THE CITIZEN'S RIGHT TO BE LEFT ALONE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP91B00046R000100150004-1
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
4
Document Creation Date:
December 22, 2016
Document Release Date:
February 25, 2010
Sequence Number:
4
Case Number:
Publication Date:
November 15, 1988
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
CIA-RDP91B00046R000100150004-1.pdf | 496.64 KB |
Body:
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
Vital Speeches of the Day,
VOL. LV NOVEMBER 15, 1988
The Citizen's Right To Be Left Al
THE CITIZEN'S RIGHT TO BE KEPT SAFE AND FREE
By WILLIAM H. WEBSTER, Director of Central Intelligence
Delivered to the American Bar Association, Toronto, Ontario, Canada, August 9, 1988
T HANK YOU very much Bob, President MacCrate,
Prime Minister Robinson, other distinguished guests
and fellow members of the American Bar Association.
I am delighted to be with you. I can't resist saying that if some
day - as I'm certain I will - I am called to account for my
sins, I hope that Bob MacCrate is around to impanel the jury.
I particularly feel pleased to be here this morning and to
follow in the wake of the award of the American Bar Associ-
ation medal to my fellow St. Louisan, Bill McCalpin. It is richly
deserved. I've known Bill for forty years as a friend and a col-
league and, along with your distinguished past President John
Shepherd, we worked together on many projects. I am proud for
Bill, I'm proud for Saint Louis and I'm proud for the American
Bar Association that Bill has been selected for this high honor.
Well, I am here in Canada speaking largely to Americans,
and that, in a way, is a relief. I spoke to the Royal Canadian
Mounted Police Annual Mess several years ago and discov-
ered at the last minute that I was expected to engage in a
bilingual exercise. I stumbled through a few formalities in
French about being glad to be there, and then finally I said,
"And now, I must return to my own language - unless you
want my views on closing the window or putting the crayon on
the table."
In a world of disarray, some very interesting things are hap-
pening, even as we visit together. The prospect of peace in the
Persian Gulf and a cease-fire in the war between Iran and
Iraq; the withdrawal of Russian troops from Afghanistan; the
ne
Cambodian peace talks and the prospects that the Vietnamese
may soon withdraw their troops from that country; the ongoing
discussions in Angola and the promise of a cease-fire; and the
constructive discussion of possible solutions for the conflict in
the Western Sahara. All to the good.
In contrast to these developments, we see a faltering effort
to provide a permanent solution to conflict in the Middle East;
insurgencies in the Philippines; five nations arming the Spratly
Islands off the coasts of Vietnam and China; the spread of
chemical and biological warfare in the Middle East; and the
emergence of China as one of the great munitions makers of
the world, now specializing in missiles of great distance. And
I guess I have to mention Latin America. Nicaragua, Panama,
Honduras, Chile, El Salvador, and Bolivia. I need only men-
tion the names for us to realize how much there is to do to
create a safer and more peaceful world. We saw the U.S.-
Soviet summit meeting in June, and we saw the recent meeting
of the Soviet Central Committee plenum, when Gorbachev
gave an amazing speech promoting the principles of glasnost
and perestroika. And yet, we know that no essential goals of
Soviet domination have changed - or, at least, the Soviets
have made no public statements of such a change.
And we see across the world that three problems are emerg-
ing again, as they have always been there: espionage, terror-
ism, and drugs. And we have to ask ourselves what kind of
tools we need - and what kind of tools we can be allowed to
use - to deal with these threats. And, what reasonable limits
POLICY OF VITAL SPEECHES
The publishers of Vital Speeches believe that the important addresses of the recognized leaders of public opinion constitute the best expression of
contemporary thought in America, and that it is extremely important for the welfare of the nation that these speeches be permanently recorded and disseminated.
The publishers have no axe to grind. Vital Speeches will be found authentic and constructive.
It is the policy of the publishers to cover both sides of public questions and to print all speeches in full. Where it is necessary to condense a speech for reasons
of unusual length or the use of extraneous matter, it will be so stated when printing. They feel that is is only in the unedited and unexpurgated speech that the
reader can best obtain the view of the speaker. Corporate Indifilation 13-0576754
This material gives the reader the best thoughts of the best minds on current national problems. It also offers the student of public speaking examples of
the effective speech of today of those who have attained leadership in the fields of economics, politics, education, sociology, government, criminology, finance,
business, taxation, health, law, labor, etc. Thus the student of public speaking obtains the finest text book material with a sound knowledge of public questions.
