PRIVACY RIGHTS AND GOVERNMENT SURVEILLANCE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP77M00144R000800110060-9
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
24
Document Creation Date: 
December 9, 2016
Document Release Date: 
August 27, 2001
Sequence Number: 
60
Case Number: 
Publication Date: 
June 16, 1975
Content Type: 
OPEN
File: 
AttachmentSize
PDF icon CIA-RDP77M00144R000800110060-9.pdf4.26 MB
Body: 
Approved For Release 2001/08/AO ? C.1ArEe8RUMOMI6R00800110060-9 11 5543 June 16, 1975 CONGRESSIONAL ith the Veterans' Disability Compensation Survivor Benefit Act (H.R. '7767) . I was conferring with some other Members and missed the vote. Had I voted, I would have voted for passage of the act. PERSONAL EXPLANATION (Mr. KEMP asked and was given per- mission to address the House for 1 min- ute) . Mr. KEMP. Mr. Speaker, on the Arm- strong amendment I was temporarily de- layed in my office with constituents. Had I been present I would have voted "aye." GENERAL LEAVE Mr. DOWNEY of New York. Mr. Speaker, I ask unanimous consent that all Members may have 5 legislative days in which to revise and extend their re- marks and to include therein extraneous material on the subject of the special order today by the gentleman from Pennsylvania (Mr. EILBERG) . The SPEAKER pro tempore (Mr. Mc- FALL) Is there objection to the request of the gentleman from New York? There was no objection. PRIVACY RIGHTS AND GOVERMENT SURVEILLANCE The SPEAKER pro tempore. Under a previous order of the House, the gentle- man from Ohio (Mr. MOSHER) is recog- nized for 60 minutes. (Mr. MOSHER asked and was given permission to revise and extend his re- marks.) Mr. MOSHER. Mr. Speaker, in re- cent years we have become increasingly aware of the dangers that are posed to the rights to privacy of American citi- zens. In particular, we have become aware of the dangers of warrantless Government surveillance activities. It is the purpose of this special order to publicly express the concern felt by many Members of Congress over the dual Issues of rights-to-privacy and Govern- ment surveillance activities. , Joining me today as cosponsor of this special order is the gentleman from Wisconsin (Mr. KASTENMEIER). We be- lieve a bipartisan group of Members will join us in this dialog. When we requested the time for this order we could not know that it would come just a few days after the release of the Rockefeller Commission's report to the President. Certainly that report makes this special order especially time- ly and topical today. MT. KASTENMEIER and his Subcommit- tee on Courts, Civil Liberties and the Ad- ministration of Justice have done a com- mendable job of disclosing and docu- menting questionable surveillance activ- ities, and other congressional panels also are bringing to light various abuses of the Government's surveillance authority. Other Members participating in this special order may be discussing those specific abuses or usurpations of rights- to-Privacy, and these will be helpful in Illustrating the nature of the problem. But I think it also is important for us to look beyond the actual events to their implications. Mr. Speaker, I am especially con- cerned by the "chilling effect" of war- rantless Government surveillance. The number of persons who are actually sub- ject to surveillance is relatively small, but a far larger number of people do be- gin to fear that they are being secretly monitored by the Government. ;t is net uncommon for met or for any Member of Congress. to recTve a letter from a constituent that begins or ends, know I'll probably end up in some FBI or CIA file for making this complaint *" Of course, such fears are essen- tially needless, but they are real and widespread nonetheless. I suggest we should examine here why law-abiding ' ' -.r ? 1)e.in s ied u on by their own Goveinmen We have no way of measuring how many citizens fear to petition their elected representatives for a "redress of grievances" simply a right assured by the Constitution, fear because they believe their names will be placed in some omi- nous Government file. We cannot count how many citizens have been kept away from political gatherings for fear that they would be photographed and in- dexed into someone's file. No one knows how many individuals decline to con- tribute to political organizations for fear of being identified as "subversives" by their Government. We have no way of telling how many people are afraid to talk freely on their telephones, because they suspect that a click or a buzz on the line may be a telltale sign of a wiretap installed by Big Brother. The point of all this is that many Individuals are living in fear that their private activities may be monitored by the Government. The chilling effect of this is that many citizens consequently refrain from writing to their representa- tives, refrain from writing letters to newspaper editors, stay away from po- litical meetings, and otherwise shy away from the lawful exercise of their consti- tutional rights. It is a shame that any American citizen would live in fear of our own Government?the Goverment which is supposed to protect and pre- serve our rights. To remedy this situation, Senator MATHIAS and I have introduced the Bill of Rights Procedures Act (H.R. 214) . I am pleased to note that we are joined by more than 70 cosponsors in the House; and I see that many of them are here to participate in this evening's special order. Essentially, the Bill of Rights Proce- dures Act provides that iao agent of the Federal Government can conduct any form of surveillance on an American citizen?for any reason?unless a court order is obtained upon a showing of prob- able cause. Any person who participates in a warrantless wiretap or any other warrantless surveillance activity would be personally liable to criminal penalties. Mr. Speaker, I think we must recog- nize that surveillance, or any other in- fringement of a person's basic right-to- privacy, is an infringement of the citi- zen's constitutional rights. In my view, only the courts should have the authority to permit abridgments of the individ- ual's constitutional rights. Presently. we have yielded to the ex- ecutive branch frightening amounts of discretionary authority in the area of surveillance. I think it is now time that we in the Congress move to restore the proper safeguards for citizens' rights. The Bill of Rights Procedures Act is not the only rights-to-privacy bill now pending in the Congress. There are many other bills as well. Regardless of which bill or bills finally are accepted, the ob- ject remains clear. We must act quickly to assure private citizens that they shall not be subject to capricious surveillance by the Government. We must remove the Executive's dis- cretionary authority to invade citizen's privacy. We must restore the courts to their proper role as arbitrator between the citizens' rights to privacy and the State's need to protect society. It is our hope that this special order will help to illustrate the intensity of con- gressional feeling on rights-to-privacy and the dangers posed by our present state of virtually unlimited authority for Government surveillance activities. Mr. KASTENMEIER. Mr. Speaker, will the gentleman yield? Mr. MOSHER. I yield to the gentleman from Wisconsin. (Mr. KASTENMEIER asked and was given permission to revise and extend his remarks.) Mr. KASTENMEIER. Mr. Speaker, as chairman of the House subcommittee now considering a number of legislative proposals designed to limit ,the scope of Government surveillance of Americans I am pleased to join with my colleague from Ohio, Congressman MOSHER, in sponsoring today's special order. The scope of surveillance practices and resulting invasions of personal privacy is so vast that it is difficult to define nar- rowly the subiects requiring close con- to. e reform. For example, the eavesdropper may be a e 91 er al investigator or an intelligence agent, a local policeman, or a private in- vestigator, a soldier or a civilian. He may use a wiretap or a bug. Be may choose a method totally unrelated to electronic technology, such as examining our credit, bank, medical, or business records. He may open mail or he may cover mail? examine outside of envelopes sent to us. He may engage in eavesdropping pursu- ant to a court order or he may simply claim that the national security re- quires it. His surveillance may be legal or illegal. My Judiciary Subcommittee on Courts, Civil Liberties and the Administration of Justice has already held a number of days of hearings both this session and in the 93d Congress each dealing with a differ- ent aspect of the problem, and we intend to continue our work with the twin goals of providing the Congress with sound leg- islation and assuring the enforcement of existing laws through vigorous oversight. These hearings have, without a doubt, established that the fundamental right to privacy in America is today in a state Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 H 5544 Approved FceirR6kna9M3IVRODPUNI00144R000800110060-9 ?nut SE June 16, 1975 of siege. Consider for a moment these ex- amples from the testimony presented to our subcommittee. national securi wiretapping: Despite - the plethora of revela ng down upon us almWsraBW uring the laat....year about the abuses of the so- ...calladnaLion erment surveillance the Department of Justice continuitppriT = matelv, 1QQ.warrantless wiretaps each ?var. These wiretaps are not supervised by in court; they_ar_e_noirm. camteI to the Qongress;_ the subject of the wire- pever notified that he has been surveil' ? he has no protection except the goodwill of the intelligence gather- in bureaucracy. These nation ST securi- ty wiretaps may go on indefinitely. In- deed, we heard testimony about one tap directed against a domestic organization which lasted for 25 years. Telephone company monitoring: In addition to indefinite warrentless wire- tapping by Government intelligence agencies we have also received extensive evidence of the highly questionable eavesdropping practices of the Nation's largest telephone system?American Telephone and Telegraph Co. Between 1965 and 1970, according to testimony of Bell executives, the company secretly monitored over 30,000,000 telephone calls made by its customers. The subjects of these surveillances were never notified even though the purpose of the moni- toring was to gain information which might lead to criminal charges against them. I should note that this practice Is justified under a, questionable excep- tion to Federal wiretap laws which allows the phone company even greater freedom in conducting wiretapping than law en- forcement agencies enjoy. Police wiretapping: The subcommittee heard testimony from the chief of police of a major U.S. city describing systematic use of illegal wiretapping by police offi- cers. In some cases this wiretapping was conducted with the knowledge of the very Federal law enforcement agents charged with enforcing existing anti- eavesdropping laws. What is particularly shocking is that evidence from these wiretaps was often disguished as having come from unidentified informants and used as the basis for search and arrest warrants which ultimately led to con- victions and prison terms for the unwit- ting subjects of the surveillances. This is completely repulsive to our centuries old concept of due process of law. Illegal private political wiretapping: The same police chief who revealed ex- tensive police wiretapping also made the shocking observation that any person in his city in a "controversial position which possibly includes everyone in po- litical life" is probably wiretapped "on a fairly regular basis," in many cases by private wiretappers operating wholly outside the law. Other forms of surveillance: We have also learned that the pervasive use of surveillance does not stop at wiretapping. It includes inspection of personal, sup- posedly private records as well. For ex- example, the way the famous White House plumbers found out that Daniel Ellsberg was using the services of Dr. Henry Fielding, a psychiatrist whose of- fice they burgled, was by examining rec- ords of his checking account, supplied by a friendly bank teller. Not only are our telephones and pri- vate records subject to outside scrutiny, but our mail as well. The Chief Post In- spector of the United States told our sub- committee that for 20 years the Central Intelligence Agency opened and read the mail of American citizens, knowing that this practice was a violation of existing Federal law. Not only has mail been opened and read, but every year the correspondence of thousands of Americans is monitored regularly by the process known as a mail cover?the systematic recording of in- formation contained on the outside of envelopes. By this means any State, lo- cal, or Federal body claiming to be an investigative agency can find out how many letters you send or receive and with whom you are corresponding. There are presently no statutory safeguards against abuses-of this practice. The Pos- tal Service admits that it regularly con- ducts mail covers for agencies with such questionable connections with normal police work as a local real estate com- mission, a welfare department, and a State fish and game commission. Fortunately, the abuses of Government power and of modern technology which I have just described have not gone un- noticed by Members of the House. At the present time 24 bills directed to the prob- lem, sponsored by over 100 Members, are pending in my subcommittee. It is my hope that after further analy- sis by the subcommittee and the full Judiciary Committee, this House as a whole, will have an opportunity to de- bate and vote on one or more of these proposals. I am taking the liberty of inserting Into the RECORD a short description of these pending bills. Mr. Speaker, at this time I would re- quest unanimous consent that the record remain open for 5 business days so that Members not present may submit their views on this important subject. SURVEILLANCE BILLS PENDING ni Scrscommrr- TEE ON COURTS, CIVIL LIBERTIES AND THE ADMINISTRATION OF JUSTICE H.R. 141 by Mr. Kastenmeier (Surveillance Practices and Procedures Act of 1975). Re- quires a court order for national security wiretaps. Also mandates regular reports to House and Senate Judiciary and Foreign Af- fairs Committees on national security wire- tapping and electronic surveillance. HR. 142 by Mr. Kastenmeier (Freedom from Military Surveillance Act of 1975). Makes investigation, surveillance, and rec- ord keeping regarding the beliefs, associa- tions, political activities or private lives of civilian citizens by the military a crime pun- ishable by up to two years imprisonment or $10,000 fine. Also provides for civil cause of action, including class action, for actual and punitive damages in the case of such surveillance. (Identical bills are: H.R. 266, Boland. H.R. 2753, 2754, 2862 and 3284, 4339 Steelman and 49 others. H.R. 539 by Holtzman and HR. 2556 by Abzug are the same bill with slightly differ- ent language) . H.R. 171 by Ms. Abzug. Makes wiretapping and electronic surveillance conducted with the consent of one party to the conversation illegal, unless pursuant to a court order. (Same effect as HR. 620 by Long.) H.R. 214 by Mr. Mosher (Bill of Rights Pro- cedures Act of 1975). Prohibits interception of any communication by electronic or other devices, surreptitious entry, mall opening, or the inspection or procuring of bank, tele- phone, credit, medical, or other business or private records without a court order based on probable cause a crime has been or is about to be committed. Because robable ce,...,L,Iss_l?_jmuired, this bil e ec ve W- ishes national security surveillance for in- telligence purposes. (Identical bills are: H.R. 414, Fish and H.R. 2330, 2603, 2604, 3113, 3467, 3855, 3874, Mosher And 71 cosposors.) HR. 620 by Mr. Long of Maryland. Same effect as HR. 171 by Ms. Abzug. Makes wire- 'apping, recording, and electronic surveil- 'ance conducted with the consent of one or fore parties to a conversation, but without ,he consent of all parties, illegal unless au- ,horized by a court order. (HR. 620 has 13 co-sponsors; HR. 2453, an dentical bill, has 1 cosponsor for a total of ' 1 co-sponsors.) H.R. 1603 by Mr. Drinan. Makes all wire- - apping and electronic surveillance illegal by gieleting those sections of the law currently authorizing such activity when authorized by o court order. H.R. 1864 by Mr. Kastenmeier (Freedom from Surveillance Act of 1975). Makes in- - estigation, surveillance, and record keeping egarding the beliefs, associations, political ectivity or private affairs of American citi- zens punishable by one year imprisonment, 8,10,000 fine or both, unless such activity is conducted upon reasonable grounds to be- 1 eve that the subject of the surveillance has c unmitted a felony or is an applicant for f :deral employment. BILLS WITH MULTIPLE COSPONSORS HR. 214 (Bill of Rights Procedures Act, Mr. 1Vosher, chief sponsor) total-72 Sponsors. H.R. 414 (H.R. 2330, Mosher and 25 co- s ionsors) : Fish, Abzug, Anderson (Calif.) , }lading:), Conte, Conyers, Coughlin, Duncan, Forsythe, Harrington, Helstoski, Holtzman, 1)/ cCormack, McKinney, Moorhead (Calif.). Pettis, Quie, Regula, Roe, Ruppe, Sarasin, SAberling, Stark, Talcott, Charles Wilson ( "ex.) , Won Pat. H.R. 2603, Mosher and 14 co-sponsors) A oderson (Ill.), Andrews (N.D.), Ashley, Bell, B-own (Calif.) , Esch, Frenzel, Heinz, O'Brien, P-itchard, Richmond, Solarz, Symington, halen. (HR. 2604, Mosher and 7 co-sponsors) : G adwater, Conlon, Heckler, HinShaw, Hor- ten, Lagomarsino, Thone. (H.R. 3113, Mosher and 13 co-sponsors) : B:ester, Boggs, Cohen, Fenwick, Hechler (W. Va.), Jeffords, McCloskey, Melcher, M tchell (Md.), Patterson (Calif.), Rangel, hroeder, Studds. (H.R. 3467, Mosher and 8 co-sponsors) : Bcdclus, Fauntroy, Howe, Jeffords, Matsunaga, ellman, Steelman, Stokes. `H.R. 3855) : Hammerschmidt. HR. 3874, Mosher, Hammerschmidt and 2 c thers) : Keys, Long (Md.). I.R. 142. (Freedom from Military Surveil- Ce Act of 1975, Mr. Kastenmeier, chief sp, ,nsor, and Mr. Steelman, total 72 spon- scalri..R) . 266: Boland. H.R. 3753: Steelman, Goldwater, Horton, Koh, Vigorito, Martin, Melcher, Regula, For- sr. Solarz, Spence, Pritchard, Mathis, Th ,ne, Keys, Charles Wilson (Tex.), Brown (Celli.), Symington, Charles Wilson (Calif.), He ner, Edgar, Ryan, Anderson (Ill.), Mosher, Ta:eott. ( TR. 2754 Steelman, Goldwater, Horton an 6 co-sponsors) : McKinney, Edwards (a :if.), Mitchell (Md.), Studds, Anderson (CI if.),: Heckler (Mass.). Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, #9,p5oved For ReletyRKIM/kbli&A.M30001fieden800110060-9 5545 H.R. 2862: Charles H. Wilson (Calif.). H.R. 3284 (Steelman, Goldwater, Horton and 15 co-sponsors) : Gude, Tsongas, Har- rington, Pattison, Obey, Coughlin, Qui% Riegle, Lent, Leggett, Hannaford, Blaster, Matsunaga, Chisholm, Buchanan. (H.R. 4339 Steelman, Goldwater, Horton and 3 co-sponsors) : Hammerschmidt, Mc- Cormack, Hawkins. H.R. 620 (Abolishing One Party Consent Eavesdropping, by Mr. Long (Md.) chief sponsor) : Hechler (W. Va.), Riegle, Brown (Calif.), Chisholm, Moss, Charles Wilson (Tex.), Mitchell (Md.), Diggs, Rangel, Hel- stoski, Collins, Harrington, Mink. H.R. 2463 (Long and one cosponsor) : Leg- gett. Mr. DRINAN. Mr. Speaker, will the gentleman yield? Mr. MOSHER. Yes, I will yield to the gentleman from Massachusetts. Mr. DRINAN. Mr. Speaker, I thank the gentleman for yielding. (Mr. DRINAN asked and was given permission to revise and extend his re- marks.) Mr. DRINAN. Mr. Speaker, when the newspapers and the committees of Con- gress only a few years ago began to un- cover the surveillance activities of the executive branch into the lives of our cit- izens and elected officials, few persons ever expected such revelations to reach the magnitude they have. The initial dis- closures, such as the wiretaps of the 17 public officials and newspaper reporters in connection with alleged national secu- rity materials, were considered by many to be abberations by an overzealous Ex- ecutive seeking, in good faith, to protect the Nation against subversion. THE WIDENING SCOPE OF SURVEILLANCE What followed, however, was a series of disclosures which widened the circle of persons who were considered proper subjects of surveillance by the investiga- tory units of the executive branch. We soon learned, for example, that during the sixties and the seventies, the U.S. Army, in cooperation with the FBI and other agencies, engaged in an extensive program of surveillance over the lawful activities of American citizens who were merely exercising their constitutional rights in protesting a terrible war in Southeast Asia and other social and po- litical injustices. - Civil rights groups, dissident organi- zations, splinter political parties, and others became the targets of extensive surveillance by Federal and State in- vestigators into permissible and pro- tected conduct. These surveillance activities did not, to be sure, stop at the organizational level. Not only did Government agents consider members of these groups as fair game for their intrusions into polit- ical beliefs, but they also spied on per- sons who had any connection with such groups or their members. A few years ago, a high school student in New Jersey wrote to an organization which was then the subject of Government surveillance, apparently because someone in the Jus- tice Department disagreed with its polit- ical viewpoint. The student had written for some information in connection with a course in political thought. Because the FBI then had a mail cover on the group, the student's name was acquired and an inquiry into her activities was undertaken. Of course, the investigation did not uncover any unlawful activity nor anything resembling illegality. But the data collected was used to open an FBI file on the unsuspecting student and retained by the FBI until the U.S. dis- trict court ordered it destroyed. Nor did the surveillance activities stop at the borders of the United States. Fed- eral agents kept watch over the activi- ties of Americans in foreign countries, Including members of the Armed Forces. I am sure this body recalls the snoop- ing by Government agents into the lives of American citizens residing in Ger- many. It appears that such surveillance was directed again at war dissenters and persons who supported the Democratic candidate for President in 1972. Such surveillance must be considered a seri- ous invasion of the constitutional rights of citizens. Federal agents have not allowed the doctrine of separation of powers to in- terfere with their information gather- ing on Members of Congress. We do not yet have an accurate picture of the ex- tent to which the FBI and other agen- cies maintained files on elected Members of the National Legislature. When At- torney General Levi appeared before the Subcommittee on Civil and Constitu- tional Rights of the House Judiciary Committee, of which I am a member, he sketched the scope of the surveillance activities of the Federal agents into the lives of legislators. While admitting that this data collection was totally unwar- ranted, Mr. Levi declined to give us any- thing but the most general outline of these intrusions in the legislative sphere. Since that time, the Justice Depart- ment has steadfastly refused to provide sufficient access to our subcommittee so that we might make an independent de- termination of the nature and scope of these surveillances. A CASE STUDY OF UNWARRANTED SURVEILLANCE Only by actually examining one of these files can one fully appreciate the unwarranted invasion of privacy and the wastefulness of the activity engaged in by the FBI. I recently had occasion to examine my own file which the FBI has maintained for many years. After I bad spent more than 2 months pursuing my rights under the Freedom of Information Act, Director Kelly finally, released to me a copy of most of the material contained in my file. He refused to provide certain documents. Director Kelly stated that I had never been a subject of a criminal investigation. Nevertheless, the FBI had assiduously collected 81 pages of mate- rial concerning public activities of mine both before and after my election to Con- gress. I will reproduce in the CONGRESSIONAL RECORD, in the immediate future, a copy of the file provided to me by the FBI. I will also attach an exchange of letters with Attorney General Levi an this sub- ject. I am placing this material in the RECORD so that all of my colleagues can see for themselves how the FBI is spend- ing the taxpayers' money. Nowhere in the statute which establishes the FBI is contained the authority to amass infor- mation on civil rights work, antiwar speeches, or any of the other entirely lawful activities described in my file. No- where is the FBI or any other agency given the power to monitor the political beliefs and activities of American citi- zens who are exercising their constitu- tional rights under the protection of the law. Because the Justice Department has refused to cooperate fully with our sub- committee, it is impossible to specify the scope of this type of surveillance and reeordkeeping by the FBI. If my file is any indication, however, the total num- ber of persons and documents involved Is staggering. Based on the limited infor- mation available to us, it is fair to say that the FBI presently has millions of entries describing perfectly lawful activ- ities of American citizens. How many more such files are maintained by dozens of other Federal and State investigatory agencies is unknown. We can only spec- ulate on how many of the FBI's 19,178 employees and huw much of the Bureau's $444.2 million budget is wasted on this insidious and unauthorized activity. THE EXECUTIVE BRANCH HAS NOT CURBED ABUSES What has been the Government's re- sponse to these revelations? It has been a grudging admission of the surveillance activities, a limited attempt to disclose publicly their extent, and a total failure to take adequate remedial measures. The press and the committees of Congress have not even been able to get a complete picture of the matter. For example, only after many, many months of pitched bat- tle did the Justice Department give up documents, highly "sanitized," to the press and to our subcommittee regarding the Cointelpro program, the operation to disrupt lawful activities of private groups. The Justice Department, includ- ing the new Attorney General, has been