study Government Operations with
Respect to Intelligence Activities in 1975, the number
of foreign intelligence and counterintelligence elec-
tronic surveillances in 1974 was 232. In 1980, accord-
ing to the annual report which ? 107 of the FISA re-
quires the attorney general to file with the Adminis-
trative Office of the U. S. Courts and the Congress, it
was 319. Assuming (what may well not be the case)
that the need for surveillance has been relatively stable
during this period, either of two conclusions may be
drawn: (1) with reduced accountability for their ac-
tions assured by the shield of a judicial warrant, at-
torneys general have been conducting surveillance
that should not be conducted and would not have been
conducted before; or (2) relieved from the unreason-
able pressure of possible civil liability for today's
activities to be imposed on the basis of tomorrow's
notions of security needs and libertarian rights, at-
torneys general have been conducting surveillance
that should be conducted but was not conducted
before.
One thing, at least, is clear: the Executive likes the
Act. As FBI Director Webster said at the June 1980
workshop sponsored by the ABA Standing Committee
on Law and National Security and the University of
Chicago (quoted in the Senate Intelligence Commit-
tee's 1980 report, S. Rep. No. 96-1017, 96th Cong.,
2d Sess. at 6): "[O]n the basis of our experience, ... it
works well and has not had a deleterious effect on our
counterintelligence effort." Indeed, the statistics on
warrant approvals being what they are, one suspects
that the Executive must be considering the desirability
of extending the FISA to cover physical searches as
well. The impediment, of course, is that the same op-
position from libertarians which prevented that exten-
sion in 1978 still exists-and has probably been stiff-
ened by the same statistics. I would guess that the
illogical compromise reached in 1978 is likely to en-
dure, and that the half-warrantless regime of foreign
intelligence surveillance will be with us for some time.
One last moral, or perhaps merely a wry observa-
tion, suggests itself: How nice it is to be a judge! The
FISC now acknowledges, in effect (though it does not
refer to the fact in its opinion), that it wrongfully ap-
proved three physical searches. Had the attorney gen-
eral given such wrongful approval, he would have
serious worries about civil liability, see Bivens v. Six
Unknown Federal Narcotics Agents, 403 U. S. 388
(1971). Which means, of course, that even when the
attorney general's approval is rightful it lets him in for
years of annoyance and expense in defending civil
litigation. (Suits are still pending against Attorneys
General Levi, Bell, and, I presume, Civiletti.) But as
far as a confessedly wrongful approval by the FISC is
concerned, not to worry. The Supreme Court has
perceived that there is something special about
courts that requires absolute civil immunity, even
when the action taken "was in error, was done mali-
ciously, or was in excess of ... authority." Stump v.
Sparkman, 435 U. S. 349, 356 (1978). This absolute
immunity even rubs off on those "participating in the
judicial process," Butz v. Economou, 438 U. S. 478,
509 (1978), such as prosecutors, /mbler v. Pachtman,
424 U. S. 409 (1976), and extends to adjudicating offi-
cers and prosecuting employees in agency proceed-
ings, Butz v. Economou, supra, 438 U. S. at 511-17. It
"stems from the characteristics of the judicial proc-
ess," and is necessary to assure that its beneficiaries
can perform their functions "without harassment or
intimidation," id. at 512, and without risk that their
"discretion ... be distorted," id. at 515. Other officers
of the executive branch, on the other hand - including
most specifically those who must decide whether a
search is lawful and necessary to protect society, see
id. at 505-06-do not require or merit such protection,
and may be sued on the ground that they knew or
should have known they were acting outside the law,
Scheuer v. Rhodes, 416 U. S. 232 (1974). How nice to
be a judge-at least in a society where the rules reflect
the distinctive priorities of (because they are made by)
judges!
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Intelligence Court Opinion
Continued from page 7
IN THE MATTER OF THE APPLICATION
OF THE UNITED STATES FOR AN ORDER
AUTHORIZING THE PHYSICAL SEARCH OF
NONRESIDENTIAL PREMISES AND
PERSONAL PROPERTY
The United States has applied for an order au-
thorizing the physical search of certain real and per-
sonal property. I have decided that as a designated
judge of the United States Foreign Intelligence Sur-
veillance Court (FISC) I have no authority to issue
such an order. I am authorized to state that the other
designated judges of the FISC concur in this judgment.