Subscribers are urged to call the Editor's attention to any speeches which have impressed them as outstanding so that copies may be secured for review.
VITAL SPEECHES OF THE DAY is published twice a month by the CITY NEWS PUBLISHING CO., (Inc. 1911), 389 Highway 17 By-Pass, Box 1247,
Mount Pleasant, S.C. 29465-1247. Telephone 803-881-8733. Genevieve T. Daly, President, Joyce Fox, Vice-President, Thomas F. Daly, III, Secretary-Treasurer.
VITAL SPEECHES (ISSN 0042-742X) Corporate Identification #13-0576754
Subscription Rates September 1, 1988: $30.00 a year. Foreign one year: $35.00. Single copies $2.00. Back issues, if available, within two years $3.00 a copy.
Microfilm and microfiche editions $25.00 per volume plus postage, subscribers only. On order under $22.50, remittance must accompany order. Claims for
nondelivery of issues must be made within two months of the date of the issue.
Vital Speeches is Indexed in The Reader's Guide to Periodical Literature. An annual index is printed each November and distributed to all subscribers.
Cumulative Index. Volumes 1-25, $50.00 per copy plus postage. Volume Binder for Vital Speeches $10.00 plus postage. Vital Speeches will be found on file in
thousands of public, college and high school libraries throughout the United States.
Second Class postage paid at Mount Pleasant, S.C. and additional mailing offices.
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
T
WILLIAM H. WEBSTER
should be placed on law enforcement and the Intelligence
Community in their efforts to bring these worldwide problems
under control?
Some fifteen years ago, while I was still serving on the 8th
Circuit Court of Appeals, I had occasion to review a statute
which made it unlawful to carry or attempt to carry a firearm
aboard a commercial aircraft. In the opinion that I wrote, I
discussed the evolution of the airport inspection or checkpoint
system - a system that had been challenged not too long
before as a gross intrusion into personal privacy. Subsequently,
a rash of hijackings brought home the reality of the terrorist
threat and the need to balance individual privacy interests
with legitimate security interests. I opined then - and I believe
today, with equal force - that if those checkpoints were
removed, there would be a storm of protests from passengers
who value the security and protection that they afford and
consider such inspections to be a reasonable price for that
security.
Some of you no doubt attended the morning session run by
Dick Friedman, Chairman of the Standing Committee on Law
and National Security. Nick Rostow gave some opening
remarks about how to balance humanitarian concerns and
respect for the rule of law with our national security objec-
tives. This is a tough issue and one that is very much on my
mind today. While I was still at the FBI, I often spoke of the
balance that must be maintained between each citizen's right
to be let alone, and the right to be kept safe and free. Bob
MacCrate and I have also talked about this balance. And when
Bob asked me to speak to you today, he suggested that I address
this topic again from my vantage point at the CIA. And so,
today I will try to do that - to discuss how the work of intel-
ligence can provide greater safety without unreasonable sac-
rifice of individual liberty.
The CIA and other components of the Intelligence Com-
munity collect information on a host of issues that affect our
national security. Two of the issues that most clearly touch on
the relationship between safety and liberty - issues that
therefore demand special safeguards - are the threats posed
by hostile intelligence services worldwide, operating against
this country, and the threats posed by international terrorists.
Our activities in these and other areas are governed by Exec-
utive Order 12333, which outlines the duties and responsibil-
ities of the CIA as well as the limitations upon intelligence
activities undertaken by the Agency. The order reflects the
requirements of the National Security Act of 1947, the CIA
Act of 1949, and other laws, regulations, and directives, as well
as intelligence policies.
In addition to following the Executive order, the CIA and
other agencies within the Intelligence Community are required
to develop and have approved by the Attorney General their
own guidelines and procedures. The procedures at the CIA
were developed to:
-encourage legitimate intelligence activities;
-provide legal protection to employees by providing au-
thority for intelligence activities;
- and - I think this is of major importance - assure the
American public and the intelligence oversight committees
that all CIA activities involving U.S. persons are lawful and
related to legitimate intelligence objectives. For instance, we
file an annual report with the House and Senate intelligence
oversight committees spelling out significant intelligence activ-
ities, and we follow up with briefings if necessary. Our activity
in this area is closely monitored by the oversight committees,
which act as surrogates for the Congress as a whole and as
surrogates for the American people.
The first of the issues that I mentioned, counterintelligence,
is critical to our national security, and clearly a legitimate
intelligence objective. In fact, an effective and comprehensive
counterintelligence program has never been more important
to our nation, because the threat against us has grown. The
number of operations against us has certainly increased, and
the number of intelligence services involved in such opera-
tions has also grown.