equally reluctant to provide us complete Information on other surveillance activi- ties. Thus the attempts by Congress to exercise its proper oversight responsibili- ties have been thwarted by the executive agencies, which, in my judgment, have an obligation to disclose such data to the Congress when requested to do so. Of course, some of these agencies, which engaged in surveillance, claim they have taken corrective steps. After Senator Ervin's inquiry into the Army surveillance program, that department stated that it had destroyed its files re- lating to the lawful conduct of Ameri- cans. No one has ever really checked to confirm that action. Even if the Army has destroyed the files, it is important to note that the Army was never the sole repository of the data collected. Such Information was freely circulated among various Federal investigatory agencies, including the FBI. It was part of the co- perative effort of these agencies to car- bon copy every bit of information col- lected and distribute it to the participat- ing agencies. We have never received any assurances from these other units that the "Army files" were destroyed. The Justice Department takes the view that, if any citizen seeks access to his or her file under the Freedom of Informa- tion Act, such data will be disclosed. One of the problems with this approach is Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 H 5546 ApprovedEalsitektysetaRnabith-13_13A676E0144R0008001109-96, 1975 that many citizens, who may have been subjected to surveillance, do not know that information about them is on file at the FBI or another investigating agency. For example, in connection with the Cointelpro operations, the Federal agents must have collected thousands of names and indexed them in files which still exist. When Attorney General Saxbe and then Levi admitted that much of this activity was improper, they were asked if the Justice Department planned to contact all persons who were affected by the program. They declined to do so. If the Department of Justice refuses to advise citizens that they were sub- jects of improper Government activity, such as the insidious Cointelpro program, and if the Department refuses to dis- close fully the nature of such activities to the Congress, what other avenues do we have to check unbridled executive behavior in these sensitive areas? The only answer is continued attempts by Congress to exercise its oversight respon- sibilities and to enact legislation which will control such operations. And if we have to legislate partly in the dark be- cause the executive refuses to divulge sufficient data, I am one Member who is prepared to do so. LEGISLATIVE REMEDIES ARE NEEDED The Congress began last fall to enact legislation to control the executive branch in its data collection activities. First, we passed the Freedom of In- formation Act amendments over the veto of President Ford. That any President should dare to reject a measure which seeks to secure constitutional freedoms by opening up files to citizens should stand as an indication that the present Chief Executive will not, on his own, exercise the necessary restraint in managing the executive bureaucracy. Second, in December, Congress passed the Privacy Act of 1974. Although this law does not take effect until Septem- ber 27, 1975, it will open additional files to private citizens wishing to learn what records their Government is maintaining on them. While the law has a number of deficiencies, it should provide a new remedy for those who wish to look be- hind the paper curtain which executive employees have drawn across their file cabinets. There are a number of other measures which Congress must enact if the con- stitutional rights, including privacy, of American citizens are to be restored to their proper place in our scheme of gov- ernment. At a minimum, we must: First, press our right to examine clearly the operations of the executive branch. If the Justice Department or any other agency refuses to disclose data which we consider essential in performing our overight functions, this House must be prepared to issue subpenas to obtain the materials; second, enact laws which will prohibit executive agencies, particularly the FBI, from collecting any informa- tion which is unrelated to investigations into criminal conduct or into the quali- fications of a nominee for high office. We cannot permit the agencies which we established to have unbridled investi- gatory authority to look into any ac- tivities of citizens which they choose to Investigate. Additionally, Congress should: Third, amend existing laws to allow easier ac- cess by citizen to files maintained about them. Despite the new amendments to the Freedom of Information Act, there are indications that additional changes may be necessary. A recent article in the Nation, "You Still Need a Can Opener," catalogs some of the difficulties which have arisen under the new act; and fourth, at least with respect to investi- gatory agencies, we should alter our rules so that the legislative committees have authority over the appropriations of those units. It makes little sense for the subcommittee of one standing com- mittee to examine the budget of the FBI, while another subcommittee of another standing committee conducts oversight of its activities. If Congress really means to check excesses of the Executive, it must be prepared to reform its own legislative machinery to maximize its ability to re- strain the other branch. The pending resolution which would assign appro- priations authority over the Justice De- partment to the Judiciary Committee should be passed at the earliest possible time. We must act swiftly to prevent the un- warranted surveillance and iniCil-MTalon zathering which has gone on for so long to continue into the future. Before appro- priating funds to the Department of Jus- tice for the upcoming fiscal year, we should insure that these funds will not be used to conduct surveillance and maintain files which are outside the bounds of the Department's legitimate law enforcement responsibilities. Conse- quently, when appropriation bills for the Departments of State, Justice, Com- merce, the Judiciary, and Related Agen- cies come before the House next week, I intend to offer an amendment to prohibit any sums appropriated for the activities of the FBI to be used to gather informa- tion and maintain investigative files which are not related to criminal inves- tigations or other specific responsibilities of the FBI which are authorized by law. The adoption of such an amendment will save the American taxpayers the money presently being used to collect the kind of information reflected in the contents of my own file. Mr. Speaker, I extend my gratitude for arranging this special order to the gen- tlemen from Ohio (Mr. MOSHER) and from Wisconsin (Mr. KASTENMEIER) , who is also the distinguished chairman of the Subcommittee on Courts, Civil Liberties, and the Administration of Justice, which has examined some of these problems in depth. It provides an opportunity for each of us. outside the normal course of our legislative duties, to bring to the col- lective attention of other Members dif- ferent thoughts and perspectives on the whole range of problems created by the untoward and outrageous surveillance activities of the Executive. But speeches alone are not adequate for the task of eradicating the evils which flow from the indiscriminate sur- veillance by government of the lives of our citizens. The words must be rein- fcl.ced by action. If the bicentennial an- niversary of our democracy is to have significance, we must reaffirm in deeds the principles upon which our ancestors found this Nation 200 years ago. Noth- ing short of that should be our goal. Mr. MITCHELL of Maryland. Mr. Sueaker, will the gentleman yield? Mr. MOSHER. Yes, I will yield to the ntleman from Maryland. (Mr. MITCHELL of Maryland asked and was given permission to revise and es tend his remarks.) Mr. MITCHELL of Maryland. Mr. ? ,eaker, for many years I have argued that the most grave threat to the demo- cratic form of government does not come from the Union of Socialist Soviet Re- pnblics, nor from the People's Republic of China, but that it comes from within ti is Nation. That threat is the illegal trammeling of civil rights and civil lib- el ties done in the name of national se- curity. The threat grows out of an over re action to peaceable protest, an almost paranoic reaction to the exercise of the 11 flit to dissent, and an all pervasive, ? Lreasoning fear about "the Communist ta keover." The recent disclosures about the illegal and unethical practices of the Central Ii telligence Agency, the Federal Bureau oi Investigation, the Internal Revenue Services, and other agencies of Govern- msnt reveal how widespread and endemic h, ve been these practices. I think we in this Congress have not dene enough to disclose the extent to w iich local police departments, acting in c(,11usion with Federal agencies, have vi dated the constitutionally guaranteed ri ;hts of citizens, especially black citizens a;sel those who protested against the il- legal war in Vietnam. On March 4 I testified before the sub- cc on Courts, Civil Liberties, and the Administration of Justice. I testified is support of H.R. 3113. In my testimony, I established the ex- ^ nt to which unlawful surveillance of ci dzens was done by the Baltimore City P dice Department. This evening I want te share portions of that testimony with ? u. On February 14, 1975, 131 persons sent ti e following statement to the Governor o; the State of Maryland: As we approach the bicentennial of the fc incling of our Nation, we are troubled by in iunting evidence of police enroachment m rights guaranteed to citizens in the Aendments to the Constitution. The pub- 11 list of names of 125 organizations on w dch the Baltimore Police Department thered information suggests the frighten- ir and indiscriminate scope of their activity. Wien there are real crime problems, why hs the Police Department wasted half a in Ilion dollars a year of taxpayers money it surveillance of such groups as the Na- ti ,nal Association for the Advancement of C bred People, the American Friends Serv- ic Committee, the Baltimore Tutorial Pro- je t and the Interdenominational Ministerial A liance? While we recognize the necessary role of tl a police to maintain order and to prevent zme, for the Police Commissioner to, justi- fi blanket surveillance of these groups listed tc "prevent disorder, revolution and strife" is absurd and tragic. The majority of people ir volved were not remotely connected with a ty activities that could be considered crim- Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 1 6, Adffiroved For ReleCONIDRII9SIGINAIIIAIMIMIS11991443M0800110060-9 H 5547 inal. They were persons who care about America and were exeroising their Constitu- tional rights as assemble, to enjoy free speech, a free press, to seek redress of griev- ances, hoping to make the nation more free and more just. With Justice Oliver Wendell Holmes, we believe our Constitution was made for people of fundamentally differing views. The strength of the United States has been in diversity, in capacity to accept difference and to profit from dissent. Civil Rights vic- tories were won in the 1960s because citizens used their right to protest against inequality and injustice. The Vietnam war was halted In large measure because citizens used their right to dissent. Although some were aware of the pres- ence of police photographers and infiltra- tors in the 1960s and early 1970s struggle for human rights and peace, only now is the magnitude and threat of police spying in Baltimore becoming apparent. We are shocked by reports from the newspapers, the American Civil Liberties Union and others, and by the Police Commissioner's own ad- missions concerning: Infiltration of Peace and divil Rights groups. Routine photog- raphy of demonstrators for several years. ? Collection of information on reporters writing stories unfavorable to the Police Commissioner, or on controversial issues. Surveillance of persons who write letters to editors of Newspapers. Surveillance of Congressman Parren Mitchell; infiltration of a meeting of the Congressman's campaign staff. Surveillance of numerous other public officials, including the Baltimore State's At- torney and the head of the Community Re- lations Commission. Surveillance of Black Clergymen. ISD collection of reports on recent strik- ing hospital workers. ISD collection of reports on individuals and license numbers of persons entering the Friends Meeting House and other places in Charles Village. As citizens concerned for the well being and enhancement of Baltimore, Maryland and the nation, we ask you as head of State and as the authority to whom the Commis- sioner of Police is responsible, to bring to an end the illegal and immoral activity of the Police Department and to help restore an atmosphere of respect and trust in this branch of the government. We urge that you: (1) End all surveillance of peaceful ac- tivity by the Police. (2) Inform the public of the nature and scope of the activity (methods, not disclo- sure of individual files), of the "Red Squad." (3) Inform persons if they have been under political surveillance and no criminal charges have been filed against them. Grant them the right to examine their files, to destroy them if they wish, and authorize the destruction of duplicate files. (4) Develop written standards controlling Police Department surveillance and infiltra- tion; restrict Police investigation to areas where there is evidence of criminal activity. (5) Develop a system of accountability, giving an independent civilian body the power to review Police methods, files, etc. (6) Place the Office of Police Commissioner under the Mayor, and encourage leadership sensitive to individual liberty and sympa- thetic to the rights of privacy. Included among the 131 signers of this statement were the names of over 40 religious leaders including Bishop Joseph Gossman, the Reverend Hugh Dickin- son, and the Reverend Vernon Dobson; from the NAACP, Enolia P. McMillan, president, and Leonard L. Saunders, vice- president: also representatives from Johns Hopkins University and Medical Institutions; representatives from Goucher, Townson State, Loyola and CCB; from the American Civil Liberties Union, the director, John Roemer, along with 10 lawyers; included also are repre- sentatives of the American Friends Committee. Based upon information made avail- able to me to date, I am firmly convinced that a national domestic espionage ap- paratus existed in America. I further firmly believe that this apparatus in- volved the Federal Bureau of Investiga- tion; the Army Intelligence; and local police departments. In this domestic espionage apparatus, information gath- ered, without benefit of court orders, was exchanged between local police depart- ments and Federal agencies. The infor- mation was gathered and exchanged on persons and organizations that were not involved in criminal activity. Obviously had the provisions of H.R. 3113 been in effect, this dreadful Kafkaesque situation could not have developed in my city and in other cities across the Nation. H.R. 3113 is a good, needed bill. I have one or two areas of concern that hope- fully can be cleared up today. The first is with the language referring to "private dwelling used and occupied as a dwelling." I think this language needs to be broadened and I shall ex- plain why. During my primary campaign in 1974, infiltration of my campaign headquarters took place. Here is the story as reported by the local press: Leonard Jenoff, the secret police operative who worked for dope trafficker John (Liddie) Jones' lawyer, also infiltrated- the offices of Rep. Parren Mitchell, it has been learned. Jenoff volunteered to work "morning, night, plus weekends" in Rep. Mitchell's last election campaign. He also took photographs of Mitchell's campaign workers. Jenoff is an admitted supplier of informa- tion to the police department's Inspectional Services Division (ISD), a clandestine intel- ligence gathering unit that reports directly? and only?to Commissioner Pomerleau. One of Mitchell's aides said Jenoff asked if he could take pictures of campaign workers "for a photography course he said he was taking." He turned over 10 to 15 pictures to S. I don't know if any were given to the police. There is strong evidence to suggest that in my previous congressional cam- paigns similar infiltrations by paid or unpaid police agents took place. These persons could have, and I believe did, in- spect records of telephone calls, credit records, and the like. Therefore, I would like to see the language broadened to cover that kind of situation. My second area of concern deal with section 2519, "Reports concerning inter- cepted wire, oral and other communica- tions." I am aware of the complexity of legal, bona fide information gathering by agencies and I am keenly aware of the need for confidentiality to govern such operations. However, I do feel that the person on whom information was gath- ered ought be advised somewhere down the line that he was the object of such activities. Obviously, if the intercepts re- sult in a specific criminal charge, then the person would know. However, if intercepts do not result in such a charge?or charges?or if indeed intercepts prove that the individuals con- duct and behavior has not been inimical to the best interests of the country, I think the person has the right to know that he was under surveillance and why the surveillance took place. Hopefully, you can clarify these two problems for me. I have and will con- tinue to support H.R. 3113 because it is legislation needed to protect basic civil liberties which are guaranteed by the Constitution. Ms. ABZUG. Mr. Speaker, will the gen- tleman yield? Mr. MOSHER. I yield to the gentle- woman from New York. (Ms. ABZUG asked and was given Per- mission to revise and extend her re- mar . ABZUGNr. Speaker, I would like to extend my appreciation to the gentle- man from Ohio (Mr. MOSHER) and the gentleman from Wisconsin (Mr. KASTEN- MEIER) for the foresight and insistence that this issue of surveillance and privacy be significally aired at this time. Mr. Speaker, I believe that it is im- portant because we have yet to complete the responsibility that is placed upon us by the Constitution and by the electorate to make certain that those pacts which we uncovered at Watergate will not be covered over by a continuation of those same activities through various agencies of the executive branch of Government. My own committee, the Subcommittee on Government Information and Indi- vidual Rights, has jurisdiction, as the Members know, over the Freedom of In- formation Act and the Privacy Act, and In both of those connections we are pur- suing very extensively the oversight of various agencies which have been col- lecting information on the American people. Our citizens have the right to know, and under the Privacy Act they have the right to obtain all of the in- formation and data which these agencies have maintained. In the course of our preliminary hear- ings to date, we have been shocked to find that there have been extensive and deep violations of fundamental rights- of privacy, as well as first amendment rights, of many, many untold numbers of American citizens in this country. Mr. Speaker, only last week we dis- covered that instead of the Army's hav- ing really destroyed all of the files of civilians whom they have had under sur- veillance, they discovered by accident some more files, now numbering at least 9,000. The Secret Service has indicated It is maintaining surveillance on 47,000 citizens, although they admit only 300 of those persons could actually constitute a threat to the life and safety of the President or his family and other per- sons under, their protection. The CIA, as we all know, has conducted massive surveillance over the activities of American citizens. These facts have been developed in hearings being con- ducted loy. the Select Committee of the .enate. by my committee, by other com- mittees in Congress, including the Com- mittee on the Judiciary, as well as the Itockefeller Commission. We find there have been serious inva- sions of privacy through surveillance not only by the CIA but also by the FBI in an unauthorized manner, including vio- Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 II 5548 Approved EmiteklysevoitratiwyBpfium9144R0008001100-9. 6, 1975 lation of the postal laws, in that first- class mail was illegally opened. We have also discovered unauthorized wiretaps, infiltration of political groups, and out- right burglary. Legislative control must be exercised In this area. The Congress must not only continue its oversight activities, but must enact legislation which will stop the kind of abuse we have recently discovered. LVf_Pcommittec iyiBcentii_ins_ its oversight in our jurisdictional area of Government We will also_tonsiLlerigglslation designed to control...the. eaCeSSes of the Govern- men.Uolice ready begunstn amendments to the-Fri- yacy_Act__These...arnendinents will remove the blanket exemptio_41:rntelco the ,CIA and the Secret Service in the naLlaill,??Irsi facts that have recently come to light make it imperafiVF-Thit an,0Slw Secret Service be heTa account :1) h A i ri an citizen whose rights have been abridged by their activities. In addition I am considering legisla- tion which will control the spread of computers throughout the Govern- ment?especially the linking of various computers through advanced communi- cations networks. I have also introduced legislation which would prohibit the in- terception of certain communications unless all parties to the communication agree to the monitoring or interception. Mr. Speaker, I especially want to com- pliment again the gentleman from Ohio (Mr. MOSHER) , who brought this special order, because we can do a lot more to bring this matter to the attention of the Congress and the public. (Ms. ABZUG asked and was given permission to revise and extend her remarks.) Mr. MLKVA. Mr. Speaker, will the gen- tleman yield? Mr. MOSHER. I yield to the gentle- man from Illinois (Mr. MricvA). Mr. MIKVA. Mr. Speaker, I want to join my colleagues in commending the gentleman from Ohio (Mr. MOSHER) for his concern about this problem and 'for his focusing the attention of the Con- gress and of the people on this problem. It is a problem that has not gone away, and it will not go away unless all of us express the kind of concern that he has shown. There is a feeling extant in the coun- try that if one has nothing to hide, if one has done nothing wrong, what dif- ference does it make if somebody is fol- lowing him around or if somebody is lis- tening in on his telephone conversations? And indeed there is also a feeling that, after all, if a few thousand people or even 10,000 people are being watched and spied upon and their activities are being reviewed, in a country containing 213 million citizens this somehow is not a very serious problem. Mr. Speaker, I think, in addition to the violations of the rights of people who are being followed and who are being Interdicted and their freedom threat- ened, that there is a much more serious problem, and that is the deterrent effect that this kind of activity has on the whole free society, because there is the danger that, through surveillance or even because of the popular belief that there is the existence of surveillance, we will discourage the kind of full, free, and unrestrained exchange of ideas and view- points on which democracy is based. When people and citizens and partici- pants in political debate feel they must restrain their utterances, that they must watch their tongues, that they must have a care about which groups they join or which candidates they vote for and who they write letters to or who they receive letters from because somebody might be watching them, we are taking that first step?but it is a very long step?toward the very totalitarianism that these ac- tivities are proclaimed to prevent and deter; then we are in our way in America reaching toward the kind of closed soci- ety that the CIA, the FBI, and all the other intelligence-gathering agencies as- sure us in the defense of their actions they are trying to keep from happening. It has long been the hallmark of to- talitarian societies that only approved persons ought to participate in the polit- ical process. If we did not have the right ideas, if we did not vote for the right people, and if we did not have the right relationships with other people in the public arena, then we ought not get involved. There was and is a deliberate effort In totalitarian states to keep people from getting involved in political processes, and if we do not want that kind of deter- rent here, then we must finally put a check on the kind of Government sur- veillance of activities, particularly in the political arena, which is going to put a chill on that kind of thing in the po- litical arena. I suppose that one of the problems about trying to do anything about it is that most of the time the Government agencies which are involved end up by saying, "We did not do it, and we promise to stop." It is always a very ephemeral kind of proof that one has about who is being wiretapped, and about where the extent of the surveillance exists. There is always some kind of justification for it. Mr. Speaker, I would only say that if the Congress does not begin to treat with seriousness of the problem that the gen- tleman from Ohio (Mr. MOSHER) sug- gests and my distinguished colleague, the gentleman from Wisconsin, my former chairman, suggests, I think we are going to deserve the kind of trouble we have because, when all is said and done, if we cannot abide the very freedom that dis- tinguishes this society from totalitarian states, then the Government agencies which are engaged in that surveillance are going to be the best justification of all for engaging it because we will not be able to exist in any other way. Mr. Speaker, I thank my colleague for yielding. Mr. MOSHER. Mr. Speaker, I especial- ly appreciate the emphasis the gentle- man from Illinois (Mr. M.ncvA) has just placed on the chilling effect that the atmosphere of fear has, which I empha- sized in my earlier remarks. This seems to me to be a matter of extreme concern. Mr. Speaker, I now yield to the gentle- man from New York (Mr. BADILLO). (Mr. BADILLO asked and was given permission to revise and extend his re- marks.) Mr. BADILLO. Mr. Speaker, I want to commend the gentleman from Ohio (Mr. MosnEa) and the gentleman from Wis- consin (Mr. KASTENMEIER) , for having brought up this special order which I think is particularly appropriate for dis- cussion at this time in view of the report of the Rockefeller Commission. I think that the statements and the recommendations of the Rockefeller Commission, which merely call upon the President to tell the postal authorities and the CIA not to do it again, that is, not to violate the law, cannot be ac- cepted by this Congress. I think in view of those recommendations, it is urgent that our subcommittee and the Com- mittee on the Judiciary, of which I am a member, take action at this session to pass either the bill advocated by the gentleman from Ohio (Mr. MOSHER) or an appropriate bill that will deal with the question of surveillance. I just want to cite one example of the need for urgency. The Rockefeller Com- mission report points out that there were a limited number of mail openings that took place during the 20-year period where the mail was being opened, but Mr. Cotter, who testified before our sub- committee and who is the chief postal inspector, indicated clearly that the ar- rangement for the opening of the mail was such that there really was no way in which the postal inspectors could know how many letters, in fact, were opened by the CIA and the FBI per- sonnel who were involved. Therefore, in the light of that, to sug- gest that it is enough merely for the President to say to the agencies involved not to take this action, I think is totally Inadequate. I think, therefore, we should take action now. I think we have to go even further, frankly, because the report also points lDenartment agreed for a period of 20 years not to prosecute anyone who was violating the law and who was a memberCIA 'cause they agreed to let the CIAjn. e?cinvestigate itself, think, under those circumstances, the fact that President Ford said last week that he was referring all of the materials received from the Rockefeller Commission to the Justice Department is an inadequate recommendation be- cause it is the Justice Department which itself is violating the law. I think that not only do we have to _take action on a bnI this session. jolt I think we have to establish a special nrsa.