The FISC was established by the Foreign Intelli-
gence Surveillance Act (FISA), 92 Stat. 1783, 50
U.S.C. 1801. It consists (sec. 103(a)) of seven United
States district court judges designated by the Chief
Justice "who shall constitute a court which shall have
jurisdiction to hear applications for and grant orders
approving electronic surveillance anywhere within
the United States under the procedures set forth in
this Act." As an inferior court established by Con-
gress pursuant to Article III of the Constitution, the
FISC has only such jurisdiction as the FISA confers
upon it and such ancillary authority as may fairly
be implied from the powers expressly granted to it.
Obviously, the instant application implicates a ques-
tion of the jurisdiction of the FISC under the terms of
the FISA. Here, as in any case involving statutory
interpretation, ". . . the meaning of the stature [sic]
must, in the first instance, be sought in the language in
which the act is framed, and if that is plain.. . the sole
function of the courts is to enforce it according to its
terms." Caminetti v. United States, 242 U.S. 470,
485 (1917). In my opinion, the language of the FISA
clearly limits the authority of the judges designated to
sit as judges of the FISC to the issuance of orders
approving "electronic surveillance" as that term is
defined in the act.
"Electronic surveillance" is defined in precise terms
in sec. 101(f). It includes (1) the "acquisition by an
electronic, mechanical, or other surveillance device of
the contents of any wire or radio communication" by
or to a U. S. person in the U. S., (2) the acquisition by
such a device of the "contents of any wire communica-
tion to or from a person in the" U. S., (3) the acquisi-
tion by such a device of the "contents of any radio
communication . . . if both the sender and all intended
recipients are located within the" U. S., and (4) "the
installation or use of" such a device "in the United
States for monitoring to acquire information, other
than from a wire or radio communication." 1
The reference throughout this subsection is to
"electronic, mechanical or other surveillance device."
The purpose is the "acquisition" of "the contents" of
a wire or radio communication or monitoring (par. 4)
to "acquire information, other than from a wire or
radio communication." (Emphasis added.) Clearly,
the thrust is a search, by the use of surveillance de-
vices, for words or other sounds to acquire "foreign
intelligence information" as that term is defined in sec.
101(e). There is not a word in the definitions of "elec-
tronic surveillance" even remotely indicating that the
term encompasses a physical search of premises or
other objects for tangible items.2
The limiting terms of sec. 101(f) apply, of course,
throughout the FISA. As noted above, FISC "shall
have jurisdiction to hear applications for and grant
orders approving electronic surveillance anywhere
within the United States under the procedures set
forth in this Act" (sec. 103(a)); an "application for an
order approving electronic surveillance shall be
made," etc. (sec. 104(a)): "the judge shall enter an ex
parte order as requested or as modified approving the
electronic surveillance if he finds," etc. (sec. 105(a)).
The legislative history of the FISA confirms what
the statutory language so plainly teaches: the FISC
has no jurisdiction in the area of physical searches.
The committee reports deal specifically with the sub-
jects of physical searches and the opening of mail;
they make the same distinction between such searches
and searches by electronic surveillance as is so clearly
drawn in the very terms of the FISA. H. Rep. 95-1283
of the House Intelligence Committee puts the dis-
tinction sharply (p. 53):
1 It will be noted that these definitions limit the authority
to conduct electronic surveillances to the U. S. in a geo-
graphic sense as defined in sec. 101(i). The drafters left to
another day the matter of "broadening this legislation to
apply overseas . . . [because] the problems and circum-
stances of overseas surveillance demand separate treat-
ment." H. Rep. 95-1283, pp. 27-28. See also id., p. 51; S.
Rep. 95-701, pp. 7, 34-35.
2 Paragraph (4) of sec. 101(f) provides for the "installation
or use" of a surveillance device "for monitoring to acquire
information." "This is intended to include the acquisition or
oral communications." H. Rep. 95-1283, p. 52. By implica-
tion, it encompasses the means necessary to make an instal-
lation. This is made clear by the requirement that an applica-
tion to a judge of the FISC state "whether physical entry is
required to effect the surveillance" (sec. 104(a)(8)) and the
provision that an order approving an electronic surveillance
shall specify "whether physical entry will be used to effect
the surveillance." Sec. 105(b)(1)(D). But all that is author-
ized is "physical entry." Such an authorization cannot be
bootstrapped into authority to search entered premises for
tangible items. The "search" in such a situation is limited to
such observation of the premises as may be necessary to
make an effective installation of the surveillance device.