Over the past three years, we have discovered more pene-
trations of the U.S. defense and intelligence communities than
at any time in our history. The costs of these compromises are
estimated in the billions of dollars.
Two major espionage cases which affect our country have
surfaced in Canada this summer. Stephen Ratkai was arrested
in June for attempting to pass U.S. naval secrets to the Soviet
Union. And during that same month, the revelations of a Soviet
defector, Yuriy Smurov, led to the expulsion and barring of 17
Soviet officials who were trying to steal Canada's advanced
commercial and military technology.
Although many countries engage in intelligence operations
against the United States, the Soviet intelligence services, the
KGB and GRU, represent by far the most significant intelli-
gence threat in terms of size, ability, and intent to act against
U.S. interests - both at home and abroad. And despite Soviet
glasnost and perestroika, we have actually seen an increase
this year in Soviet attempts to recruit U.S. sources.
Because we can protect ourselves best if we understand what
our adversary wants, I think it's worth considering just what is
being collected. The highest Soviet collection priority is infor-
mation on U.S. strategic nuclear forces. Other high-priority sub-
jects are key foreign-policy matters, congressional intentions,
defense information, advanced dual-use technology - the kind
of technology that is civilian in nature but can be adopted to
military purposes - and, not surprisingly, U.S. intelligence
sources and methods. The Soviets also target NATO intensively,
partly as a means to obtain, through information that we share
there, U.S. foreign-policy and military information.
And the methods employed by the Soviets to get the infor-
mation they want are becoming more aggressive and more
sophisticated. We expect to see greater Soviet efforts to recruit
U.S. personnel abroad; increasing use of third countries for
clandestine meetings with American agents - the better we
get here, the more likely they are to meet outside this country;
greater efforts to penetrate allied governments that might be
privy to U.S. secrets; and greater emphasis on exploiting the
intelligence collection capabilities of Warsaw Pact allies.
But the methods the U.S. Intelligence Community uses to
counter this threat are also impressive. And the most impres-
sive of those methods is the increased cooperation among the
various agencies within the community. For example, the FBI
and CIA are today working closely together in mounting both
offensive and defensive measures against hostile intelligence
services.
In recent years the FBI has made great strides in countering
the intelligence activities of the Soviet and Bloc countries. The
Bureau has improved the quality and sophistication of its
intelligence systems and, as a result, has succeeded in dis-
rupting hostile intelligence operations aimed at critical U.S.
targets at home.
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
VITAL SPEECHES OF THE DAY
The FBI's main tactic has been to "spiderweb" known or
suspected intelligence operatives. In spinning webs with phys-
ical and electronic surveillance - and, incidentally, all elec-
tronic surveillance must be court authorized under the For-
eign Intelligence Surveillance Act - U.S. intelligence has
been able to weave a barrier between hostile agents and our
citizens. Those of you familiar with FISA will recall that there
is a much higher threshold required to direct electronic sur-
veillance against U.S. persons.
To provide the information that will allow enforcement
agencies to protect our citizens, we have bolstered counterin-
telligence efforts throughout the community. For the CIA, such
efforts include collecting information outside the United
States on Americans who are or may be engaged in activities
on behalf of a foreign power, and collecting information in
circumstances where an American may be the target of a for-
eign power. Our own procedures dictate that we must use the
least-intrusive collection technique feasible to obtain the intel-
ligence required.
To make the best use of that intelligence and to improve the
effectiveness of counterintelligence activities both within the
CIA and in the Intelligence Community, I created a new
Counterintelligence Center at the Agency. The center works
to protect the Agency's foreign operations and the security of
all Agency components against penetration by foreign security
or intelligence services. This center was badly needed and, for
historical reasons I don't have time to discuss, too many things
were falling between chairs in the absence of this new and
important development. The Counterintelligence Center not
only provides analysis of hostile intelligence threats and past
espionage cases, it also provides instruction for our people
going abroad.
The CIA is authorized to collect information on yet another
problem: the targets, the victims, and the hostages of inter-
national terrorist organizations. This is a very important role
for intelligence. The CIA is also authorized to collect infor-
mation on Americans who may be engaged in international
terrorist activities.
During the past three and a half years, there have been 253
cases in which some sort of counterterrorist actions - efforts
to prevent terrorism - were taken on the basis of intelligence
information collected and disseminated by the Agency. We
can't say in all of those cases that the information or measures
taken were solely responsible for the preventions, but they
clearly had a role and that is important to us.