- ernktar to lga_taut_p_asimat 2(19_ jan, responsible for illegal acts are Prole: clited, including those people who Are within the Justice Department right now. So I think it is very appropriate that we begin a dialog on this subject, and Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, iScarroved For Releet4.129REMCINATURIUMM4301/027510800110060-9 H 5549 that we complete the bill, report out a bill from our subcommittee, the full committee, and on the floor of this House, and from the other body. Mr. MOSHER. Mr. Speaker, I very much welcome the expression of sup- port of the gentleman from New York (Mr. BADILLo) for the legislation that is before the gentleman's committee. Mr. KOCH. Mr. Speaker, I am pleased to participate in the special order on pri- vacy called for by our colleagues, CHARLES MOSHER and ROBERT KASTEN- MEIER. In the 93d Congress on April 2, 1974, Congressman BARRY GOLDWATER, Jr. and I sponsored a special order on the issue of privacy and we were pleased with the response of the members to our concerns. The 94th Congress must be concerned with the preservation of the Individual's right of privacy and I am hopeful that today's dialog will elicit some new thoughts and serious discus- sion on this issue. Last December 31, the President signed into law the Privacy Act of 1974. This was the culmination of a 6-year effort on my part and that of many of our col- leagues to place controls on the Federal Government's collection, use and dis- semination of personal information about citizens. Earlier this year Congressman GOLD- WATER and I introduced H.R. 1984 which provides that controls similar to those in the Privacy Act be placed on State and local governments and organizations in the private sector. The provisions of this bill are by no means sealed in cement. We have sent a questionnaire to orga- nizations affected by this legislation to ascertain the reactions to it. Approxi- mately 500 responses have been received and we will be tabulating the results shortly. The results will be made avail- able to our colleague, Dox EDWARDS, who chairs the Judiciary Subcommittee on Civil Rights and Constitutional Rights, and who will be holding hearings during this Congress on the legislation. The legislation which BARRY GOLD- WATER, Jr. and I have introduced and which we consider the basic draft is for the purposes of eliciting comments. Un- doubtedly, there must be additions, de- letions and changes. That is why the Privacy Protection Study Commission came into being so as to provide the forum for that testimony. The Privacy Act of 1974 calls for the establishment of a privacy commission which will report to the President and the Congress in 2 years on the results of its study on data banks in governmental, regional, and private organizations. The Commission is to determine what must be done to protect personal information, and the privacy of individuals. The Com- mission members are Minnesota State Senator Robert Tennessee; William Dickinson, retired managing editor of the Philadelphia Bulletin; William 0. Bailey, executive vice president of Aetna Life and Casualty; David P. Linowes, a partner with Laventhol, Krekstein & Hor- wath; Willis H. Ware, corporate research staff member of the Rand Corp.; Con- gressman BARRY GOLDWATER, Jr., and myself. The Privacy Commission has had nearly a 6-month delay in getting started because all of its members had not been appointed. But now that the President has announced his appointments, all seven members will get together shortly to begin our work. I am pleased that the private sector and State governments are represented on the Commission. I intend, as I hope the other members do, to pur- sue hearings regarding the impact of privacy legislation with an open mind. We have to be made aware of much in- formation from the private sector in de- veloping our report and I encourage or- ganizations to submit their reactions to us. The special order called for today is devoted to the specific issue of domestic surveillance activities of the U.S. Gov- ernment. Last year the Annual Chief Justice Earl Warren Conference on Ad- vocacy sponsored by the Roscoe Pound- American Trial Lawyers Foundation held a conference on the subject of Privacy in a Free Society. Three areas were dis- cussed?data banks and dossiers, elec- tronic surveillance, and political inform- ing. I am appending from the report of the conference, in which I participated, the recommendations on electronic sur- veillance. The material follows: FINAL REPORT?PRIVACY IN A FREE SOCIETY PART A?RECOMMENDATIONS : ELECTRONIC SURVEILLANCE Summary (Note: Final Recommendations on Elec- tronic Surveillance emanating from the Con- ference together with commentaries follow this summary.) The Conference undertook the study of electronic surveillance in two areas-;,--domestic intelligence and law enforcement. The Con- ference expressed strong opposition to elec- tronic surveillance for domestic intelligence purposes. It opposed, by a narrow margin, the use of electronic surveillance for law enforce- ment purposes. In discussing two methods of electronic surveillance, the Conferees were opposed to both telephone tapping and room bugging. However, they felt that room bugging was more insidious than -telephone tapping be- cause of the much greater and less controll- able invasion of privacy resulting from room surveillance. A broad consensus of the Conferees revealed general skepticism toward electronic surveil- lance as a tool and towards methods for con- trol of its use. It is interesting to note that this general skepticism was shown among members of such a diverse group including many with long experience in law enforce- ment and in law. The opponents of electronic surveillance based their conclusions on a belief that electronic surveillance was of rela- tively little value to conventional law en- forcement, was used primarily for minor offenses, produced very serious invasions of privacy, and was quite difficult to control. It should be noted that there was some discus- sion about the validity of the available sta- tistics, which indicated that electronic sur- veillance was invoked most often in cases of "minor offenses." There were Conferees supporting some electronic surveillance for law enforcement purposes, who believed that the technique should be used only for crimes of the utmost gravity and only if controls are strengthened and, together with those currently in the statute, are more effectively enforced. The Conference stressed that, if there were to be any electronic surveillance, regardless of its form., of American citizens, it should be only with prior judicial scrutiny and ap- proval?with a court order. A substantial majority recommended that no surveillance .for intelligence purposes be permitted. How- ever, if any electronic surveillance were au- thorized, it should be only for solving spe- cific crimes and not for obtaining general intelligence about particular individuals or groups. The Conference also overwhelmingly rec- ommended a series of procedural and other controls. It suggested a requirement that, Whatever federal electronic surveillance is done, it should be conducted only by the Department of Justice, subject to criteria and procedures examined at public hearings, and under close scrutiny by congressional committees. Also, the Conference urged that persons subjected to illegal electronic sur- veillance be permitted to recover damages from the governmental agencies engaging in such activity. RECOMMENDATION 1 There should be no electronic surveillance for domestic intelligence purposes? (Adopted by substantial majority) Commentary: While disagreement re- mained as to whether electronic surveillance, with restrictions, is permissible when related to detection and prosecution of specific crimes, a majority of the Conferees deter- mined that electronic surveillance for domes- tic intelligence should not be permissible. RECOMMENDATION II There should be no electronic surveillance for law enforcement purposes? (Adopted by narrow margin) Commentary: This vote represents the fundamental division among the Conferees. While there was general skepticism regard- ing the effectiveness of electronic surveil- lance, a narrow majority believed that law enforcement authorities should not be al- lowed to use electronic surveillance even for crime detection pUrposes, and a minority believed that electronic surveillance should remain available for law enforcement, though this group insisted that it be used only for very serious offenses, and under very strict controls. There was a group of Conferees who, whatever their individual predilections on this issue, made the point that our current knowledge concerning electronic surveil- lance at all levels of law enforcement (fed- eral, state and local) is inadequate. Addi- tional empirical studies are needed to deter- mine the extent and the effectiveness of its use. RECOMMENDATION III State and local authorities should not be allowed to engage in electronic surveillance.3 I Mr. Michael Kenney wanted to be on rec- ord as being opposed to all electronic sur- veillance. His single Recommendation in this area would be: "There should be no elec- tronic surveillance." Mr. Kenneth Conboy dissents from this Recommendation and adds the following statement: "I cannot subscribe to the dubi- ous logic of the proposition that, because too many gambling warrants have been is- sued in the past several years, no authority, regardless of how circumscribed in execu- tion, should be vested in the courts to issue warrants in cases involving, for example, im- minent bombings, aircraft hijacks, random killings or barbarous political murders." Ms. Mary C. Lawton wished it noted that She abstains on propositions relating to elec- tronic surveillance. She felt that more pre- cise definitions of terms used in the dis- cussions were needed. s Mr. Conboy did not support the Recom- mendation because "the data supports the conclusion that state authorities have been Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 H 5550 Approved FocaNtansNegplegal6rFf9E7j00y4R000800110oyo-9 une 16, 1975 (Vote evenly divided) Commentary: There was a sharp split over whether state and local law enforcement of- ficials (as opposed to federal officials) really need electronic surveillance, whether they have used it excessively and indiscrimin- ately, and whether the judicial and other controls in the statute do or can function properly on the state level. RECOMMENDATION IV No electronic surveillance should be carried out without a court order for any purpose on American citizens on United States soil or on American citizens in foreign countries. (Adopted overwhelmingly) Commentary: The Conferees drew atten- tion here to the Supreme Court's decision the United States vs. U.S. District Court, 407 U.S. 297, 92 S. Ct. 2125, 32 L. Ed. 2d 752 (1972), which suggested in an 8-0 decision that, in all cases of electronic surveillance on American citizens or organizations for intelligence purposes, that is, for purposes unrelated to solution of a specific crime, a court order is required. Also, the Executive Branch has no inherent power to invade a citizen's right to privacy without satisfying an impartial magistrate that a justification exists for such an intrusion. ThLs Recommendation expresses the Con- ference's conviction that there be no war- rantless electronic surveillance, under any circumstances on American citizens. RECOMMENDATION V - To the extent that electronic surveillance is permitted for law enforcement purposes, it should be limited to crimes of the utmost gravity. (Adopted by large majority) Commentary: While there was some dis- cussion on the meaning of "crimes of utmost gravity," the Conference reached no final definition of the concept, except that it would almost certainly include an imminent threat to life. RECOMMENDATION VI If used at all, electronic surveillance for law enforcement purposes should be per- mitted only by court order and on probable cause subject to the following conditions: (A) It must be directly related to specific criminal acts or activities; (B) There must be a specific limitation of the time during which the device remains In place or in use; and the length of time permitted should be the shortest possible; (C) There must be a definite demonstra- tion of the need for installation of the device; (D) There must be no other law enforce- ment technique available for obtaining the information, and the applicant must demon- strate this fully; (E) There must be restraint?responsible action and accurate reporting by the law enforcement officials carrying out the order. (Adopted overwhelmingly) Commentary: This Recommendation re- flects specific problems in the present opera- tion of the electronic surveillance statute, and is intended to supplement and make more effective the statutory controls. RECOMMENDATION VII Even when electronic surveillance is used with regard to crimes of utmost gravity, there should be no electronic surveillance of rooms?no bugging of a room. (Adopted by large majority) Commentary: Bugging should not be utilized under any circumstances. Bugging was seen as a more serious invasion of pri- more discriminating in the use of electronic surveillance than federal authorites. For ex- ample, the huge number of gambling war- rants obtained were predominantly obtained by the FBI. Also, jurisdiction for the most serious crime in terms of penalty?murder? is almost exclusively with state officials." vacy than wiretapping since, while one can refrain from using a telephone and thereby avoid a wiretap, the presence of a room bug in one's home or office makes it impossible to be free from surveillance.* RECOMMENDATION yin If any federal electronic surveillance is to be permitted, the authority for all warrants for wiretapping should be limited to a single governmental agency?the United States Justice Department. The Justice Department should be the only federal agency to install wiretaps on United States soil and on Ameri- can citizens abroad., (Adopted overwhelmingly) Commentary: Since electronic surveillance is difficult to detect in the first place, a pro- liferation of federal agencies engaged in wire- tapping would ineluctably result in more privacy abuses than would result if all legal wiretapping were the responsibility of only one agency. The Conferees were mindful a the diver- sity of government agencies engaged in elec- tronic surveillance which were uncovered during the Watergate investigations come of them accountable to no one but the Presi- dent?with the Justice Department and the courts being entirely by passed. RECOMMENDATION Ix The procedures and criteria by which wire- taps and other forms of eavesdropping are sought, and warrants for their use issued, should be clearly and properly prescribed by the United States Justice Department only after complete public hearings on these pro- cedures and criteria, such hearings to be held in various parts of the country. (Adopted overwhelmingly) Commentary: If the Justice Department is established as the only agency with the re- sponsibility for federal electronic surveil- lance, the citizenry should be made aware of this. Furthermore, the citizenry should be made aware of the precise processes by which eavesdropping is permitted by the courts and carried out by the Justice Depart- ment. In this way the widespread fear that government eavesdropping is pervasive can be countered by a precise vesting of limited authority?and accountability for any abuse of that authority?in this one agency. RECOMMENDATION X A very strong congressional oversight com- mittee should be established in both branches of Congress to review all wiretaps by federal agencies. This would apply to the United States Justice Department if it were established that it were the only govern- mental agency authorized to wiretap. Commentary: The unanimous approval of this Recommendation reflects the strong con- viction of the Conferees concerning the es- tablishment of an active monitoring system by Congress?representatives selected by the citizenry?to ensure accountability on the part of those involved in limited, carefully restricted, use of electronic surveillance., Mr. Conboy dissented from this Recom- mendation and explained how he saw its re- suit: "the law would simultaneously author- ize (wiretapping) and condemn troom bugging) electronic surveillance of the im- minent criminal, contingent solely upon the mode (phone conversation or face to face meeting selected by him.) " Professor John Elliff suggests that "the United States Department of Justice should not be the agency to install wiretaps over- seas, since its investigative jurisdiction is primarily within the United States. How- ever, the Attorney General might properly be required to approve any wiretaps in- stalled by another agency on American citi- zens abroad." 'Mr. William D. Ruckelshaus informed the Conference, that "not once, in the eighty days during which I PM Acting Director of the FBI, was I called on to testify before RECOMMENDATION X/ A reporting system should be undertaken by the Justice Department, subject to prop- er regulations to maintain confidentiality, so that all information disclosed by taps can be given to Congress for it to properly exer- cise its oversight function. (Adopted unanimously) Commentary: The information would in- clude: the duration or the wiretap; the need for the tap; an affidavit submitted for the issuance of a warrant for the tap; the author- ization by the Attorney General of specific taps; what information the tap revealed and the consequences of the tap, that is, whether there was an arrest, conviction or any other disposition. RECOMMENDATION xrr A specific minimum amount of damages. plus attorney's fees, should be available for any violation of the wiretapping or other eavesdropping statutes by federal, state or local officials. These damages should be re- coverable in a federal court from the partic- ular governmental agency engaged in such eavesdropping. (Adopted overwhelmingly) Commentary: The Conferees believed that effective sanctions must be provided against all who violate statutes concerning the use of electronic surveillance. Mr. BIESTER. Mr. Speaker, I wish to commend the distingunished gentleman from Ohio (Mr. MOSHER) , and the dis- tinguished gentleman from Wisconsin (Mr. KASTENMEIER) , for their leadership in further bringing to the attention of the House and of the American public the need for legislation in the field of Government surveillance of private citi- zens. I know firsthand the dedication to civil liberties and indiivdual rights which these two Members of Congress have ex- hibited in their work in the House. In March of this year, it was my privi- lege to appear before the Subcommit- tee on Courts, Civil Liberties, and the Administration of Justice, chaired by Mr. KASTENMEIER. I testified on behalf of leg- islation known as the Bill of Rights Procedures Act, introduced by Mr. MOSH- ER in the House, and by the distinguished gentleman from Maryland, Mr. MATHIAS, in the Senate. The Bill of Rights Procedures Act would require any Federal agent to ob- tain a court order before he or she could conduct any form of surveillance on a private citizen. The Government would be required to demonstrate probable cause that a crime had been or was about to be committed before any warrant for surveillance could be issued. The legisla- tion is intended to be comprehensive in scope, to cover all forms of surveillance, including bugging, wiretapping, and? all other forms of electronic surveillance, opening of mail, mail covers, entering of dwellings, and the inspection or procure- ment of the records of telephone, bank, credit, medical, or other private transac- tions. Mr. Speaker, I believe the need for new legislation in the field of govern- mental surveillance of mivate citizens is clearcut. The fourth amendment to the Constitution of the United States proclaims the right of the people to be "secure in their persons, houses, papers Congress about the FBI's involvement in electronic surveillance. It is not in the pub- lic interest for any such activity to go un- monitored by the Congress." Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, /93iRP roved For RelimaTOKINGMACIARDIED14001143M0800110060-9 H 5551 and effects against unreasonable search- es and seizures." Security, however, must be more than an abstract legal proposi- tion. If security is to have any meaning at all, it must be a sure perception of one's condition. I seriously doubt that the American people today consider themselves secure against unreasonable searches and seiz- ures. Twentieth century technology has given governments and indeed private institutions the? ability to intrude into the private realm of an American's life with staggering efficieincy, sophistica- tion, and secrecy. The technological ca- pacity for an unprecedented degree and scope of governmental intervention into peoples lives exists today. Without new, stricter safeguards and more effective means of oversight and control, there is little reason to doubt that such tech- nology will eventually be used, if indeed aspects of it have not already been employed. The American people today are sus- picious of government. They are skepti- cal not only of its ability to solve prob- lems, but they even question govern- ment's basic motives. That skepticism is healthy to the degree it results in de- mands that the Congress of the United States act forthrightly to end unneces- sary and illegitimate intrusions into peo- ple's private lives. Only by responsibly addressing itself to this very basic but complex problem can Congress restore to the American public a firm sense of security, a justified perception that one Is indeed safe against unreasonable and arbitrary or capricious governmental intrusion. Clearly the questions at stake in con- sideration of the whole issue of govern- mental surveillance go to the very core of the democratic process. This issue forces us to contend with perhaps the most basic question faced by a free so- ciety: where do we draw the line between the rights of the individual and the legit- imate and necessary functions of society as embodied in the Government? Stich a question has never been easy to answer, and it is particularly difficult In this complex and technically sophis- ticated age. The introduction of national security considerations further compli- cates the issue. As a member of the Committee on In- ternational Relations, a member of the Subcommittee on National Security dur- ing the 93d Congress, and a former mem- ber of the Judiciary Committee, I would particularly like 'to examine the question of governmental surveillance in matters pertaining to national security. Clearly all those in positions of public responsibility must approach national security considerations with a weighty concern for the dangers inherent in the prevailing international political system, and the peculiar obligations which our position within that system imposes on the Government of the United States. Few would dispute the need for the Gov- ernment to deal with some especially sensitive matters in secrecy. Few would dispute theneecl for the Government to preserve international trust in the con- fidentiality of diplomatic discussions. But equally clear must be the need to deal with such legitimate national secu- rity concerns within our constitutional framework?to subject governmental surveillance to proper and reasonable standards of procedure, and to minimize the scope for individual caprice or abuse of power. With regard to national security, what balance do we properly strike? Where, Indeed, do we draw the kind of line which protects both the individual and society at large? I would contend that under existing procedure, the rights of the individual under the fourth amendment are inade- quately protected. The law presently allows surveillance to be undertaken on the authority of the President?with such authority usually executed by the Attorney General?when national security is considered to be at stake. It seems clear to me that such a pro- cedure?involving individual interpre- tation of such a broad and ambiguous term as "national security" does, indeed, allow for abuse of power. The Bill a Rights. Procesiures_ Act Would rectify that situation by linking all surveillance?including that under- taken on grounds of national security? to a court order based on Probable cause that a crime had been or was about to be committed, In the case of national security, such an order would have to be linked to sus- pected sabotage, espionage, Treason or similar crimes. Is this an unreasonable restraint on executive power? Would such a require- ment hamper the proper stewardship of our national safety? Would it indeed swing the judicial pendulum dangerously In the direction of individual rights at the expense of societal security? I think not. Such a requirement is in- herently reasonable and proper, and would not have to subject our society to risk. I am supported in this belief by the Honorable William D. Ruckelshaus, for- mer Deputy Attorney General and for- mer Acting Director of the Federal Bureau of Investigation. Hardly a man oblivious to legitimate national security considerations, Mr. Ruckelshaus last year stated before joint hearings of the Senate Committees on the Judiciary and Foreign Relations that he sees "no rea- son why all wiretaps should not be sub- ject to court warrant" To restrict wiretaps and other forms of surveillance to instances approved by a Federal court, simply means the Gov- ernment must establish to the satisfac- tion of an independent arbiter that a reasonable suspicion exists as to the com- mission of a crime affecting the national security of the United States. The Bill of Rights Procedures Act would thus not bar necessary national security surveil- lance; it would simply subject the need for that surveillance to prior assessment by the judicial branch. Such a prior as- sessment simply, but significantly re- moves national security surveillance from the realm of possibly arbitrary, capricious action. Government surveillance--divorced from suspected criminality and un- restrained by any check?imperils our constitutional system, and thus under- mines the very national security it is ostensibly designed to protect. If we are to protect our genuine na- tional security interests as well as safe- guard individual rights within our con- stitutional framework, Congress must respond to the complex challenge of enacting new legislation on surveillance. I feel confident that with dedicated Members like CHARLES MOSHER and BOB KASTENMEIER helping to lead the way, Congress will adequately meet this diffi- cult challenge. Mr. GOLDWATER. Mr. Speaker, I am very pleased that my distinguished col- league from Ohio, Representative CHARLES MOSHER, and the chairman of the Judiciary Subcommittee on Courts, Civil Liberties, and the Administration of Justice, Representative ROBERT KAS- TENIVIEIER, have taken this special order on the subject of surveillance and the interception of communications by elec- tronic and other devices of citizens of the United States. I have had the pleas- ure of testifying before Mr. KASTEN- MEIER'S subcommittee on Congressman Mosim's bill, H.R. 2604, the Bill of Rights Procedures Act of 1975. I am a cosponsor of that legislation, as I was in the preceding Congress. This is impor- tant legislation and Congressman MOSHER is to be congratulated for being its author and chief proponent in the House of Representatives. I do not believe that there is anyone who can question the interest of myself or my family in the quick and successful combating of individual and organized crime in the United States. I agree fully with former Chief Justice Earl Warren's statement that the modern law enforce- ment community must utilize all that is legitimately available to it, including the fruits of modern technology, in its battle to stop crime and end lawlessness. The quality of our life and the future of our society are at stake in this battle against crime. My support for this bill stems from my deep and sincere belief that the inalien- able rights and liberties found in the Constitution and the Bill of Rights? especially the 1st, 4th, and 14th amend- ments relating to freedom of speech and association, security in one's property and personal possessions, and the right to due process?are being erroded by the increasing use of surveillance as a pri- mary tool and investigative aid by the law enforcement community. There is loose an idea that electronic gadgets and surveillance are by definition helpful in the prevention ef crime and in the suc- cessful prosecution of criminals. This at- titude is apparently an outgrowth of American technocracy: that things sci- entific and technical in their general ap- plication to daily life are good, healthy, and desirable. It causes citizens and members of the law enforcement commu- nity to assume that the activity is com- patable with our basic rights and liber- ties. But, such applications, when left unquestioned, can clearly lead to abuse and misuse. This propensity recently received its confirmation in the Watergate break-in Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 11 5552 Approved Fot6NtaftEMML3W-16r119.11711ffrgi4R0008001100,0-9 une 16, 1975 Revenue Sharing of the GAO report and intend to forward such information as may be gathered in congressional inves- tigations for them to act upon. The Office of Revenue Sharing has the authority to conduct its own investiga- tion into matters such as this. If they determine that "improper" use of rev- enue-sharing funds has occurred, they may take action on one of several levels, including demanding that the funds im- properly used be returned to the Federal Treasury. There is no doubt that the responsibil- ity of the Office of Revenue Sharing is clear in these cases of policy spying. Il- legal surveillance certainly constitutes improper use of Federal funds. If it can be determined by either the courts or by a committee of the Congress, that such surveillance was, indeed, illegal, I would hope that the -Office of Revenue Sharing uses its authority in this matter to apply the most strict penalties against States and cities that use Federal revenue- sharing funds in this manner. The General Accounting Office report outlined the use of LEAA funds, as well, by the police intelligence division. Nearly $4 million of these funds was used by the city of Chicago to establish a computer system to which many city agencies, in- cluding the intelligence division, seem to have had access. In light of the wide- spread misuse of such data banks by both government and private groups, this too would seem a matter for further study. The General Accounting Office ob- tained information on one other aspect of intelligence activities in the Chicago area. This concerned the 113th Military Intelligence Group and its alleged sup- port of right-wing terrorist activities. Ac- cording to these reports, this Regular Army unit provided information and weapons to militant groups such as the Legion of Justice and assisted them in the systematic disruption of various lib- eral organizations in the Chicago area. These same reports alleged that the 113th Military Intelligence Group exchanged information and received assistance from the intelligence division of the Chicago Police Department. The GAO, in its investigation, could only determine that most files of the 113th Military Intelligence Group had been burned in 1972 and those that had not been destroyed "were not readily available." Mr. Speaker, Chicago may be one of the most blatant examples of such mis- use of authority by high administrative officials, but it is certainly not the only example. Similar cases have been report- ed in Philadelphia. Baltimore, and Hous- ton in recent months and this, too, may only be the tip of the iceberg. At the time the GAO report on police ntelligence activities in Chicago was re- leased, I called the activities it outlined `an obscene misuse of governmental authority." What I said about Chicago is equally true about other cities where this may have happened and equally true about the Federal Government's illegal surveil- lance activities. These abuses have infected nearly and in the illegal surveillance conducted by the so-called plumbers unit. There, surveillance was conducted that directly violated our Constitution. Some of it was accomplished through the misuse of legitimate law enforcement operations. In a few instances, Federal law enforce- ment personnel unwittingly contributed to the nroblem because they had no com- prehensive, commonly identified and agreed with criterion for judging the legitimacy of the activity. I have a sense of urgency about this area of activity for each of us knows that recent events do not stand alone. They are not an abberation. To varying and often lesser degrees, we know of events like Watergate and of excesses in the general law enforcement community going back over 30 years. And, the current situation at the Federal level cries for improvement. Simply put, there is too much vaguely defined administra- tive authority within the executive branch that applies to the area of sur- veillance. Operational authority is so widely dispersed as to undermine stand- ardization of surveillance criterion and decisions. And, the situation has not been made any better by the recent conflicting and contradictory court decisions that have been added to the "surveillance mix." Clearly what is needed is legislation that defines the term surveillance, re- stricts and regularizes the authority for undertaking surveillance, and that estab- lishes strong penalties for violations of basic civil rights through illegitimate surveillance. The Mosher bill, H.R. 2604 does these things. For that reason I com- mend it to the careful attention of the House. And, I thank my colleague for arranging for this special discussion and giving me the opportunity to participate. Mr. METCALFE. Mr. Speaker, every- where we turn today, we see Govern- ment infringing on the civil liberties of its citizens. This Government surveil- lance, this keeping of dossiers, these dirty tricks seem to pervade every level of American Government today. These activities have taken many forms, they have been overt and covert, they have been insidious and they have been un- disguised. The list of those Government de- partments and agencies involved in this spying seems endless. The White House, the FBI, the CIA, the IRS, the Secret Service, the U.S. Army, and State and local government in at least four States, have allegedly been involved in main- taining -files or improper surveillance on tens of thousands of American citizens. A pattern of abuse is clear. On every governmental level, we see elected rep- resentatives of the people and their agents conducting improper and illegal surveillance activities for the sole pur- pose of identifying and harassing dis- senters and political opponents who, for the most part, exercise their constitu- tionally guaranteed rights in a legal and lawful manner. Abuses on the Federal level have been well documented in recent months. The laundered Rockefeller Commission re- port, even with its extensive gaps, is simply the latest in a long and sad series on revelations concerning misuse of power within the Federal executive branch. These same kinds of abuses, on State and local levels, have not yet been so well documented. Enough of these activ- ities have been disclosed, however, to give us a strong indication that the Fed- eral Government was not alone during the past 10 years in its illegal surveil- lance. We have seen cases of State and local agencies, in some cases using Federal funds, maintaining improper and pos- sibly illegal surveillance on private citi- zens. In my home city of Chicago, for ex- ample, it has become clear that the police intelligence division was used, at least in part, to maintain surveillance upon thou- sands of Chicago area residents who never had been the subject of criminal investigations. Police officials have ac- knowledged after months of denials, that surveillance was maintained and files were kept on literally thousands of Chi- cagoans whose only "crime" was some connection with any one of dozens of political, civic, and community groups within the city who the administration perceived as a threat to its policies. Files were maintained on, among other people, Senator CHARLES PERCY; myself; Father Theodore Hesburgh, president of Notre Dame University; Arthur Woods, chair- man of the board, Sears, & Co.; Illinois State Attorney Bernard Carey; and Illi- nois State representative; and at least three aldermen of the city of Chicago. In addition, secret grand jury testi- mony of the former superintendent of the Chicago Police Department, made available to the press indicates that the Superintendent was aware of illegal sur- veillance activities, including wiretap- ping and burglaries which were under- taken by the intelligence division. The General Accounting Office has re- cently completed, at the request of myself and others, an investigation into the use of Federal funds for these activities. It has determined that nearly $10 mil- lion was spent on the police intelligence division between 1972 and 1974. Nearly $5 million of these funds were Federal moneys?$3.9 million to LEAA funds and between $539,000 and $779,000 in revenue sharing funds. The GAO was unable to determine whether or not revenue sharing funds were used to pay salaries of those officers who engaged in the political spying of the intelligence division. Its lack of subpena power and a continuing State grand jury investigation severely limited its investi- gation in this respect. Enough information was gathered by the GAO. however, to warrant further investigation. Therefore, I have written Chairman Roratro of the House Judiciary Committee and Chairman ULLMAN of the Ways and Means Committee, whose com- mittees, of course, do have subpena power, asking them to determine pre- cisely what role Federal funds played in the political intelligence activities of the Chicago Police Department. In the case of the revenue-sharing funds, I have also informed the Office of Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, 19proved For Recitkvt,RomissaLWEeORTY-M01101M00800110060-9 H 5553 h3 every level of government in this country, and in almost every single case, the Fed- eral Government seems involved, either directly or indirectly. Whether it is the use of Federal money to fund the intelligence activities of local police departments or the improper use of Federal data banks or Army support of right-wing terrorists or Cointelpro or the White House plumbers or any of the others, these sickening abuses of the "*Constitution have gone far enough. If unchecked, these activities could in a very real sense, mean the end of Amer- ican democracy as we know it. Should they continue on the massive scale that they have existed in recent years, a cornerstone of our system of govern- ment?the right of dissent?would be in serious jeopardy. Corrupt and power hungry officials and petty despots to the contrary, however, the first amendment is still with us. ? Those of us who see injustice and in- equality in this country will continue to speak out in order to make this a better country. We will not be deterred. We will not be intimidated. Activities such as those I have outlined here today, will only redouble our efforts to speak out against these abuses. This Congress, however, must put a stop to these activities wherever they occur. 11 1 cent of Federal money, money that we appropriate, is used for these abuses, it is our responsibility, Our obli- gation, to expose it and end it, once and for all. Mr. GUYER. Mr. Speaker, as indicated by Vice President ROCKEFELLER'S recent report on the CIA, there is a definite need for more powerful legislation to further protect the individual's right to privacy. Despite the fact that most States have enacted laws to protect the individual, the right of privacy is often routinely violated. I am referring to cases in which individuals are victimized by information on mailing lists that Government agen- cies unethically make available. Citizens are forced to provide personal informa- tion about their public and private lives to such organizations as census bureaus, credit associations, police files, and others. Even information from personal income tax reports is often not kept con- fidential. Personal records are almost as readily available as the daily newspaper?and all too often, the individual is unaware that the information contained in his records is being clandestinely used. The continuance of invasion of per- sonal privacy is not only degrading and embarrassing but is an outright con- tradiction to the spirit of the fourth amendment. In a nation where individ- uality is so greatly treasured, tolerance of such invasion is unpardonable. ? From my participation in the Repub- lican task force on privacy, I became acutely aware of the many abuses made on the individual with regard to loss of privacy. During our concentrated efforts to protect the rights of juvenile offenders, we unearthed countless cases where, due to readily accessible court and police rec- ords, these individuals have been branded "criminal" for life, and thus have been denied equal opportunities with other citizens of the country. There is an ob- vious need to eliminate such stigmatizing effects and to allow the individual to be- come a member of society with a clear slate. I am especially hopeful that violations of the right to privacy will soon become a relic of the past. The right to privacy is a freedom that should be guaranteed and cherished by all. Mr. KEMP. Mr. Speaker, I wish, first, to commend my colleague, the gentleman from Ohio (Mr. MOSHER) , for providing Members an opportunity this afternoon to address the problems associated with assuring the individual's right to privacy. The gentleman has been in the forefront of efforts to safeguard privacy?efforts which have been, and are continuing to be, transformed into legislation and en- acted into law. Together with other Mem- bers, such as the gentleman from Cali- fornia (Mr. GOLDWATER) he has helped to increase substantially the conscious- ness of Members and the public on the nature of the threat to personal privacy. This has been one of the principal is- sues in which I have been involved also. I think the protection of personal privacy is fundamental to the rights of free men and women?the specific rights enumer- ated in our Constitution and the prem- ises which underlie them. It is a pro- tection against the unwarranted intru- sion of someone else into the life of the individual, and if one examines the mul- titude of actual and alleged violations of this right to privacy in recent years one can see quite clearly that "someone else" is most often an instrument of govern- ment. The intrusions upon privacy and the growth of government have been coexist- ent. Nothing is more to blame for the rise in government interference and inter- vention in our private lives and security than the notion that government can solve all our problems and must be given, therefore, the unrestricted range of au- thority to do so. Only when we, come to full grips with those notions will we ever secure our- selves and our posterity against infringe- ments on the right of privacy. Jefferson observed that: It is the natural course ,of events that liberty recedes and government grows. While accurate, Jefferson's observa- tion stated only one specific aspect of a larger and more complex equation. To wit: As external, collective human con- trol over, and interference( with, a per- son's life intensifies, individual liberty shrinks proportionally. In this larger sense, the real threat to Individual liberty is the collective will of any, institution or group of people which has the power?economic, political, or whatever?to coerce, intimidate, control, deny, or even give. The recognition that it is the natural course of events for lib- erty to recede as government grows is, then, only one manifestation of threats to liberty, albeit the most evident threat in both Jefferson's and our times. The lessons of history teach us that this growth of collective power can come from institutions other than govern- ment. The problem is not singularly the "bigness" of these institutions, in rela- tion to the individual and the exercise of free choice, but such "bigness" does ac- centuate the problem. It tends to reduce the range of alternative choices of con- duct available to the individual. In the 20th century, particularly in our Nation, it has been the growth of?the "bigness" of?government which has posed the single greatest threat to hu- man liberty. This growth in government is occasioned by the erroneous notion; that only government can solve the ma- jor social, economic, and societal prob- lems of our era, and that government schemes and regulations are preferable to the laws of supply and demand and the exercise of free choice by individuals. Woodrow Wilson, a doctor of philoso- phy in history and a recognized scholar on the processes of maintaining indi- vidual rights before coming to the Presi- dency, warned that? Liberty has never come from government. . . . The history of liberty is the history of limitations of government power, not the increase of it. In contradistinction to the classical liberalism embodied in these profound observations of Jefferson and Wilson, de- spite the clear warnings from history as prior human experience, and even de- spite the all-too-apparent results of the rapid growth of government in our mod- ern age, we seem, as a people, to have learned little. For, that government has grown disproportionately to the whole of society is factually indisputable, and that such growth has occasioned an ever- growing threat to individual liberty is, in my opinion, equally indisputable. In both absolute and percentage terms, government's growth has been virtually without restraint during the past nearly half century. It has exceeded all bounds of necessity and perspective. What are the facts? Between 1940 and 1976? The Federal Government's gross an- nual revenue rose by 42 times--from $7 billion to $297.5 billion; Total Federal expenditures rose by 35 times?from $10.1 billion to $349.4 bil- lion?and will probably go even much higher in 1976; The Federal debt outstanding rose by 14 times?from $42 billion to $605 -plus billion; Federal expenditures per person rose by over 15 times; The Congress enacted nearly 15,000 public law; Federal employment zoomed to over 2.8 million people; Federal forms, to be painstakingly filled out by individuals and corporations, grew and grew in number and com- plexity; Federal investigatory surveillance, and monitoring staffs grew to enforce each and every measure: The number of Federal initiatives, most of which are reinforced through interventionist regulatory powers and policies, mushroomed; and The Federal agencies which execute these powers and policies?and, fre- quently, call for more?grew accordingly. It is almost impossible to itemize the areas of conduct now subject to Federal Approved For Release 2001/08/30: CIA7RDP77M00144R000800110060-9 II 5554 Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 CONGRESSIONAL RECORD?HOUSE June 16, 1975 control because there are so many, but a cursory examination of any Govern- ment organization chart shows us the areas of our lives now subject to Govern- ment regulation; health, education, wel- fare, labor, Commerce, housing, trans- portation, finance, agriculture, environ- ment, communications, wages and prices, energy. labor-management relations, trade, alcohol, tobacco, firearms, savings, community relations, civil affairs, land and natural resource uses, recreation, commodities, securities, insurance, mar- keting, consumer affairs, productivity, nutrition, research, forestry, product standards, travel, economic development, shipping, vocational and career oppor- tunities, employment standards, occupa- tional safety, child development, retire- ment and income security, rehabilitation, interest rates, credit availability, land sales, aviation, railroads, highways, safety, institutionalized voluntarism, arts and humanities, equal employment op- portunity, export-import terms, truck- ing, small business, veterans, postal serv- ice. ad infinitum. The unfortunate, yet perhaps inescap- able, impact of the exercise of this vast amount of Government authority was in- fringement upon privacy. The manifestations were myriad; data banks. -wiretapping, electronic surveil- lance, eavesdropping, credit histories, medical histories, income tax informa- tion, information systems, regulatory report filings, disclosure statements, data exchanges. Separately?and, most assuredly, when taken collectively?these devices and procedures add up to a growing in- fringement on the right to be let alone, the right to privacy. We simply must come to better under- stand the relationship between the ex- tent of government and the threats to privacy. Government can carry out its almost unlimited functions only through information gathering, analysis, dissem- ination, and exchange. Thus, we should reduce the range of those functions. We can, and we should, do those thing's which we think are necessary to protect the right of privacy, and such measures RS the Privacy Act of 1974 are definitely steps in the right direction, think most Members are aware of my efforts in that regard?the sponsorship of legislation which was incorporated into that act. the Goldwater-Kemp pri- vacy amendments to the Federal Energy Act of 1974, the support for additional protection of student records, the intro- duction of the first comprehensive medi- cal privacy proposal. But throughout that work I was, and I remain, constantly aware of the more fundamental causes of the intrusions we are trying to guard against?the growth in Government in- tervention in our private lives. We can address the causes of invasion of privacy with substantial effectiveness only when we address the size and ex- tent of government and set about to re- duce and limit it. This, I think, we must very soon do, or our entire way of life will be substanti- ally altered?and it will not be for the good. GENERAL LEAVE Mr. KASTENMEIER. Mr. Speaker, I ask unanimous consent that all Members may have 5 legislative days in which to revise and extend their remarks on the subject of the special order today of