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
The committee does not intend the term "sur-
veillance device" as used in paragraph (4)
[of sec. 101(f)] to include devices which are
used incidentally as part of a physical search,
or the opening of mail, but which do not con-
stitute a device for monitoring. Lock picks,
still cameras, and similar devices can be used
to acquire information, or to assist in the
acquisition of information, by means of phys-
ical search. So-called chamfering devices can
be used to open mail. This bill does not bring
these activities within its purview. Although
it may be desirable to develop legislative con-
trols over physical search techniques, the
committee has concluded that these practices
are sufficiently different from electronic sur-
veillance so as to require separate considera-
tion by the Congress. The fact that the bill
does not cover physical searches for intelli-
gence purposes should not be viewed as
congressional authorization for such activi-
ties. In any case, any requirements of the
fourth amendment would, of course, continue
to apply to this type of activity.
At the end of the paragraph the committee dropped a
footnote stating: "It should be noted that Executive
Order 12036, Jan. 24, 1978, places limits on physical
searches and the opening of mail." That order (43 Fed.
Reg. 3674, 3685) governs the conduct of physical
searches without judicial warrant for foreign intelli-
gence purposes pursuant to the constitutional authority
of the President.
Thus, the clearly expressed view of the House In-
telligence Committee was (1) that the FISA does not
authorize physical searches or the opening of mail for
foreign intelligence purposes and (2) that until Con-
gress legislates in those areas, the executive branch is
relegated to the President's inherent authority in such
matters or the procedures of F. R. Cr. P. 41.
The same view was articulated by the Senate Intel-
ligence Committee in its earlier S. Rep. 95-701, p. 38.
The language there is virtually the same as the lan-
guage of the House Intelligence Committee quoted
above. In addition, the Senate committee referred to
the bill S. 2525, 95th Cong., the National Intelligence
Reorganization and Reform Act of 1978, which, it
said, "addresses the problem of physical searches
within the United States or directed against U. S.
persons abroad for intelligence purposes." 3 In the
same vein, the Senate Judiciary Committee said (S.
Rep. 95-604, p. 6): "the bill does not provide statutory
authorization for the use of any technique other than
electronic surveillance, and, combined with chapter
IS. 2525 was a precursor of S. 2284, 96th Cong., the
National Intelligence Act of 1980, discussed below.
119 of title 18 [Title III of the Omnibus Crime Con-
trol and Safe Streets Act, 18 U.S.C. 2510] it consti-
tutes the exclusive means by which electronic sur-
veillance, as defined, and the interception of domestic
wire and oral communications may be conducted ..."
We have seen that Congress decided to consider
separately the subject or [sic] physical searches, in-
cluding the opening of mail. This subject was covered
by S. 2284 in the last Congress. Since it would have
amended and supplemented the FISA, it must be con-
sidered as part of the legislative materials bearing on
our question.
Title VIII of S. 2284, entitled, "Physical Searches
Within the United States" (Cong. Rec., daily ed., Feb.
8, 1980, pp. S 1325-S1327), was the vehicle for the
promised separate consideration of that subject. The
section-by-section analysis stated that the "court or-
der procedures of the [FISA] are extended to `physi-
cal search,' defined as any search of property located
in the United States and any opening of mail in the
United States or in the U. S. postal channels, under
circumstances in which a person has a reasonable ex-
pectation of privacy and a warrant would be required
for law enforcement purposes." /d., p. S1333. In a
statement joining in the introduction of S. 2284 (id., p.
S 1334), then chairman Bayh of the Intelligence Com-
mittee said (id., p. S 1335):
... But perhaps the best way to bring over-
seas surveillance and search powers under
the rule of law and within the constitutional
system of checks and balances is through this
Act. We must carefully consider these issues
in the weeks to come.