In one such case, the Agency received a report that terror-
ists planned to assassinate a senior American diplomat in a
Middle Eastern country when he arrived for a meeting. When
the diplomat was informed of the report, he confirmed that he
was to have such a meeting. At the last moment, he arranged
for the meeting to be held elsewhere, thus escaping an attempt
on his life.
On numerous occasions in recent years, the Agency has
received reports of planned terrorist attacks on our embassies
in several parts of the world, particularly the Latin American
countries of Colombia, Peru, and El Salvador. In each case, the
embassy, upon receiving such a report, increased its security.
On several occasions, a source has subsequently informed us
that this increased security persuaded the terrorist group to
cancel its plans to attack.
But in spite of such successes, last year the property and
citizens of over 84 nations were the victims or targets of
international terrorist attacks - attacks that resulted in
nearly 3,000 casualties. Information collected for this year
indicates that the citizens and property of almost 70 coun-
tries already have been the victims of international terror-
ism. These figures support a trend. Since 1981, we have
noticed a steady increase in international terrorism world-
wide. In 1981, we recorded close to 500 incidents, in 1985
almost 800 and, if early trends continue, we could register
almost 900 acts of international terrorism by the end of this
year. And I think that we should keep in mind that about half
of these international terrorist incidents are directed against
U.S. persons, U.S. property, or U.S. institutions around the
world.
The CIA, cooperating with other intelligence and law
enforcement organizations in accordance with the National
Security Act of 1947, has collected valuable information about
terrorist groups. Some of the most useful information has come
from walk-ins - terrorists who wish to defect from their orga-
nizations. By protecting, and in some cases resettling, these
individuals, we have been able to gain their cooperation. They
have told us about their former colleagues, about who finances
and protects their organization, the location of their head-
quarters, and the names of their leaders.
Such information is often vital in protecting both U.S. and
allied interests overseas. We learned, for example, that the Pal-
estinian terrorist, Abu Nidal, had an extensive international
commercial network that dealt in the gray arms market. This
network had key offices in Poland, East Germany, and several
other countries. By using this information, the U.S. State
Department delivered a series of diplomatic demarches to the
governments of these countries expressing U.S. concern about
the presence of these businesses. As a result, the companies
were closed down.
We also keep track of the movements of wanted terrorism.
If our government has an outstanding warrant for the arrest of
such individuals, we are able to make this information avail-
able to judicial authorities so that they can locate and appre-
hend them. In some cases, the United States asks for extra-
dition. In other cases, as in that of Fawaz Yunis, wanted for the
June 1985 hijacking of a Jordanian airliner which carried U.S.
citizens, our information enabled the FBI to arrest Yunis in
the Mediterranean. We worked with the Trevi Group, the
organization of the Ministers of Interior for the European free
countries who are united in an effort to end sanctuary for
terrorists. An important effort if we are going to succeed against
terrorism.
We share information with foreign governments on names
of potential terrorists, including aliases used and false doc-
umentation, that allows them to add these names to their
watchlists. Such improved, broader control enabled one gov-
ernment to arrest a well-known supporter of several terrorist
organizations. Information has also been used to deny entry
and safe haven to known terrorists and their associates. I
understand today that there was an important development
in the Hammadi case - the terrorist arrested and now on
trial in West Germany. And over the summer we were instru-
mental in giving positive identification of one of the principal
terrorists who planted an underseat bomb in an airplane going
from Tokyo to Honolulu a few years ago - an incident result-
ing in the death of a young Japanese boy.
I'd like to say just a brief word about what the FBI is doing
in the United States because I think that it is a record that has
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1
.WILLIAM H. WEBSTER
gone largely unnoticed, and it shows that considerable credit
is due to the men and women who are out there laboring to
make it possible for us to be safe and free in this country.
While this trend has been developing worldwide, the number
of bombings and terrorist incidents in the United States has
gone from about 100 a year when I took office to less than a
dozen in the last two years. And there have been very few
casualties. They have done this not just as police officers,
because that's after the fact. They've done it by developing
good intelligence on the workings of international and domes-
tic terrorist groups in the United States and by developing
criminal, prosecutable cases against them. And they've done it
with strict adherence to Attorney General guidelines on ter-
rorist investigations which permit this form of intelligence-
gathering.