the gentleman from Ohio (Mr. Mosirea). The SPEAKER. Is there objection to the req test of the gentleman from Wis- consin? There was no objection. The SPEAKER pro tempore. (Mr. McFssr . Under a previous order of the House, the gentleman from Pennsyl- vania (Mr. COUGHLIN), is recognized for 60 minutes. [Mr. COUGHLIN addressed the House. His remarks will appear hereafter in the Extensions of Remarks.1 ANNIVERSARY OF THE LENINGRAD TRIAL The SPEAKER pro tempore. Under a previous order of the House, the gentle- man from Pennsylvania (Mr. EILBERG), Is recognized for 30 minutes. Mr. EMBERG. Mr. Speaker, on this date 5 years ago the Russian Govern- ment shocked, and outraged the world by sentencing 11 persons, 9 Jews and 2 Christians, to death or lengthy prison terms for simply trying to act as free men are supposed to be allowed to act. The sentences, which were imposed to deter other persons from their "dissi- dent" activities were partially reduced after protests poured in from around the world. Despite the harshness of the sentences and other continued and brutal harass- ment by the Soviet Government the Jews of Russia are still trying to emigrate to freedom. Last month I visited Russia with some other Members of Congress and we were able to meet with some of these men and women in Moscow and Leningrad. In Kiev the people whom we were supposed to see wese ordered out of the city for the duration of our visit, but we were able to meet with the wife of one of the men who had applied for an exit visa. In Moscow we spoke with: Vitaly Rubin, Leonid Raines, Irma Chernyak, Sophia Belotserkovskaya, Alexander Lerner, Ida Nudel, Vladimir Slepak, Anatoly Scharansky, and Joseph and Dina Beilin. Our Leningrad meetings were with; Leopold Ekchilevsky, Boris Krumgalz, Mark Freedin, Vladimir Sverdlin, Alex- andr and Oksana Chertin. George Saki- riusky, Dia and Elleonora Ginsburg, Jeaniette "Janne" Kartseva, Felix Aronovich. and Ilya Shostakovsky. As I stated previously, the people with whom we were supposed to meet in Kiev were ordered out of the city. Their names are: Ilya Zlobinsky, Vadim Sheinis, Aleksandr Mizrukhin, Vladimir Kislik, and Kim Fridman. We were, however, able to meet and talk to Mizrukhin's wife, Mile.. Every one of these people, without hes- itation, said they wanted their cause and themselves individually to get as much publicity and support as possible. They all asked us to mention their names to the Russian officials with whom we would be meeting later. They absolutely contradicted the peo- ple in this country who claim we are hurting them or the cause of Soviet Jewry by publicly supporting them or putting pressure on the Soviet Govern- ment in their behalf. At this time Mr. Speaker, I would like to place on the RECORD a statement of support for the persons sentenced 5 years ago today at the Leningrad trials and the more than 40 Soviet Jews who have been imprisoned for trying to reach freedom. STATEMENT OF SUPPORT FOR PERSONS SENTENCED Five years ago today, justice was a victim of the Soviet legal system,. On this date in 1970, the Soviet govern- ment shocked the world with the arrest of eleven persons. All received harsh prison terms, some as long as 15 years. One was sen- tenced to death, but in response to cries of outrage from the free world, the sentence was commuted to 15 years. Nine Jews and two Christians. They were the "criminals" of the First Leningrad Trial. For keeping typewriters in their homes, they were criminals. For owning books with the word "Jew" In them, they were criminals. And for pos- sessing letters from relatives in Israel, they were criminals. What followed their arrest was part of a systematic plan to subdue the remarkable Jewish national movement that emerged in the USSR. It was a plan whose goal was to silence and intimidate Jews seeking to emi- grate to Israel. The defendants were charged with such crimes as "betrayal of the father- land:" "responsibility for the preparation of a crime and for attempted crimes:" "misap- propriation of State or public property;" "anti-Soviet agitation or propaganda:" and 'participation in an anti-Soviet organza- ,ion." Sadly, the Leningrad Trial was only the leginning. Since then the Soviet Union has -1sed its legal system to harass Soviet Jews "vhose only crime is the desire to emigrate to their ancient homeland, Israel?a right 1,uaranteed by Soviet law and international Within recent months Mark Nashpits and Boris Tsitlionik were arrested and sentenced ta five years in exile for demonstrating on ehalf of Soviet Jewish prisoners of consci- e ace, including those convicted in the Len- agrad Trials of 1970. Mikhail Leviev, a Soviet Jew who sought an eKit visa, was tried and sentenced to death f -a? "economic crimes"; and Dr. Mikhail S_ Item, a highly respected Vinnitsa physi- c an, has been sentenced to eight years hard h bor on trumped-up charges of accepting ribes from his patients. In these and other cases the defendants cre refused counsel of their choice. Testi- n my on their behalf was suppressed and d-cuments fraudulently altered in order to ccnvict them. The arrests that took plade on June 15th, li,10 are a reminder of the extremes to which Sr viet authorities will go in seeking to pre- In at Soviet Jews from emigrating to Israel. But those arrests were not accepted in si ence by men and women of conscience throughout the free world. Just today, for Instance, more than 500 lawyers from throughout Greater Philadelphia have joined to publish a newspaper advertisement vole.- in t their outrage at this mockery of justice.. Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, igeffroved For ReltmaRygMAElhEtIRSIMMOOMM0800110060-9 H 5543 the Veterans' Disability Compensation Survivor Benefit Act (H.R. 7767) . I was conferring with some other Members and missed the vote. Had I voted, I would have voted for passage of the act. PERSONAL EXPLANATION (Mr. KEMP asked and was given per- mission to address the House for 1 min- ute). Mr. KEMP. Mr. Speaker, on the Arm- strong amendment I was temporarily de- layed in my office with constituents._Had I been present I would haye voted "aye." GENERAL LEAVE Mr. DOWNEY of New York. Mr. Speaker, I ask unanimous consent that all Members may have 5 legislative days in which to revise and extend their re- marks and to include therein extraneous material on the subject of the special order today by the gentleman from Pennsylvania (Mr. EILBERG). The SPEAKER pro tempore (Mr. Mc- FALL). Is there objection to the request of the gentleman from New York? 4,-,--peAViserevias no objection: PRIVACY RIGHTS AND GOVERMENT SURVEILLANCE The SPEAKER pro tempore. Under a previous order of the House, the gentle- man from Ohio (Mr. MOSHER) is recog- nized for 60 minutes. (Mr. MOSHER asked and was given permission to revise and extend his re- marks.) Mr. MOSHER. Mr. Speaker, in re- cent years we have become increasingly aware of the dangers that are posed to the rights to privacy of American citi- zens. In particular, we have become aware of the dangers of warrantless Government surveillance activities. It is the purpose of this special order to publicly express the concern felt by many Members of Congress over the dual Issues of rights-to-privacy and Govern- ment surveillance activities. Joining me today as cosponsor of this special order is the gentleman from Wisconsin (Mr. KASTENMEIER). We be- lieve a bipartisan group of Members will join us in this dialog. When we requested the time for this order we could not know that it would come just a few days after the release of the Rockefeller Commission's report to the President. Certainly that report makes this special order especially time- ly and topical today. Mr. KASTENMEIER and his Subcommit- tee on Courts, Civil Liberties and the Ad- ministration of Justice have done a com- mendable job of disclosing and docu- menting questionable surveillance activ- ities, and other congressional panels also are bringing to light various abuses of the Government's surveillance authority. Other Members participating in this special order may be discussing those specific abuses or usurpations of rights- to-privacy, and these will be helpful in illustrating the nature of the problem. But I think it also is important for us to look beyond the actual events to their implications. Mx. Speaker, I am, especially con- cerned by the "chilling effect" of war- rantless Government surveillance. The number of persons who are actually sub- ject to surveillance is relatively small, but a far larger number of people do be- gin to fear that they are being secretly monitored by the Government. It is not uncommon for me, or for any Member of Congress, to receive a letter from a constituent that begins or ends, "I know I'll probably end up in some FBI or CIA file for making this complaint * * *" Of course, such fears are essen- tially needless, but they are real and widespread nonetheless. I suggest we should examine here why law-abiding citizens live in fear of being spied upon by their own Government. We have no way of measuring how many citizens fear to petition their elected representatives for a "redress of grievances" simply a right assured by the Constitution, fear because they believe their names will be placed in some omi- nous Government file. We cannot count how many citizens have been kept away from political gatherings for fear that they would be photographed and in- dexed into someone's file. No one knows how many individuals decline to con- tribute to political organizations for fear of being identified as "subversives" by their Government. We have no Way of telling how many people are afraid to talk freely on their telephones, because they suspect that a click or a buzz on the line may be a telltale sign of a wiretap installed by Big Brother. The point of all this is that 'many individuals are living in fear that their private activities may be monitored by the Government. The chilling effect of this is that many citizens consequently refrain from writing to their representa- tives, refrain from writing letters to newspaper editors, stay away from po- litical meetings, and otherwise shy away from the lawful exercise of their consti- tutional rights. It is a shame that any American citizen would live in fear of our own Government?the Goverment which is supposed to protect and pre- serve our rights. To remedy this situation, Senator MATHIAS and I have introduced the Bill of Rights Procedures Act (H.R. 314). I am pleased to note that we are joined by more than 70 cosponsors in the House; and I see that many of them are here to participate in this evening's special order. Essentially, the Bill of Rights Proce- dures Act provides that no agent of the Federal Government can conduct any form of surveillance on an American citizen?for any reason?unless a court order is obtained upon a showing of prob- able cause. Any person who participates in a warrantless wiretap or any other warrantless surveillance activity would be personally liable to criminal penalties. Mr. Speaker, I think we must recog- nize that surveillance, or any other in- fringement of a person's basic right-to- privacy, is an infringement of the citi- zen's constitutional rights. In my view, only the courts should have the authority to permit abridgments of the individ- ual's constitutional rights. Presently, we have yielded to the ex- ecutive branch frightening amounts of discretionary authority in the area of surveillance. I think it is now time that we in the Congress move to restore the proper safeguards for citizens' rights. The Bill of Rights Procedures Act is not the only rights-to-privacy bill now pending in the Congress. There are many other bills as well. Regardless of which bill or bills finally are accepted, the ob- ject remains clear. We must act quickly to assure private citizens that they shall not be subject to capricious surveillance by the Government. We must remove the Executive's dis- cretionary authority to invade citizen's privacy. We must restore the courts to their proper role as arbitrator between the citizens' rights to privacy and the State's need to protect society. It is our hope that this special order will help to illustrate the intensity of con- gressional feeling on rights-to-privacy and the dangers posed by our present state of virtually unlimited authority for Government surveillance activities. Mr. KASTENMEIER. Mr. Speaker, will the gentleman yield? Mr. MOSHER. I yield to the gentleman from Wisconsin. (Mr. KASTENMEIER asked and was given permission to revise and extend his remarks.) Mr. KASTENMEIER. Mr. Speaker, as chairman of the House subcommittee now considering a number of legislative proposals designed to limit the scope of Government surveillance of Americans I am pleased to join with my colleague from Ohio, Congressman Mosias, in sponsoring today's special order. The scope of surveillance practices and resulting invasions of personal privacy is so vast that it is difficult to define nar- rowly the subjects requiring close con- gressional scrutiny and legislative reform. For example, the eavesdropper may be a Federal investigator or an intelligence agent, a local policeman, or -a private in- vestigator, a soldier or a civilian. He may use a wiretap or a bug. He may choose a method totally unrelated to electronic technology, such as examining our credit, bank, medical, or business records. He may open mail or he may cover mail? examine outside of envelopes sent to us. He may engage in eavesdropping pursu- ant to a court order or he may simply claim that the national security re- quires it. His surveillance may be legal or illegal. My Judiciary Subcommittee on Courts, Civil Liberties and the Administration of Justice has already held a number of days of hearings both this session and in the 93d Congress each dealing with a differ- ent aspect of the problem, and we intend to continue our work with the twin goals of providing the Congress with sound leg- islation and assuring the enforcement of existing laws through vigorous oversight. These hearings have, without a doubt, established that the fundamental right to privacy in America is today in a state Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 II 5544 Approved Fegeatamsylay/Wka/ORPATM 44R000800110010 16, 1975 of siege. Consider for a moment these ex- amples from the testimony presented to our subcommittee. National security wiretapping: Despite the plethora of revelations cascading down upon us almost daily during the last year about the abuses of the so- called national security rational for Gov- erment surveillance, the Department of Justice continues to conduct approxi- mately 100 warrantless wiretaps each year. These wiretaps 'are not supervised by any court; they are not reported to the Congress; the subject of the wire- tap is never notified that he has been surveilled; he has no protection except the goodwill of the intelligence gather- ing bureaucracy. These national securi- ty wiretaps may go on indefinitely. In- deed, we heard testimony about one tap directed against a domestic organization which lasted for 25 years. Telephone company monitoring: In addition to indefinite warrentless wire- tapping by Government intelligence agencies we have also received extensive evidence of the highly questionable eavesdropping practices of the Nation's largest telephone system?American Telephone and Telegraph Co. Between 1965 and 1970, according to testimony of Bell executives, the company secretly monitored over 30,000,000 telephone calls made by its customers. The subjects of these surveillances were never notified even though the purpose of the moni- toring was to gain information which might lead to criminal charges against them. I should note that this practice Is justified under a questionable extep- tion to Federal wiretap laws which allows the phone company even greater freedom in conducting wiretapping than law en- forcement agencies enjoy. Police wiretapping: The subcommittee heard testimony from the chief of police of a major U.S. city describing systematic use of illegal wiretapping by police offi- cers. In some cases this wiretapping was conducted with the knowledge of the very Federal law enforcement agents charged with enforcing existing anti- eavesdropping laws. What is particularly shocking is .that evidence from these wiretaps was often disguished as having come from unidentified informants and used as the basis for search and arrest warrants which ultimately led to con- victions and prison terms for the unwit- ting subjects of the surveillances. This is completely repulsive tcrour centuries old concept of due process of law. Illegal private political wiretapping: The same police chief who revealed ex- tensive police wiretapping also made the shocking observation that any person in his city in a "controversial position which possibly includes everyone in po- litical life" is probably wiretapped "on a fairly regular basis," in many cases by private wiretappers operating wholly outside the law. Other forms of surveillance: We have also learned that the pervasive use of surveillance does not stop at wiretapping. It includes inspection of personal, sup- posedly private records as well. For ex- example, the way the famous White House plumbers found out, that Daniel Ellsberg was using the services of Dr. Henry Fielding, a psychiatrist whose of- fice they burgled, was by examining rec- ords of his checking account, supplied by a friendly bank teller. Not only are our telephones and pri- vate records subject to outside scrutiny, but our mail as well. The Chief Post In- spector of the United States told our sub- committee that for 20 years the Central Intelligence Agency opened and read the mail of American citizens, knowing that this practice was a violation of existing Federal law. Not only has mail been opened and read, but every year the correspondence of thousands of Americans is monitored regularly by the process known as a mail cover?the systematic recording of in- formation contained on the outside of envelopes. By this means any State, lo- cal, or Federal body claiming to be an investigative agency can find out how many letters you send or receive and with whom you are corresponding. There are presently no statutory safeguards against abuses of this practice. The Pos- tal Service admits that it regularly con- ducts mail covers for agencies with such questionable connections with normal police work as a local real estate com- mission, a welfare department, and a State fish and game commission. Fortunately, the abuses of Government power and of modern technology which I have just described have not gone un- noticed by Members of the House. At the Present time 24 bills directed to the prob- lem, sponsored by over 100 Members, are pending in my subcommittee It is my hope that after further analy- sis by the subcommittee and the full Judiciary Committee, this House as a whole, will have an opportunity to de- bate and vote on one or more of these proposals. I am taking the liberty of inserting into the' RECORD a short description of these pending bills. Mr. Speaker, at this time I would re- quest unanimous consent that the record remain open for 5 business days so that Members not present may submit their views on this important subject. SURVEILLANCE BILLS PENDING IN SUBCOMMIT- TEE ON COURTS, CIVIL LIBERTIES AND THE ADMINISTRATION OF JUSTICE H.H. 191 by Mr. Kastenmeier (Surveillance Practices and Procedures Act of 1975). Re- quires a court order for national security wiretaps. Also mandates regular reports to House and Senate Judiciary and Foreign Af- fairs Committees on national security wire- tapping and electronic surveillance. HR. 112 by Mr. Kastenmeier (Freedom from Military Surveillance Act of 1975). Makes investigation, surveillance, and rec- ord keeping regarding the beliefs, associa- tions. political activities or private lives of civilian citizens by the military a crime pun- ishable by up to two years imprisonment or $10,000 fine. Also provides for civil cause of action, including class action, for actual and punitive damages in the case of such surveillance. (Identical bills are: H.R. 266, Boland. HR. 2753, 2754, 2862 and 3284, 4339 Steelman and 49 others. H.R. 539 by Holtzman and HR. 2556 by Abzug are the same bill with slightly differ- ent language). H.R. 171 by Ms. Abzug. Makes wiretapping and electronic surveillance conducted with the consent of one party to the conversation Illegal, unless pursuant to a court order. (Same effect as H.R. 620 by Long.) H.R. 214 by Mr. Mosher (Bill of Rights Pro- cedures Act of 1975). Prohibits interception of any communication by electronic or other devices, surreptitious entry, mail opening, or the inspection or procuring of bank, tele- phone, credit, medical, or other business or private records without a court order based ?)ri. probable cause a crime has been or is about to be committed. Because probable cause is required, this bill effectively abol- ishes national security surveillance for in- telligence purposes. (Identical bills are: H.R. 414, Fish and H.R. 2330, 2603, 2604, 3113, 3467, 3855, 3874, Mosher and 71 cosposors.) H.R. 620 by Mr. Long of Maryland. Same effect as H.R. 171 by Ms. Abzug. Makes wire- tapping, recording, and electronic surveil- lance conducted with the consent of one or more parties to a conversation, but without the consent of all parties, illegal unless au- thorized by a court order. (H.R. 620 has 13 co-sponsors; HR. 2453, an identical bill, has 1 cosponsor for a total of 14 co-sponsors.) H.R. 1603 by Mr. Drinan. Makes all wire- tapping and electronic surveillance illegal by deleting those sections of the law currently authorizing such activity when authorized by a court order. H.R. 1864 by Mr. Kastenmeter (Freedom from Surveillance Act of 1975). Makes in- vestigation, surveillance, and record keeping regarding the beliefs, associations, political activity or private affairs of American citi- zens punishable by one year imprisonment, $10,000 fine or both, unless such activity is conducted upon reasonable grounds to be- lieve that the subject' of the surveillance has committed a felony or is an applicant for federal employment. BILLS WITH MULTIPLE COSPONSORS Ha. 214 (Bill of Rights Procedures Act, Mr. Mosher, chief sponsor) total-72 Sponsors. H.R. 414 (H.R. 2330, Mosher and 25 co- sponsors) : Fish, Abzug, Anderson (Calif.), Badillo, Conte, Conyers, Coughlin, Duncan, Forsythe, Harrington, Helstoski, Holtzman, McCormack, McKinney, Moorhead (Calif.), Pettis, Quie, Regula, Roe, Ruppe, Sarasin, Selberling, Stark, Talcott, Charles Wilson (Tex.), Won Pat. H.R. 2605, Mosher and 14 co-sponsors) : Anderson (Ill.), Andrews (N.D.), Ashley, Bell, Brown (Calif.), Each, Frenzel, Heinz, O'Brien, Pritchard, Richmond, Solarz, Symington, Whalen. (HR. 2604, Mosher and 7 co-sponsors) : Goldwater, Conlon, Heckler, Hinshaw, Hor- ton, Lagomarsino, Thone. (H.R. 3113, Mosher and 13 co-sponsors) : Biester, Boggs, Cohen, Fenwick, Hechler (W. Va.), Jeffords, McCloskey, Melcher, Mitchell (Md.), Patterson (Calif.), Rangel, Schroeder, Studds. (HR. 3467, Mosher and 8 co-sponsors) : Baldus, Fauntroy, Howe, Jeffords, Matsunaga, Spellman, Steelman, Stokes. (H.R. 3855) : Hammerschmidt. (H.R. 3874, Mosher, Hammerschmidt and 2 others) : Keys, Long (Md.). HR. 142. (Freedom from Military Surveil- lance Act of 1975, Mr. Kastenmeier, chief sponsor, and Mr. Steelman, total 72 spon- sors.) H.R. 266: Boland. H.R. 3753: Steelman, Goldwater, Horton, Koch, Vigorito, Martin, Melcher, Regula, For- sythe, Solarz, Spence, Pritchard, Mathis, 'Phone, Keys, Charles Wilson (Tex.), Brown (Calif.), Symington, Charles Wilson (Calif.), Hefner, Edgar, Ryan, Anderson (Ill.), Mosher, Talcott. (H.R. 2754 Steelman, Goldwater, Horton and 6 co-sponsors) : McKinney, Edwards (Calif.), Mitchell (Md.), Studds, Anderson (Calif.), Heckler (Mass.). Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 /91,Tproved For Rebw.G2figgiRpAipieEK310M6613200800110060-9 June 16, 11 5545 H.R. 2862: Charles H. Wilson (Calif.). H.R. 3284 (Steelman, Goldwater, Horton and 16 co-sponsors) : Gude, Tsongas, Har- rington, Pattison, Obey, Coughlin, Quie, Riegle, Lent, Leggett, Hannaford, Biester, Matsunaga, Chisholm, Buchanan. (H.R. 4339 Steelman, Goldwater, Horton and B co-sponsors) : Hammerschmidt, Mc- Cormack, Hawkins. H.R. 620 (Abolishing One Party Consent Eavesdropping, by Mr. Long (Md.) chief sponsor) : Hechler (W. Va.), Riegle, Brown (Calif.), Chisholm, Moss, Charles Wilson (Tex.), Mitchell (Md.), Diggs, Rangel, Hel- stoski, Collins, Harrington, Mink. H.R. 2453 (Long and one cosponsor) : Leg- gett. Mr. DRINAN. Mr. Speaker, will the gentleman yield? Mr. MOSHER. Yes, I will yield to the gentleman from Massachusetts. Mr. DRINAN. Mr. Speaker, I thank the gentleman for yielding. (Mr. DRINAN asked and was given permission to revise and extend his re- marks.) Mr. DRINAN. Mr. Speaker, when the newspapers and the committees of Con- gress only a few years ago began to un- cover the surveillance activities of the executive branch into the lives of our cit- izens and elected officials, few persons ever expected such revelations to reach the magnitude they have. The initial dis- closures, such as the wiretaps of the 17 public officials and newspaper reporters in connection with alleged national secu- rity Materials, were considered by many to be abberations by an overzealous Ex- ecutive seeking, in good faith, to protect the Nation against subversion. THE WIDENING SCOPE OF SURVEILLANCE What followed, however, was a series of disclosures which widened the circle of persons who were considered proper subjects of surveillance by the investiga- tory units of the executive branch. We soon learned, for example, that during the sixties and the seventies, the U.S. Army, in cooperation with the FBI and other agencies, engaged in an extensive program of surveillance over the lawful activities of American citizens who were merely exercising their constitutional rights in protesting a terrible war in Southeast Asia and other social and po- litical injustices. Civil rights groups, dissident organi- zations, splinter political parties, and others became the targets of extensive surveillance by Federal ahd State in- vestigators into permissible and pro- tected conduct. These surveillance activities did not, to be sure, stop at the organizational level. Not only did Government agents consider members of these groups as fair game for their intrusions into polit- ical beliefs, but they also spied on per- sons who had any connection with such groups or their members. A few years ago, a high school student in New Jersey wrote to an organization which was then the subject of Government surveillance, apparently because sonieone in the Jus- tice Department disagreed with its polit- ical viewpoint. The student had written for some information in connection with a course in political thought. Because the FBI then had a mail cover on the group, the student's name was acquired and an inquiry into her activities was undertaken. Of course, the investigation did not uncover any unlawful activity nor anything resembling illegality. But the data collected was used to open an FBI file on the unsuspecting student and retained by the FBI until the U.S. dis- trict court ordered it destroyed. Nor did the surveillance activities stop at the borders of the United States. Fed- eral agents kept watch over the activi- ties of Americans in foreign countries, including members of the Armed Forces. I am sure this body recalls the snoop- ing by Government agents into the lives of American citizens residing in Ger- many. It appears that such surveillance was directed again at war dissenters and persons who supported the Democratic candidate for President in 1972. Such surveillance must be considered a seri- ous invasion of the constitutional rights of citizens. Federal agents have not allowed the doctrine of separation of powers to in- terfere with their information gather- ing on Members of Congress. We do not yet have an accurate picture of the ex- tent to which the FBI and other agen- cies maintained files on elected Members of the National Legislature. When At- torney General Levi appeared before the Subcommittee on Civil and Constitu- tional Rights of the House Judiciary Committee, of which I am a member, he sketched the scope of the surveillance activities of the Federal agents into the lives of legislators. While admitting that this data collection was totally unwar- ranted, Mr. Levi declined to give us any- thing but the most general outline of these intrusions in the legislative sphere. Since that time, the Justice Depart- ment has steadfastly refused to provide sufficient access to our subcommittee so that we might make an independent de- termination of the, nature and scope of these surveillances. A CASE STUDY OF UNWARRANTED SURVEILLANCE Only by actually examining one of these files can one fully appreciate the unwarranted invasion of privacy and the wastefulness of the activity engaged in by the FBI. I recently had occasion to examine my own file which the FBI has maintained for many years. After I had spent more than 2 months pursuing my rights under the Freedom of Information Act, Director Kelly finally released to me a copy of most of the material contained in my file. He refused to provide certain documents. Director Kelly stated that I had never been a subject of a criminal investigation. Nevertheless, the FBI had assiduously collected 81 pages of mate- rial concerning public activities of mine both before and after my election to Con- gress. I will reproduce in the CONGRESSIONAL RECORD, in the immediate future, a copy of the file provided to me by the FBI. I will also attach an exchange of letters with Attorney General Levi on this sub- ject. I am placing this material in the RECORD so that all of my colleagues can see for themselves how the FBI is spend- ing the taxpayers' money. Nowhere in the statute which establishes the FBI is contained the authority to amass infor- mation on civil rights work, antiwar speeches, or any of the other entirely lawful activities described in my file. No- where is the FBI or any other agency given the power to monitor the political beliefs and activities of American citi- zens who are exercising their constitu- tional rights under the protection of the law. Because the Justice Department has refused to cooperate fully with our sub- committee, it is impossible to specify the scope of this type of surveillance and recordkeeping by the FBI. If my file is any indication, however, the total num- ber of persons and documents involved is staggering. Based on the limited infor- mation available to us, it is fair to say that the FBI presently has millions of entries describing perfectly lawful activ- ities of American citizens. How many more such files are maintained by dozens of other Federal and State investigatorY agencies is unknown. We can only spec- ulate on how many of the FBI's 19,178 employees and huw much of the Bureau's $444.2 million budget is wasted on this Insidious and unauthorized activity. THE EXECUTIVE BRANCH HAS NOT CURBED ABUSES What has been the Government's re- sponse to these revelations? It has been a grudging admission of the surveillance activities, a limited attempt to disclose publicly their extent, and a total failure to take adequate remedial measures. The press and the committees of Congress have not even been able to get a Complete picture of the matter. For example, only after many, many months of pitched bat- tle did the Justice Department give up documents, highly "sanitized," to the press and to our subcommittee regarding the Cointelpro program, the operation to disrupt lawful activities of private groups. The Justice Department, includ- ing the new Attorney General, has been equally reluctant to provide us complete Information on other surveillance activi- ties. Thus the attempts by Congress to exercise its proper oversight responsibili- ties have been thwarted by the executive agencies, which, in my judgment, have an obligation to disclose such data to the Congress when requested to do so. Of course, some of these agencies, which engaged in surveillance, claim they have taken corrective steps. After Senator Ervin's inquiry into the Army surveillance program, that department stated that it had destroyed its files re- lating to the lawful conduct of Ameri- cans. No one has ever really checked to confirm that action. Even if the Army has destroyed the files, it is important to note that the Army was never the sole repository of the data collected. Such information was freely circulated among various Federal investigatory agencies, including the FBI. It was part of the co- perative effort of these agencies to car- bon copy, every bit of information col- lected and distribute it to the participat- ing agencies. We have never received any assurances from these other units that the "Army files" were destroyed. The Justice Department takes the view that, if any citizen seeks access to his or her file under the Freedom of Informa- tion Act, such data will be disclosed. One of the problems with this approach is Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 lv,"- '0041/4 11 5546 Approved FoglitifteisMIM3ftelygplgatip1444R000800110CA)a 16, 1975 that many citizens, who may have been subjected to surveillance, do not know that information about them is on file at the FBI or another investigating agency. For example, in connection with the Cointelpro operations, the Federal agents must have collected thousands of names and indexed them in files which still exist. When Attorney General Saxbe and then Levi admitted that much of this activity was improper, they were asked If the Justice Department planned to contact all persons who were affected by the program. They declined to do so. If the Department of Justice refuses to advise citizens that they were sub- jects of improper Government activity, such as the insidious Cointelpro program, and if the Department refuses to dis- close fully the nature of such activities to the Congress, what other avenues do we have to check unbridled executive behavior in these sensitive areas? The only answer is continued attempts by Congress to exercise its oversight respon- sibilities and to enact legislation which will control such operations. And if we have to legislate partly in the dark be- cause the executive refuses to divulge sufficient data, I am one Member who is prepared to do so. LEGISLATIVE REMEDIES ARE NEEDED The Congress began last fall to enact legislation to control the executive branch in its data collection activities. First, we passed the Freedom of In- formation Act amendments over the veto of President Ford. That any President should dare to reject a measure which seeks to secure constitutional freedoms by opening up files to citizens should stand as an indication that the present Chief Executive will not, on his own, exercise the necessary restraint in managing the executive bureaucracy. Second, in December, Congress passed the Privacy Act of 1974. Although this law does not take effect until Septem- ber 27, 1975, it will open additional files to private citizens wishing to learn what records their Government is maintaining on them. While the law has a number of deficiencies, it should provide a new remedy for those who wish to look be- hind the paper curtain which executive employees have drawn across their file cabinets. There are a number of other measures which Congress must enact if the con- stitutional rights, including privacy, of American citizens are to be restored to their proper place in our scheme of gov- ernment. At a minimum, we must: First, press our right to examine clearly the operations of the executive branch. If the Justice Department or any other agency refuses to disclose data which we consider essential in performing our overight functions, this House must be prepared to issue subpenas to obtain the materials; second, enact laws which will prohibit executive agencies, particularly the FBI, from collecting any informa- tion which is unrelated to investigations into criminal conduct or into the quali- fications of a nominee for high office. We cannot permit the agencies which we established to have unbridled investi- gatory authority to look into any ac- tivities of citizens which they choose to Investigate. Additionally, Congress should: Third, amend existing laws to allow easier ac- cess by citizen to files Maintained about them. Despite the new amendments to the Freedom of Information Act, there are indications that additional changes may be necessary. A recent article in the Nation, "You Still Need a Can Opener," catalogs some of the difficulties which have arisen under the new act; and fourth, at least with respect to investi- gatory agencies, we should alter our rules so that the legislative committees have authority over the appropriations of those units. It makes little sense for the subcommittee of one standing com- mittee to examine the budget of the FBI, while another subcommittee of another standing committee conducts oversight of its activities. If Congress really means to check excesses of the Executive, it must be prepared to reform its own legislative machinery to maximize its ability to re- strain the other branch. The pending resolution which would assign appro- priations authority over the Justice De- partment to the Judiciary Committee should be passed at the earliest possible time. We must act swiftly to prevent the un- warranted surveillance and information gathering which has gone on for so long to continue into the future. Before appro- priating funds to the Department of Jus- tice for the upcoming fiscal year, we should insure that these funds will not be used to conduct surveillance and maintain files which are outside the bounds of the Department's legitimate law enforcement responsibilities. Conse- quently, when appropriation bills for the Departments of State, Justice, Com- merce, the Judiciary, and Related Agen- cies come before the House next week, I Intend to offer an amendment to prohibit any sums appropriated for the activities of the FBI to be used to gather informa- tion and maintain investigative files which are not related to criminal inves- tigations or other specific responsibilities of the FBI which are authorized by law. The adoption of such an amendment will save the American taxpayers the money presently being used to collect the kind of information reflected in the contents of my own file. Mr. Speaker, I extend my gratitude for arranging this special order to the gen- tlemen from Ohio (Mr. Mosnza) and from Wisconsin (Mr. KASTENMBIER), who is also the distinguished chairman of the Subcommittee on Courts, Civil Liberties, and the Administration of Justice, which has examined some of these problems in depth. It provides an opportunity for each of us, outside the normal course of our legislative duties, to bring to the col- lective attention of other Members dif- ferent thoughts and perspectives on the whole range of problems created by the untoward and outrageous surveillance activities of the Executive. But speeches alone are not adequate for the task of eradicating the evils which flow from the indiscriminate sur- veillance by government of the lives of our citizens. The words must be rein- forced by action. If the bicentennial an- niversary of our democracy is to have significance, we must reaffirm in deeds the principles upon which our ancestors found this Nation 200 years ago. Noth- ing short of that should be our goal. Mr. MITCHELL of Maryland. Mr. Speaker, will the gentleman yield? Mr. MOSHER. Yes, I will yield to the gentleman from Maryland. (Mr. MITCHELL of Maryland asked and was given permission to revise and extend his remarks.) Mr. MITCHELL of Maryland. Mr. Speaker, for many years I have argued that the most grave threat to the demo- cratic form of government does not come from the Union of Socialist Soviet Re- publics, nor from the People's Republic of China, but that it comes from within this Nation. That threat is the illegal trammeling of civil rights and civil lib- erties done in the name of national se- curity. The threat grows out of an over reaction to peaceable protest, an almost paranoic reaction to the exercise of the right to dissent, and an all pervasive, unreasoning fear about "the Communist takeover." The recent disclosures about the illegal and unethical practices of the Central Intelligence Agency, the Federal Bureau of Investigation, the Internal Revenue Services, and other agencies of Govern- ment reveal how widespread and endemic have been these practices. I think we in this Congress have not done enough to disclose the extent to which local police departments, acting in collusion with Federal agencies, have violated the constitutionally guaranteed rights of citizens, especially black citizens and those who protested against the il- legal war in Vietnam. On March 4 I testified before the sub- -ommittee on Courts, Civil Liberties, and the Administration of Justice. I testified support of H.R. 3113. In my testimony, I established the ex- ent to which unlawful surveillance of dtizens was done by the Baltimore City Police Department. This evening I want .o share portions of that testimony with 7011. On February 14, 1975, 131 persons sent he following statement to the Governor if the State of Maryland: As we approach the bicentennial of the 3unding of our Nation, we are troubled by mounting evidence of police enroachment )n rights guaranteed to citizens in the kmendments to the Constitution. The pub- ,shed list of names of 125 organizations on which the Baltimore Police Department 'athered information suggests the frighten- ag and indiscriminate scope of their activity. Vhen there are real crime problems, why the Police Department wasted half a ;anion dollars a year of taxpayers money a surveillance of such groups as the Na- tonal Association for the Advancement of colored People, the American Friends Serv- Committee, the Baltimore Tutorial Pro- 3ct and the Interdenominational Ministerial . \Mance? While we recognize the necessary role of he police to maintain order and to prevent rime, for the Police Commissioner to justl- y blanket surveillance of these groups listed "prevent disorder, revolution and strife" -4 absurd and tragic. The majority of people ._mvolved were not remotely connected with .,ny activities that could be considered crim- Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, 19792q3proved For FaCipaRZEMOB12111:11TADIVID7-74/18MISR000800110060-9 11 5547 inal. They were persons who care about America and were exercising their Constitu- tional rights as assemble, to enjoy free speech, p. free press, to seek redress of griev- ances, hoping to make the nation more free and more just. With Justice Oliver Wendell Holmes, we believe our Constitution was made for people of fundamentally differing views. The strength of the United States has been in diversity, in capacity to accept difference and to profit from dissent. Civil Rights vic- tories were won in the 1960s because citizens used their right to protest against inequality and injustice. The Vietnam war was halted 'n large measure because citizens used their right to dissent. Although some were aware of the pres- ence of police photographers and infiltra- tors in the 1960s and early 1970s struggle for human rights and peace, only now is the magnitude and threat of police spying in Baltimore becoming apparent. We are shocked by reports from the newspapers, the American Civil Liberties Union and others, and by the Police Commissioner's own ad- missions concerning: Infiltration of Peace and Civil Rights groups. Routine photog- raphy of demonstrators for several years. Collection of information on reporters writing stories unfavorable to the Police Commissioner, or on controversial issues. Surveillance of persons who write letters to editors of Newspapers. Surveillance of Congressman Parren Mitchell; inaltration of a meeting of the Congressman's campaign staff. Surveillance of numerous other public officials, including the Baltimore State's At- torney and the head of the Community Re- lations Commission. Surveillance of Black Clergymen. ISD collection of reports on recent strik- ing hospital workers. ISD collection of reports on individuals and license numbers of persons entering the Friends Meeting House and other places in Charles Village. As citizens concerned for the well being and enhancement of Baltimore, Maryland and the nation, we ask you as head of State and as the authority to whom the Commis- sioner of Police is responsible, to bring to an end the illegal and immoral activity of the Police Department and to help restore an atmosphere of respect and trust in this branch of the government. We urge that you: (1) End all surveillance of peaceful ac- tivity by the Police. (2) Inform the public of the nature and scope of the activity (methods, not disclo- sure of individual files), of the "Red Squad." (3) Inform persons if they have been under political surveillance and no criminal charges have been filed against them. ()rant them the right to examine their files, to destroy them if they wish, and authorize the destruction of duplicate files. (4) Develop written standards controlling Police Department surveillance and infiltra- tion; restrict Police investigation to areas where there is evidence of criminal activity. (6) Develop a system of accountability, giving an independent civilian body the power to review Police methods, files, etc. (6) Place the Office of Police Commissioner under the Mayor, and encourage leadership sensitive to individual liberty and sympa- thetic to the rights of privacy. Included among the 131 signers of this statement were the names of over 40 religious leaders including Bishop Joseph Gossman, the Reverend Hugh Dickin- son, and the Reverend Vernon Dobson; from the NAACP, Enolia P. McMillan, president, and Leonard L. Saunders, vice- president; also representatives from Johns Hopkins University and Medical Institutions; representatives from Goucher, Townson State, Loyola and CCB; from the American Civil Liberties Union, the director, John Roemer, along with 10 lawyers; included also are repre- sentatives of the American Friends Committee. Based upon information made avail- able to me to date, I am firmly convinced that a national domestic espionage ap- paratus existed in America. I further firmly believe that this apparatus in- volved the Federal Bureau of Investiga- tion; the Army Intelligence; and local police departments. In this domestic espionage apparatus, information gath- ered, without benefit of court orders, was exchanged between local police depart- ments and Federal agencies. The infor- mation was gathered and exchanged on persons and organizations that were not Involved in criminal activity. Obviously had the provisions of H.R. 3113 been in effect, this dreadful Kafkaesque situation could not have developed in my city and in other cities across the Nation. H.R. 3113 is a good, needed bill. I have one or two areas of concern that hope- fully can be cleared up today. The first is with the language referring to "private dwelling used and occupied as a dwelling." I think this language needs to be broadened and I shall ex- plain why. During my primary campaign in 1974, infiltration of my campaign headquarters took place. Here is the story as reported by the local press: Leonard Jenoff, the secret police operative who worked for dope trafficker John (Liddie) Jones' lawyer, also infiltrated the offices of Rep. Perron Mitchell, it has been learned. Jenoff volunteered to work "morning, night, plus weekends" in Rep. Mitchell's last election campaign. He also took photographs of Mitchell's campaign workers. Jenoff is an admitted supplier of informa- tion to the police department's Inspectional Services Division (ISD), a clandestine intel- ligence gathering unit that reports directly? and only?to Commissioner Pomerleau. One of Mitchell's aides said Jenoff asked if he could take pictures of campaign workers "for a photography course he said he was taking." He turned over 10 to 15 pictures to us. I don't know if any were given to the police. There is strong evidence to suggest that in my previous congressional cam- paigns similar infiltrations by paid or unpaid police agents took place. These persons could have, and I believe did, in- spect records of telephone calls, credit records, and the like. Therefore, I would like to see the language broadened to cover that kind of situation. My second area of concern deal with section 2519, "Reports concerning inter- cepted wire, oral and other communica- tions." I am aware of the complexity of legal, bona fide information gathering by agencies and I am keenly aware of the need for confidentiality to govern such operations. However, I do feel that the person on whom information was gath- ered ought be advised somewhere down the line that he was the object of such activities. Obviously, if the intercepts re- sult in a specific criminal charge, then the person would know. However, if intercepts do not result in such a charge?or charges?or if indeed intercepts prove that the individuals con- duct and behavior has not been inimical to the best interests of the country, I think the person has the right to know that he was under surveillance and why the surveillance took place. Hopefully, you can clarify these two problems for me. I have and will con- tinue to support H.R. 3113 because it is legislation needed to protect basic civil liberties which are guaranteed by the Constitution. Ms. ABZUG. Mr. Speaker, will the gen- tleman yield? Mr. MOSHER. I yield to the gentle- woman from New York. (Ms. ABZUG asked and was given per- mission to revise and extend her re- marks.) Ms. ABZUG. Mr. Speaker, I would like to extend my appreciation to the gentle- man from Ohio (Mr. MOSHER) and the gentleman from Wisconsin (Mr. KASTEN- MEIER) for the foresight and insistence that this issue of surveillance and privacy be significally aired at this time. Mr. Speaker, I believe that it is im- portant because we have yet to complete the responsibility that is placed upon us by the Constitution and by the electorate to make certain that those pacts which we uncovered at Watergate will not be covered over by a continuation of those same activities through various agencies of the executive branch of Government. My own committee, the Subcommittee on Government Information and Indi- vidual Rights, has jurisdiction, as the Members know, over the Freedom of In- formation Act and the Privacy Act, and in both of those connections we are pur- suing very extensively the oversight of various agencies which have been col- lecting information on the American people. Our citizens have the right to know, and under the Privacy Act they have the right to obtain all of the in- formation and data which these agencies have maintained. In the course of our preliminary hear- ings to date, we have been shocked to find that there have been extensive and deep violations of fundamental rights of privacy, as well as first amendment rights, of many, many untold numbers of American citizens in this country. Mr. Speaker, only last week we dis- covered that instead of the Army's hav- ing really destroyed all of the files of civilians whom they havehad under sur- veillance, they discovered by accident some more files, now numbering at least 9,000. The Secret Service has indicated it is maintaining surveillance on 47,000 citizens, although they admit only 300 of those persons could actually constitute a threat to the life and safety of the President or his family and other per- sons under their protection. The CIA, as we all know, has conducted massive surveillance over the activities of American citizens. These facts have been developed in hearings being con- ducted by the Select Committee of the Senate, by my committee, by other com- mittees in Congress, including the Com- mittee on the Judiciary, as well as the Rockefeller Commission. We find there have been serious inva- sions of privacy through surveillance not only by the CIA but also by the FBI in an unauthorized manner, including vi- Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 II 5548 Approved ForattlwARMAOARIb?i3P_7_7til&b1s4iR00080011006A9te 16, 1975 latinn of the postal laws, in that first- class mail was illegally opened. We have also discovered unauthorized wiretaps, infiltration of political groups, and out- right burglary. Legislative control must be exercised in this area. The Congress must not only continue its oversight activities, but must enact legislation which will stop the kind of abuse we have recently discovered. My subcommittee will continue its oversight in our jurisdictional area of Government information and privacy. We will also consider legislation designed to control the excesses of the Govern- ment police agencies. Hearings have al- ready begun on amendments to the Pri- vacy Act. These amendments will remove the blanket exemptions granted to the CIA and the Secret Service in the origi- nal bill. The facts that have recently come to light make it imperative that the CIA and the Secret Service be held accountable to each American citizen whose rights have been abridged by their activities. In addition I am considering legisla- tion which will control the spreald of computers throughout the Govern- ment?especially the linking of various computers through advanced communi- cations networks. I have also introduced legislation which would prohibit the in- terception of certain communications unless all parties to the communication agree to the monitoring or interception. Mr. Speaker, I especially want to com- pliment again the gentleman from Ohio (Mr. MOSHER) , who brought this special order, because we can do a lot more to bring this matter to the attention of the Congress and the public. (Ms. ABZUG asked and was given permission to revise and extend her remarks.) Mr. MIKVA. Mr. Speaker, will the gen- tleman yield? Mr. MOSHER. I yield to the gentle- man from Illinois (Mr. Mnrys). Mr. MIKVA. Mr. Speaker, I want to join my colleagues in commending the gentleman from Ohio (Mr. MOSHER) for his concern about this problem and for his focusing the attention of the Con- gress and of the people on this problem. It is a problem that has not gone away, and it will not go away unless all of us express the kind of concern that he has shown. There is a feeling extant in the coun- try that if one has nothing to hide, if one has done nothing wrong, what dif- ference does it make if somebody is fol- lowing him around or if somebody is lis- tening in on his telephone conversations? And indeed there is also a feeling that, after all, if a few thousand people or even 10,000 people are being watched and spied upon and their activities are being reviewed, in a country containing 213 million citizens this somehow is not a very serious problem. Mr. Speaker, I think, in addition to the violations of the rights of people who are being followed and who are being Interdicted and their freedom threat- ened, that there is a much more serious problem, and that is the deterrent effect that this kind of activity has on the whole free society, because there is the danger that, through surveillance or even because of the popular belief tlia. there is the existence of surveillance, we will discourage the kind of full, free, and unrestrained exchange of ideas and view points on which democracy is based When people and citizens and partici- pants in political ,debate feel they mus; restrain their utterances, that they Must watch their tongues, that they must have a care about which groups they join cir which candidates they vote for and who they write letters to or who they receiv.