The same is true for the provisions that
bring physical search in the United States
within the framework of the Foreign Intelli-
gence Surveillance Act of 1978. Current re-
strictions on physical search under the Ex-
ecutive order procedures are very stringent.
Thus, the charter could result in the lifting
of certain limitations. However, without the
requirement in law to obtain a court order
under a criminal standard for searches of
Americans in this country, a future adminis-
tration could abandon the Executive order
procedures and assert "inherent power" to
search the homes and offices of citizens
without effective checks.
Title VIII contained 57 amendments of the FISA,
beginning with the insertion of the words, "physical
searches and" in the statement of purpose, so as to
read, To authorize physical searches and electronic
surveillance to obtain foreign intelligence informa-
tion," and changing the title of the Act to "Foreign
Intelligence Search and Surveillance Act." Id., p.
Continued on back page
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6
Intelligence Court Opinion
Continued front page 9
S1325. The other amendments would have added
similar appropriate language to nearly every section
of the FISA.
The foregoing review of the language of the FISA
and the reports of the three committees which gave
the legislation exhaustive consideration demonstrates
that the FISC has no jurisdiction to authorize physical
searches or the opening of mail. This conclusion is
buttressed by the fact that Congress subsequently
gave active consideration to the deferred question
whether the FISA should be amended to extend the
procedures of the Act to cover physical searches. That
question has not yet been resolved by amending or
other legislation.
In view of the clearly expressed intent of Congress
to withhold authority to issue orders approving phys-
ical searches, it would be idle to consider whether a
judge of the FISC nevertheless has some implied or
inherent authority to do so. Obviously, where a given
authority is denied it cannot be supplied by resort to
principles of inherent, implied or ancillary jurisdiction.
Soviet Disinformation and Forgeries
Continued front page 2
the Camp David peace process, and generally exacer-
bate tensions. A special feature of Middle East "ac-
tive measures" activities has been the use of forgeries,
including:
? A purported speech by a member of the U. S. Ad-
ministration which insulted Egyptians and called for
"a total change of the government and the govern-
mental system in Egypt." This forgery, which surfaced
in 1976, was the first of a series of bogus documents
produced by the Soviets to complicate U. S.-Egyptian
relations.
? A forged document, allegedly prepared by the
Secretary of State, or one of his close associates, for
the President, which used language insulting and offen-
sive to President Sadat and other Egyptians and also
to other Arab leaders, including King Khalid of Saudi
Arabia. This forgery was delivered anonymously to
the Egyptian Embassy in Rome in April 1977.
? A series of forged letters and U. S. Government
documents, which criticized Sadat's "lack of leader-
ship" and called for a "change of government" in
Egypt. These forgeries surfaced in various locations
during 1977.
? A forged dispatch, allegedly prepared by the U. S.
Embassy in Tehran, which suggested that the United
States had acquiesced in plans by Iran and Saudi
Arabia to overthrow Sadat. This forgery was sent by
mail to the Egyptian Embassy in Belgrade in August
1977.
? A forged CIA report which criticized Islamic
groups as a barrier to U. S. goals in the Middle East
and suggested tactics to suppress, divide, and elimin-
ate these groups. This forgery surfaced in the January
1979 issue of the Cairo-based magazine A l-Duwu.
? A forged letter from U. S. Ambassador to Egypt
Herman F. Eilts, which declared that, because Sadat
was not prepared to serve U. S. interests, we must
repudiate him and get rid of him without hesitation."
This forgery surfaced in the October 1, 1979 issue of
the Syrian newspaperA I-Bath.
Conclusion
The Soviet Union continues to make extensive use
of "active measures" to achieve its foreign policy ob-
jectives, to frustrate those of other countries, and to
undermine leadership in many nations. On the basis of
the historical record, there is every reason to believe
that the Soviet leadership will continue to make heavy
investments of money and manpower in meddlesome
and disruptive operations around the world.
While Soviet "active measures" can be exposed,
as they have often been in the past, the Soviets are
becoming more sophisticated, especially in forgeries
and political influence operations. Unless the targets
of Soviet "active measures" take effective action to
counter them, these activities will continue to trouble
both industrialized and developing countries.
For further information contact: William C. Mott, Suite 709,
1730 Rhode Island Avenue N.W., Washington, D. C. 20036.
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080015-6