And I know that such investigations are always sensitive
and apt to attract criticism when they do not go 100-percent
as one would wish. In the past year there has been consid-
erable speculation - and I think undue criticism - about
one particular terrorist investigation, most because of its
mischaracterization. It was said that this investigation was
a widespread investigation of the critics of the Reagan
Administration. It had nothing at all to do with the Reagan
Administration. It was said that it involved the investigation
of over 150 individuals and organizations. My understanding
is that it involved about a half dozen organizations. It was
said that it was massive. My understanding is that it involved
five man years per year for two years, ten man years in all.
Hardly massive. It has been charged that it involved highly
sensitive and intrusive techniques. It did not involve elec-
tronic surveillance. It did not involve undercover operations.
It did not involve searches. The investigators were criticized
for taking down some license numbers and taking some pho-
tographs. This case did not produce an indictment and it was
closed a few years ago. It is only now receiving scrutiny and
criticism. And if there were flaws in it, and I'm sure there
were, they will be brought to light. But I think that we have
to take into account the security that good intelligence has
produced for this country in asking ourselves whether or not
we can afford the taking of a few license numbers and a few
photographs in the interest of out national security and our
personal safety.
I have been making the point that effective counterintel-
ligence and counterterrorism programs are critical to our
national security. And they are certainly critical to the phys-
ical security of our citizens. But I want to emphasize as well
that how the CIA and other intelligence agencies carry out
their responsibilities is of equal importance to our country.
We are subject to specific laws and we operate under internal
procedures approved by the Attorney General. In addi-
tion, my General Counsel's staff briefs employees - both at
home and abroad - to ensure that those Agency employees
who deal with issues that affect the constitutional rights
of American citizens know what our laws and procedures
are. My Office of General Counsel also works closely
with the Office of Intellignce Policy and Review at the Depart-
ment of Justice in dealing with those types of activities
that may require Attorney General authorization. They
work together to examine relevant issues and obtain the nec-
essary approvals, consistent with applicable requirements of
our law.
We want to catch spies and curb terrorism, but we will
not circumvent our own laws to do so. We must maintain
absolute fidelity to our laws and our rules - rules imposed
to ensure our citizens that we are indeed accountable. I do
not think the CIA, or the FBI, or any member of the Intel-
ligence Community is exempt from this principle. In fact, I
believe that it is the key to public acceptance of our vitally
necessary work.
We must, in the end, have both safety and liberty. The bal-
ance between the right to be let alone and the right to be kept
safe and free is central to our profession and to our heritage.
And in our ability to strike that balance true, lies our future
as a land of ordered liberty. Former Supreme Court Justice
Robert Jackson must have had this balance in mind when he
observed that the constitutional Bill of Rights of the United
States was not a suicide pact. The protections it includes and
affords to us must be rationally applied if we are to prevail
against those who would threaten our national security.
I really believe that we have sufficient legislative restraints
and that we should stop looking for legislative solutions to
problems as they emerge, because such "solutions" can
impede necessary work in the interest of national security.
Rather, what is needed is a better understanding of the
requirements of existing law and the discipline - the iron
determination - to see that these laws are scrupulously
observed.
And then there are people, the people who work for you in
law enforcement and in the Intelligence Community. I am
looking for a certain kind of person and I am getting them,
with applications coming in at the rate of over 1,000 a month.
People who are risk takers, but not risk seekers. People who
are not particularly interested in fame or fortune, but see in
our work an opportunity to pursue their highest aspirations
for a safer and a better world. This blend of requirements
and balancing was best expressed by an old friend - Sir
William Stephenson. And I can think of no better place to
recall his words, than in this, his homeland of Canada. In the
introduction to the book,A Man Called Intrepid, which chron-
icled his remarkable intelligence accomplishments during the
Second World War, Sir William wrote:
"Perhaps a day will dawn when tyrants can no longer
threaten the liberty of any people. When the functions
of all nations, however varied their ideologies, will be to
enhance life, not to control it. If such a condition is
possible, it is in a future too far distant to foresee. Until
that safer, better day, the democracies will avoid disaster,
and possibly total destruction, only by maintaining their
defenses.
"Among the increasingly intricate arsenals across the
world, intelligence is an essential weapon, perhaps the
most important. But it is, being secret, the most dan-
gerous. Safeguards to prevent its abuse must be devised,
revised, and rigidly applied. But, as in all enterprise,
the character and wisdom of those to whom it is
entrusted will be decisive. In the integrity of that guard-
ianship lies the hope of free people to endure and
prevail."
I subscribe fully to this statement and I believe deeply that
a nation dedicated to the rule of law can protect itself and its
heritage in no other way.
Thank you.
Approved For Release 2010/02/25: CIA-RDP91 B00046R000100150004-1