- letters from because somebody might bc watching them, we are taking that flm step?but it is a very long step?toward the very totalitarianism that these ac- tivities are proclaimed to prevent and, deter; then we are in our way in America reaching toward the kind of closed soci- ety that the CIA, the FBI, and all the other intelligence-gathering agencies as- sure us in the defense of their actionr they are trying to keep from happening It has long been the hallmark of to- talitarian societies that only approved persons ought -to participate in the polit- ical process. If we did not have the right ideas, if we did not vote for the right people, and if we did not have the right relationship- with other people in the public arena then we ought not get involved. There was and is a deliberate effori in totalitarian states to keep people frarr. getting involved in political processes, and if we do not want that kind of deter- rent here, then we must finally put a check on the kind of Government sur- veillance of activities, particularly in the political arena, which is going to put a chill on that kind of thing in the po- litical arena. I suppose that one of the problems- about trying to do anything about it is that most of the time the Governmen1 agencies which are involved end up by saying, "We did not do it, and we promise to stop." It is always a very ephemeral kind of proof that one has about who is being wiretapped, and about where the extent of the surveillance exists. There is always some kind of justification for it. Mr. Speaker, I would only say that if the Congress does not begin to treat with seriousness of the problem that the gen- tleman from Ohio (Mr. MOSHER) sug- gests and my distinguished colleague, the gentleman from Wisconsin, my former chairman, suggests, I think we are going to deserve the kind of trouble we have because, when all is said and done, if we cannot abide the very freedom that dis- tinguishes this society from totalitarian states, then the Government agencies Which are engaged in that surveillance are going to be the best justification of all for engaging it because we will not be able to exist in any other way. Mr. Speaker, I thank my colleague for yielding. Mr. MOSHER. Mr. Speaker, I especial- ly appreciate the emphasis the gentle- man from Illinois (Mr. Mixvs) has just placed on the chilling effect that the atmosphere of fear has, which I empha- sized in my earlier remarks. This seems to me to be a matter of extreme concern. Mr. Speaker, I now yield to the gentle- man from New York (Mr. BADILLO) . (Mr. BADILLO asked and was given permission to revise and extend his re- marks.) Mr. BADILLO. Mr. Speaker, I want to commend the gentleman from Ohio (Mr. MOSHER) and the gentleman from Wis- consin (Mr. KASTENMEIER) , for having brought up this special order which I think is particularly appropriate for dis- cussion at this time in view of the report of the Rockefeller Commission. I think that the statements and the recommendations of the Rockefeller Commission, which merely call upon the President to tell the postal authorities and the CIA not to do it again, that is, not to violate the law, cannot be ac- cepted by this Congress. I think in view of those recommendations, it is urgent that our subcommittee and the Com- mittee on the Judiciary, of which I am a member, take action at this session to pass either the bill advocated by the gentleman from Ohio (Mr. MOSHER) or an appropriate bill that will deal with the question of surveillance. I just want to cite one example of the need for urgency. The Rockefeller Com- mission report points out that there were a limited number of mail openings that took place during the 20-year period where the mail was being opened, but Mr. Cotter, who testified before our sub- committee and who is the chief postal inspector, indicated clearly that the ar- rangement for the opening of the mail was such that there really was no way in which the postal inspectors could know how many letters, in fact, were opened by the CIA and the FBI per- sonnel who were involved. Therefore, in the light of that, to sug- gest that it is enough merely for the President to say to the agencies involved not to take this action, I think is totally inadequate. I think, therefore, we should take action now. I think we have to go even further, frankly, because the report also points out that the Justice Department had agreed for a period of 20 years not to prosecute anyone who was violating the law and who was a member of the CIA because they agreed to let the CIA, in effect, investigate itself. I think, under those circumstances, the fact that President Ford said last week that he was referring all of the materials received from the Rockefeller Commission to the Justice Department is an inadequate recommendation be- cause it is the Justice Department which Itself is violating the law. I think that not only do we have to take action on a bill this session, but I think we have to establish a special pros- ecutor to see to it that those who are responsible for illegal acts are prose- cuted, including those people who are within the Justice Department right now. So I think it is very appropriate that we begin a dialog on this subject, and Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, /A4roved For Reis:OW.02E that we complete the bill, report out a bill from our subcommittee, the full committee, and on the floor of this House, and from the other body. Mr. MOSHER. Mr. Speaker, I very much welcome the expression of sup- port of the gentleman from New York (Mr. BADILLO) for the legislation that is before the gentleman's committee. Mr. KOCH. Mr. Speaker, I am pleased to participate in the special order on pri- vacy called for by our colleagues, CHARLES MOSHER and ROBERT KASTEN- MEIER. In the 93d Congress on April 2, 1974, Congressmen BARRY GOLDWATER, Jr. and I sponsored a special order on the issue of privacy and we were pleased with the response of the members to our concerns. The 94th Congress must be concerned with the preservation of the individual's right of privacy and I am hopeful that today's dialog will elicit some new thoughts and serious discus- sion on this issue. Last December 31, the President signed Into law the Privacy Act of 1974. This was the culmination of a 6-year effort on my part and that of many of our col- leagues to place controls on the Federal Government's collection, use and dis- semination of personal information about citizens. Earlier this year Congressman GOLD- WATER and I introduced H.R. 1984 which provides that controls similar to those In the Privacy Act be placed on State and local governments and organizations in the private sector. The provisions of this bill are by no means sealed in cement. We have sent a questionnaire to orga- nizations affected by this legislation to ascertain the reactions to it. Approxi- mately 500 responses have been received and we will be tabulating the results shortly. The results will be made avail- able to our colleague, DON EDWARDS, who chairs the Judiciary Subcommittee on Civil Rights and Constitutional Rights, and who will be holding hearings during this Congress on the legislation. The legislation which BARRY GOLD- WATER, Jr. and I have introduced and which we consider the basic draft is for the purposes of eliciting comments. Un- doubtedly, there must be additions, de- letions and changes. That is nwhy the Privacy Protection Study Commission came into being so as to provide the forum for that testimony. The Privacy Act of 1974 calls for the establishment of a privacy commission which will report to the President and the Congress in 2 years on the results of its study on data banks in governmental, regional, and private organizations. The Commission is to determine what must be done to protect personal information, and the privacy of individuals. The Com- mission members are Minnesota State Senator Robert Tennessee; William Dickinson, retired managing editor of the Philadelphia Bulletin; William 0. Bailey, executive vice president of Aetna Life and Casualty; David F. Linowes, a partner with Laventhol, Krekstein & Hor- wath; Willis H. Ware, corporate research staff member of the Rand Corp.; Con- gressman BARRY GOLDWATER, Jr., and myself. ObTACI4RCORTIV143011(20;1135080011 0060-9 H 5549 The Privacy Commission has had nearly a 6-month delay in getting started because all of its members had not been appointed. But now that the President has announced his appointments, all seven members will get together shortly to begin our work. I am pleased that the private sector and State governments are represented on the Commission. I intend, as I hope the other members do, to pur- sue hearings regarding the impact of privacy legislation with an open mind. We have to be made aware of much in- formation from the private sector in de- veloping our report and I encourage or- ganizations to submit their reactions to us. ' The special order called for today is devoted to the specific issue of domestic surveillance activities of the U.S. Gov- ernment. Last year the Annual Chief Justice Earl Warren Conference on Ad- vocacy sponsored by the Roscoe Pound- American Trial Lawyers Foundation held a conference on the subject of Privacy in a Free Society. Three areas were dis- cussed?data banks and dossiers, elec- tronic surveillance, and political inform- ing. I am appending from the report of the conference, in which I participated, the recommendations on electronic sur- veillance. The material follows": FINAL REPORT?PRIVACY IN A FREE SOCIETY PART A?RECOMMENDATIONS : ELECTRONIC SURVEILLANCE 'Summary (Note: Final Recommendations on Elec- tronic Surveillance emanating from the Con- ference together with commentaries follow this summary.) The Conference undertook the study of electronic surveillance in two areas?domestic intelligence and law enforcement. The Con- ference expressed strong opposition to elec- tronic surveillance for domestic intelligence purposes. It opposed, by a narrow margin, the use of electronic surveillance for law enforce- ment purposes. In discussing two methods of electronic surveillance, the Conferees were opposed to both telephone tapping and room bugging. However, they felt that room bugging was more insidious than telephone tapping be- cause of the much greater and less controll- able invasion of privacy resulting from room surveillance. A broad consensus of the Conferees revealed general skepticism toward electronic surveil- lance as a tool and towards methods for con- trol of its use. It is interesting to note that this general skepticism was shown among members of such a diverse group including many with long experience in law enforce- ment and in law. The opponents of electronic surveillance based their conclusions on a belief that electronic surveillance was of rela- tively little value to conventional law en- forcement, was used primarily for minor offenses, produced very serious invasions of privacy, and was quite difficult to control. It should be noted that there was some discus- sion about the validity of the available sta- tistics, which indicated that electronic sur- veillance was invoked most often in cases of "minor offenses." There were Conferees supporting some electronic surveillance for law enforcement purposes, who believed that the technique should be used only for crimes of the utmost gravity and only if controls are strengthened and, together with those currently in the statute, are more effectively enforced. The Conference stressed that, if there were to be any electronic surveillance, regardless of its form., of American citizens, it should be only with prior judicial scrutiny and ap- proval?with a court order. A substantial majority recommended that no surveillance for intelligence purposes be permitted. How- ever, if any electronic surveillance were au- thorized, it should be only for solving spe- cific crimes and not for obtaining general intelligence about particular individuals or groups. The Conference also overwhelmingly rec- ommended a series of procedural and other controls. It suggested a requirement that, whatever federal electronic surveillance is done, it should be conducted only by the Department of Justice, subject to criteria and procedures examined at public hearings, and under close scrutiny by congressional committees. Also, the Conference urged that persons subjected to illegal electronic sur- veillance be permitted to recover damages from the governmental agencies engaging in such activity. RECOMMENDATION 1 There should be no electronic surveillance for domestic intelligence purposes? (Adopted by substantial majority) Commentary: While disagreement re- mained as to whether electronic surveillance, with restrictions, is permissible when related to detection and prosecution of specific crimes, a majority of the Conferees deter- mined that electronic surveillance for domes- tic intelligence should not be permissible. RECOMMENDATION II There should be no electronic surveillance for law enforcement purposes.2 (Adopted by narrow margin) Commentary: This vote represents the fundamental division among the Conferees. While there was general skepticism regard- ing the effectiveness of electronic surveil- lance, a narrow majority believed that law enforcement authorities should not be al- lowed to use electronic surveillance even for crime detection purposes, and a minority believed that electronic surveillance should remain available for law enforcement, though this group insisted that it be used only for very serious offenses, and under very strict controls. There was a group of Conferees who, whatever their individual predilections on this issue, made the point that our current knowledge concerning electronic surveil- lance at all levels of law enforcement (fed- eral, state and local) is inadequate. Addi- tional empirical studies are needed to deter- mine the extent and the effectiveness of its use. RECOMMENDATION IN State and local authorities should not be allowed to engage in electronic surveillance.a Mr. Michael Kenney wanted to be on rec- ord as being opposed to all electronic sur- veillance. His single Recommendation in this area would be: "There should be no elec- tronic surveillance." s Mr. Kenneth Conboy dissents from this Recommendation and adds the following statement: "I cannot subscribe to the dubi- ous logic of the proposition that, because too many gambling warrants have been is- sued in the past several years, no authority, regardless of how circumscribed in execu- tion, should be vested in the courts to issue warrants in cases involving, for example, im- minent bombings, aircraft hijacks, random killings or barbarous political murders." Ms. Mary C. Lawton wished it noted that she abstains on propositions relating to elec- tronic surveillance. She felt that more pre- cise definitions of terms used in the dis- cussions were needed. Mr. Conboy did not support the Recom- mendation because "the data supports the conclusion that state authorities have been Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 II 5550 Approved FotiNtartpAbypgri3UWASIEL7W9gpR0008001100n9e 16, 1975 (Vote evenly divided) Commentary: There was a sharp split over whether state and local law enforcement of- ficials (as opposed to federal officials) really need electronic surveillance, whether they have used it excessively and indiscrimin- ately, and whether the judicial and other controls in the statute do or can function properly on the state level. RECOMMENDATION IV No electronic surveillance should be carried out without a court order for any purpose on American citizens on United States soil or on American citizens in foreign countries. (Adopted overwhelmingly) Commentary: The Conferees drew atten- tion here to the Supreme Court's decision the United States vs. U.S. District Court, 407 U.S. 297, 92 S. Ct. 2125, 32 L. Ed. 2d 752 (1972), which suggested in an 8-0 decision that, in all cases of electronic surveillance on American citizens or organizations for intelligence purposes, that is, for purposes unrelated to solution of a specific crime, a court order is required. Also, the Executive Branch has no inherent power to invade a citizen's right to privacy without satisfying an impartial magistrate that a justification exists for such an intrusion. This Recommendation expresses the Con- ference's conviction that there be no war- rantless electronic surveillance, under any circumstances on American citizens. RECOMMENDATION V To the extent that electronic surveillance Is permitted for law enforcement purposes, it should be limited to crimes of the utmost gravity. (Adopted by large majority) Commentary: While there was some dis- cussion on the meaning of "crimes of utmost gravity," the Conference reached no final definition of the concept, except that it would almost certainly include an imminent threat to life. RECOMMENDATION VI If used at all, electronic surveillance for law enforcement purposes should be per- mitted only by court order and on probable cause subject to the following conditions: (A) It must be directly related to specific criminal acts or activities; (B) There must be a specific limitation of the time during which the device remains in place or in use; and the length of time permitted should be the shortest possible; (C) There must be a definite demonstra- tion of the need for installation of the device; (D) There must be no other law enforce- ment technique available for obtaining the information, and the applicant must demon- strate this fully; (E) There must be restraint?responsible action and accurate reporting by the law enforcement officials carrying out the order. (Adopted overwhelmingly) Commentary: This Recommendation re- flects specific problems in the present opera- tion of the electronic surveillance statute, and is intended to supplement and make more effective the statutory controls. RECOMMENDATION VII Even when electronic surveillance is used with regard to crimes of utmost gravity, there should be no electronic surveillance of rooms?no bugging of a room. (Adopted by large majority) Commentary: Bugging should not be utilized under any circumstances. Bugging was seen as a more serious invasion of pri- __ more discriminating in the use of electronic surveillance than federal authorites. For ex- ample, the huge number of gambling war- rants obtained were predominantly obtained by the FBI. Also, jurisdiction for the most serious crime in terms of penalty?murder-- is almost exclusively with state officials." vacy than wiretapping since, while one can refrain from using a telephone and thereby avoid a wiretap, the presence of a room bug in one's home or office makes it impossible to be free from surveillance.? RECOMMENDATION VIII If any federal electronic surveillance is to be permitted, the authority for all warrants for wiretapping should be limited to a single governmental agency?the United States Justice Department. The Justice Department should be the only federal agency to install wiretaps on United States soil and on Ameri- can citizens abroad.? (Adopted overwhelmingly) Commentary: Since electronic surveillance is difficult to detect in the first place, a pro- liferation of federal agencies engaged in wire- tapping would ineluctably result in more privacy abuses than would result if all legal wiretapping were the responsibility of only one agency. The Conferees were mindful of the diver- sity of government agencies engaged in elec- tronic surveillance which were uncovered during the Watergate investigations- some of them accountable to no one but the Presi- dent?with the Justice Department and the courts being entirely by passed. RECOMMENDATION Ix The procedures and criteria by which wire- taps and other forms of eavesdropping are sought, and warrants for their use issued, should be clearly and properly prescribed by the United States Justice Department only after complete public hearings on these pro- cedures and criteria, such hearings to be held in various parts of the country. (Adopted overwhelmingly) Commentary: If the Justice Department is established as the only agency with the re- sponsibility for federal electronic surveil- lance, the citizenry should be made aware of this. Furthermore, the citizenry should be made aware of the precise processes by which eavesdropping is permitted by the courts and carried out by the Justice Depart- ment. In this way the widespread fear that government eavesdropping is pervasive can be countered by a precise vesting of limited authority?and accountability for any abuse of that authority?in this one agency. RECOMMENDATION x A very strong congressional oversight com- mittee should be established in both branches of Congress to review all wiretaps by federal agencies. This would apply to the United States Justice Department if It were established that it were the only govern- mental agency authorized to wiretap. Commentary: The unanimous approval of this Recommendation reflects the strong con- viction of the Conferees concerning the es- tablishment of an active monitoring system by Congress?representatives selected by the citizenry?to ensure accountability on the part of chose involved in limited, carefully restricted, use of electronic surveillance.? 4 Mr. Conboy dissented from this Recom- mendation and explained how he saw its re- suit: "the law would simultaneously author- ize (wiretapping) and condemn (room bugging) electronic surveillance of the im- minent criminal, contingent solely upon the mode (phone conversation or face to face meeting selected by him.)" 'Professor John Elliff suggests that "the United States Department of Justice should not be the agency to install wiretaps over- seas, since its investigative jurisdiction is primarily within the United States. How- ever, the Attorney General might properly be required to approve any wiretaps in- stalled by another agency on American citi- zens abroad." 'Mr. William D. Ruckelshaus informed the Conference, that "not once, in the eighty days during which I was Acting Director of the FBI, was I called on to testify before RECOMMENDATION XI A reporting system should be undertaken by the Justice Department, subject to prop- er regulations to maintain confidentiality, so that all information disclosed by taps can be given to Congress for it to properly exer- cise its oversight function. (Adopted unanimously) Commentary: The information would in- clude: the duration or the wiretap; the need for the tap; an affidavit submitted for the Issuance of a warrant for the tap; the author- ization by the Attorney General of specific taps; what information the tap revealed and the consequences of the tap, that is, whether there was an arrest, conviction or any other disposition. RECOMMENDATION XII A specific minimum amount of damages, plus attorney's fees, should be available for any violation of the wiretapping or other eavesdropping statutes by federal, state or local officials. These damages should be re- coverable in a federal court from the partic- ular governmental agency engaged in such eavesdropping. (Adopted overwhelmingly) Commentary: The Conferees believed that effective sanctions must be provided against all who violate statutes concerning the use of electronic surveillance. Mr. BIESTER. Mr. Speaker, I wish to commend the distingunished gentleman from Ohio (Mr. MOSHER) , and the dis- tinguished gentleman from Wisconsin (Mr. KASTENMEIER), for their leadership in further bringing to the attention of the House and of the American public the need for legislation in the field of Government surveillance of private citi- zens. I know firsthand the dedication to civil liberties and indiivdual rights which these two Members of Congress have ex- hibited in their work in the House. In March of this year, it was my privi- lege to appear before the Subcommit- tee on Courts, Civil Liberties, and the Administration of Justice, chaired by Mr. KASTENMEIER. I testified on behalf of leg- islation known as the Bill of Rights Procedures Act, introduced by Mr. MosH- ER Ill the House, and by the distinguished gentleman from Maryland, Mr. MATHIAS, in the Senate. The Bill of Rights Procedures Act would require any Federal agent to ob- tain a court order before he or she could conduct any form of surveillance on a private citizen. The Government would be required to demonstrate probable cause that a crime had been or was about to be committed before any warrant for surveillance could be issued. The legisla- tion is intended to be comprehensive in scope, to cover all forms of surveillance, including bugging, wiretapping, and all other forms of electronic surveillance, opening of mail, mail covers, entering of dwellings, and the inspection or procure- ment of the records of telephone, bank credit, medical, or other private transac- tions. Mr. Speaker, I believe the need for new legislation in the field of govern- mental surveillance of private citizens Is clearcut. The fourth amendment to the Constitution of the United States proclaims the right of the people to be "secure in their persons, houses, papers Congress about the FBI's Involvement In electronic surveillance. It Is not in the pub- lic interest for any such activity to go un- monitored by the Congress." Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, 1975 CONGRESSIONAL RECORD?HOUSE H 5551 and effects against unreasonable search- es and seizures." Security, however, must be more than an abstract legal proposi- tion. If security is to have any meaning at all, it must be a sure perception of one's condition. I seriously doubt that the American people today consider themselves secure against unreasonable searches and seiz- ures. Twentieth century technology has given governments and indeed private institutions the ability to intrude into the private realm of an American's life with staggering efficieincy, sophistica- tion, and secrecy. The technological ca- pacity for an unprecedented degree and scope of governmental intervention into - peoples lives exists today. Without new, stricter safeguards and more effective means of oversight and control, there is little reason to doubt that such tech- nology will eventually be used, if indeed aspects of it have not already been employed. The American people today are sus- picious of government. They are skepti- cal not only of its ability to solve prob- lems, but they even question govern- ment's basic motives. That skepticism is healthy to the degree it results in de- mands that the Congress of the United States act forthrightly to end unneces- sary and illegitimate intrusions into peo- ple's Private lives. Only by responsibly addressing Itself to this very basic but complex problem can Congress restore to the American public a firm sense of security, a justified perception that one is indeed safe against unreasonable and arbitrary or capricious governmental intrusion. Clearly the questions at stake in con- sideration of the whole issue of govern- mental surveillance go to the very core of the democratic process. This ;issue forces us to contend with perhaps the most basic question faced by a free so- ciety: where do we draw the line between the rights of the individual and the legit- imate and necessary functions of society as embodied in the Government? Such a question has never been easy to answer, and it is particularly difficult In this complex and technically sophis- ticated age. The introduction of national security considerations further compli- cates the issue. As a member of the Committee on In- ternational Relations, a member of the Subcommittee on National Security dur- ing the 93d Congress, and a former mem- ber of the Judiciary Committee, I would particularly like to examine the question of governmental surveillance in matters pertaining to national security. Clearly all those in positions of public responsibility must approach national security considerations with a weighty concern for the dangers inherent in the prevailing international political system, and the peculiar obligations which our position within that system imposes on the Government of the United States. Few would dispute the need for the Gov- ernment to deal with some especially sensitive matters in secrecy. Few would dispute the need for the Government to preserve international trust in the con- fidentiality of diplomatic discussions. But equally clear must be the need to deal with such legitimate national secu- rity concerns within our constitutional framework?to subject governmental surveillance to proper and reasonable standards of procedure, and to minimize the scope for individual caprice or abuse of power. With regard to national security, what balance do we properly strike? Where, Indeed, doeve draw the kind of line which protects both the individual and society at large? I would contend that under existing procedure, the rights of the individual under the fourth amendment are inade- quately protected. The law presently allows surveillance to be undertaken on the authority of the President?with such authority usually executed by the Attorney General?when national security is considered to be at stake. It seems clear to me that such a pro- cedure?involving individual interpre- tation of such a broad and ambiguous term as "national security" does, indeed, allow for abuse of power. The Bill of Rights Procedures Act would rectify that situation by linking all surveillance?including that under- taken on grounds of national security? to a court order based on probable cause that a crime had been or was about to be committed. In the case of national security, such an order would have to be linked to sus- pected sabotage, espionage, treason or similar crimes. Is this an unreasonable restraint on executive power? Would such a require- ment hamper the proper stewardship of our national safety? Would it indeed swing the judicial pendulum dangerously In the direction of individual rights at the expense of societal security? I think not. Such a requirement is in- herently reasonable and proper, and would not have to subject our society to risk. I am supported in this belief by the Honorable William D. Ruckelshaus, for- mer Deputy Attorney General and for- mer Acting Director of the Federal Bureau of Investigation. Hardly a man oblivious to legitimate national security considerations, Mr. Ruckelshaus last year stated before joint hearings of the Senate Committees on the Judiciary and Foreign Relations that he sees "no rea- son why all wiretaps should not be sub- ject to court warrant." To restrict wiretaps and other forms of surveillance to instances approved by a Federal court, simply means the Gov- ernment must establish to the satisfac- tion of an independent arbiter that a reasonable suspicion exists as to the com- mission of a crime affecting the national security of the United States. The Bill of Rights Procedures Act would thus not bar necessary national security surveil- lance; it would simply subject the need for that surveillance to prior assessment by the judicial branch. Such a prior as- sessment simply, but significantly re- moves national security surveillance from the realm of possibly arbitrary, capricious action. Government surveillance?divorced from suspected criminality and un- restrained by any check?imperils our constitutional system, and thus under- mines the very national security it is ostensibly designed to protect. If we are to protect our genuine na- tional security interests as well as safe- guard individual rights within our con- stitutidnal framework, Congress must respond to the complex challenge of enacting new legislation on surveillance. I feel confident that with dedicated Members like CHARLES MOSHER and Boa KASTENMEIER helping to lead the way, Congress will adequately meet this diffi- cult challenge. Mr. GOLDWATER. Mr. Speaker, I am very pleased that my distinguished col- league from Ohio, Representative CHARLES MOSHER, and the chairman of the Judiciary Subcommittee on Courts, Civil Liberties, and the Administration of Justice, Representative ROBERT KAS- TENIVIEIER, have taken this special order on the subject of surveillance and the interception of communications by elec- tronic and other devices of citizens of the United States. I have had the pleas- ure of testifying before Mr. KASTEN.- MEIER'S subcommittee on Congressman Mosnee's bill, H.R. 2604, the Bill of Rights Procedures Act a 1975. I am a cosponsor of that legislation, as I was in the preceding Congress. This is Impor- tant legislation and Congressman MOSHER IS to be congratulated for being its author and chief proponent in the House of Representatives. I do not believe that there is anyone who can question the interest of myself or my family in the quick and successful combating of individual and organized crime in the United States. I agree tiller with former Chief Justice Earl Warren's statement that the modern law enforce- ment community must utilize all that is legitimately available to it, including the fruits of modern technology, in its battle to stop crime and end lawlessness. The quality of our life and the future of our society are at stake in this battle against crime. My support for this bill stems from my deep and sincere belief that the inalien- able rights and liberties found in the Constitution and the Bill of Rights? especially the 1st, 4th, and 14th amend- ments relating to freedom of speech and association, security in one's property and personal possessions, and the right to due process?are being erroded by the increasing use of surveillance as a pri- mary tool and investigative aid by the law enforcement community. There is loose an idea that electronic gadgets and surveillance are by definition helpful in the prevention of crime and in the suc- cessful prosecution of criminals. This at- titude is apparently an outgrowth of American technocracy: that things sci- entific and technical in their general ap- plication to daily life are good, healthy, and desirable. It causes citizens and members of the law enforcement commu- nity to assume that the activity is corn- patable with our basic rights and liber- ties. But, such applications, when left unquestioned, can clearly lead to abuse and misuse. This propensity recently received its confirmation in the Watergate break-in Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 II 5552 Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 CONGRESSIONAL RECORD?}OUSE June 16, 1975 and in the illegal surveillance conducted by the so-called plumbers unit. There, surveillance was conducted that directly violated our Constitution. Some of it was accomplished through the misuse of legitimate law enforcement operations. In a few instances, Federal law enforce- ment personnel unwittingly contributed to the problem because they had no com- prehensive, commonly identified and agreed with criterion for judging the legitimacy of the activity. T have a sense of urgency about this area of activity for each of us knows that recent events do not stand alone, They are not an abberation. To varying and often lesser degrees, we know of events like Watergate and of excesses in the general law enforcement community going back over 30 years. And, the current situation at the Federal level cries for improvement. Simply put, there Is too much vaguely defined administra- tive authority within the executive branch that applies to the area of sur- veillance. Operational authority is so widely dispersed as to undermine stand- ardization of surveillance criterion and decisions. And., the situation has not been made any better by the recent conflicting and contradictory court decisions that have been added to the "surveillance mix." Clearly what is needed is legislation that defines the term surveillance, re- stricts and regularizes the authority for undertaking surveillance, and that estab- lishes strong penalties for violations of basic civil rights through illegitimate surveillance. The Mosher bill, H.R. 2604 does these things. For that reason I com- mend it to the careful attention of the House. And, I thank my colleague for arranging for this special discussion and giving me the opportunity to participate. Mr. METCALFE. Mr. Speaker, every- where we turn today, we see Govern- ment infringing on the civil liberties of its citizens. This Government surveil- lance, this keeping of dossiers, these dirty tricks seem to pervade every level of American Government today. These activities have taken many forms, they have been overt and covert, they have been insidious and they have been un- disguised. The list of those Government de- partments and agencies involved in this spying seems endless. The White House, the FBI, the CIA, the IRS, the Secret Service, the U.S. Army, and State and local government in at least four States, have allegedly been involved in main- taining files or improper surveillance on tens of thousands of American citizens. A pattern of abuse is clear. On every governmental level, we see elected rep- resentatives of the people and their agents conducting improper and illegal surveillance activities for the sole pur- pose of identifying and harassing dis- senters and political opponents who, for the most part, exercise their constitu- tionally guaranteed rights in a legal and lawful manner. Abuses on the Federal level have been well documented in recent months. The laundered Rockefeller Commission re- port, even with its extensive gaps, is simply the latest in a long and sad ser .es on revelations concerning misuse of power within the Federal executive branch. These same kinds of abuses, on Ste le and local levels, have not yet been -1.) well documented. Enough of these acti- - ities have been disclosed, however, give us a strong indication that the Fe ,- eral Government was not alone durir g the past 10 years in its illegal suwei- - lance. We have seen cases of State and loc agencies, in some cases using Feder .1 funds, maintaining improper and po - sibly illegal surveillance on private cit - zens. In my home city of Chicago, for es - ample, it has become clear that the poll( e intelligence division was used, at least in part, to maintain surveillance upon thot, - sands of Chicago area residents wh s never had been the subject of crimint 1 investigations. Police officials have Sc - knowledged after months of denials, that surveillance was maintained and file were kept on literally thousands of C:hi cagoans whose only "crime" was so m connection with any one of dozens o:" political, civic, and community group within the city who the administration perceived as a threat to its policies, File were maintained on, among other people Senator CHARLES PERCY: myself Father Theodore Hesburgh, president of Notre Dame University; Arthur Woods, chair- man of the board, Sears, & Co.; Illinois State Attorney Bernard Carey; and Illi- nois State representative; and at least three aldermen of the city of Chicago. In addition, secret grand jury testi- mony of the former superintendent of the Chicago Police Department, made available to the press indicates that the Superintendent was aware of illegal sur- veillance activities, including wiretap- ping and burglaries which were under- taken by the intelligence division. The General Accounting Office has re- cently completed, at the request of myself and others, an investigation into the use of Federal funds for these activities. It has determined that nearly $10 mil- lion was spent on the police intelligence division between 1972 and 1974. Nearly $5 million of these funds were Federal moneys?$3.9 million to LEAA funds and between $539,000 and $779,000 in revenue sharing funds. The GAO was unable to determine whether or not revenue sharing funds were used to pay salaries of those officers who engaged in the political spying of the intelligence division. Its lack of subpena power and a continuing State grand jury investigation severely limited its investi- gation in this respect. Enough information was gathered by the GAO. however, to warrant further investigation. Therefore, I have written Chairman RODINO of the House Judiciary Committee and Chairman ULLmAN of the Ways and Means Committee, whose com- mittees, of course, do have subpena power, asking them to determine pre- cisely what role Federal funds played in the political intelligence activities of the Chicago Police Department. In the case of the revenue-sharing funds, I have also informed the Office of Revenue Sharing of the GAO report and intend to forward such information as may be gathered in congressional inves- tigations for them to act upon. The Office of Revenue Sharing has the authority to conduct its own investiga- tion into matters such as this. If they determine that "improper" use of rev- enue-sharing funds has occurred, they may take action on one of several levels, including demanding that the funds im- properly used be returned to the Federal Treasury. Thereis no doubt that the responsibil- ity of the Office of Revenue Sharing is clear in these cases of policy spying. Il- legal surveillance certainly constitutes improper use of Federal funds. If it can be determined by either the courts or by a committee of the Congress, that such surveillance was, -indeed, illegal, I would hope that the Office of Revenue Sharing uses its authority in this matter to apply the most strict penalties against States and cities that use Federal revenue- sharing funds in this manner. The General Accounting Office report outlined the use of LEAA funds, as well, by the police intelligence division. Nearly $4 million of these funds was used by the city of Chicago to establish a computer system to which many city agencies, in- cluding the intelligence division, seem to have had access. In light of the wide- spread misuse of such data banks by both government and private groups, this too would seem a matter for further study. The General Accounting Office ob- tained information on one other aspect of intelligence activities in the Chicago area. This concerned the 113th Military Intelligence Group and its alleged sup- port of right-wing terrorist activities. Ac- cording to these reports, this Regular Army unit provided information and weapons to militant groups such as the Legion of Justice and assisted them in the systematic disruption of various lib- eral organizations in the Chicago area. These same reports alleged that the 113th Military Intelligence Group exchanged information and received assistance from the intelligence division of the Chicago Police Department. The GAO, in its investigation, could only determine that most files of the 113th Military Intelligence Group had been burned in 1972 and those that had not been destroyed "were not readily available." Mr. Speaker, Chicago may be one of the most blatant examples of such mis- use of authority by high administrative officials, but it is certainly not the only example. Similar cases have been report- ed in Philadelphia, Baltimore, and Hous- ',on in recent months and this, too, may inly be the tip of the iceberg. At the time the GAO report on police ,ntelligence activities in Chicago was re- :eased, I called the activities it outlined 'an obscene misuse of governmental euthority." What I said about Chicago is equally rue about other cities where this may have happened and equally true about the Federal Government's illegal surveil- lance activities. These abuses have infected nearly Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 June 16, 1Approved For RelECONMEGAMIAVAIROORIM-00111486E0800110060-9 H 5553 every level of government in this country, and in almost every single case, the Fed- eral Government seems involved, either directly or indirectly. ?Whether it is the use of Federal money to fund the intelligence activities of local police departments or the improper use of Federal data banks or Army support of right-wing terrorists or Cointelpro or the White House plumbers or any of the others, these sickening abuses of the Constitution have gone far enough. If unchecked, these activities could in a very real sense, mean the end of Amer- ican democracy as we know it. Should they continue on the massiye scale that they have existed in recent years, a cornerstone of our system of govern- ment?the right of dissent?would be in serious jeopardy. Corrupt and power hungry officials and petty despots to the contrary, however, the first amendment is still with us. Those of us who see injustice and in- equality in this country will continue to speak out in order to make this a better country. We will not be deterred. We will not be intimidated. Activities such as those I have outlined here" today, will only redouble our efforts to speak out against these abuses. This Congress, however, must put a stop to these activities wherever they occur. If 1 cent of Federal money, money that we appropriate, is used for these abuses, it is our responsibility, our obli- gation, to expose it and end it, once and for all. Mr. GUYER. Mr. Speaker, as indicated by Vice President ROCKEFELLER'S recent report on the CIA, there is a definite need for more powerful legislation to further protect the individual's right to privacy. Despite the fact that most States have enacted laws to protect the individual, the right of privacy is often routinely violated. I am referring to cases in which individuals are victimized by information on mailing lists that Government agen- cies unethically make available. Citizens are forced to provide personal informa- tion about their public and private lives to such organizations as census bureaus, credit associations, police files, and others. Even information from personal income tax reports is often not kept con- fidential. Personal records are almost as readily available as the daily newspaper?and all too often, the individual is unaware that the information contained in his records is being clandestinely used. The continuance of invasion of per- sonal privacy is not only degrading and embarrassing but is an outright con- tradiction to the spirit of the fourth amendment. In a nation where individ- uality is so greatly treasured, tolerance of such invasion is unpardonable. From my participation in the Repub- lican task force on privacy, I became acutely aware of the many abuses made on the individual with regard to loss of privacy. During our concentrated efforts to protect the rights of juvenile offenders, we unearthed countless cases where, due to readily accessible court and police rec- ords, these individuals have been branded "criminal" for life, and thus have been denied equal opportunities with other citizens of the country. There is an ob- vious need to eliminate such stigmatizing effects and to allow the individual to be- come a member of society with a clear slate. I am especially hopeful that violations of the right to privacy will soon become a relic of the past. The right to privacy is a freedom that should be guaranteed ,and cherished by all. Mr. KEMP. Mr. Speaker, I wish, first, to commend my colleague, the gentleman from Ohio (Mr. MOSHER) , for providing Members an opportunity this afternoon to address the problems associated with assuring the individual's right to privacy. The gentleman has been in the forefront of efforts to safeguard privacy?efforts which have been, and are continuing to be, transformed into legislation and en- acted into law. Together with other Mem- bers, such as the gentleman from Cali- fornia (Mr. GOLDWATER) , he has helped to increase substantially the conscious- ness of Members and the public on the nature of the threat to personal privacy. This has been one of the principal is- sues in which I have been involved also. I think the protection of personal privacy is fundamental to the rights of free men and women?the specific rights enumer- ated in our Constitution and the prem- ises which underlie them. It is a pro- tection against the unwarranted intru- sion of someone else into the life of the individual, and if one examines the mul- titude of actual and alleged violations of this right to privacy in recent years one can see quite clearly that "someone else" Is most often an instrument of govern- ment. The intrusions upon privacy and the growth of government have been coexist- ent. Nothing is more to blame for the rise in government interference and inter- vention in our private lives and security than the notion that government can solve arll our problems and must be given, therefore, the unrestricted range of au- thority to do so. Only when we come to full grips with those notions will we ever secure our- selves and our posterity against infringe- ments on the right of privacy. Jefferson observed that: It is the natural course of events that liberty recedes and government grows. While accurate, Jefferson's observa- tion stated only one specific aspect of a larger and more complex equation. To wit: As external, collective human con- trol over, and interference with, a per- son's life intensifies, individual liberty shrinks proportionally. In this larger senseVhe real threat to Individual liberty is the collective will of any institution or group of people which has the power?economic, political, or whatever?to coerce, intimidate, control, deny, or even give. The recognition that It is the natural course of events for lib- erty to recede as government grows is, then, only one manifestation of threats to liberty, albeit the most evident threat in both Jefferson's and our times. The lessons of history teach us that this growth of collective power can come from institutions other than govern- ment. The problem is not singularly the "bigness" of these institutions, in rela- tion to the individual and the exercise of free choice, but such "bigness" does ac- centuate the problem. It tends to reduce the range of alternative choices of con- duct available to the individual. In the 20th century, particularly in our Nation, it has been the growth of?the "bigness" of?government which has posed the single greatest threat to hu- man liberty. This growth in government is occasioned by the erroneous notions that only government can solve the ma- jor social, economic, and societal prob- lems of our era, and that government schemes and regulations are preferable to the laws of supply and demand and the exercise of free choice by individuals. Woodrow Wilson, a doctor of philoso- phy in history and a recognized scholar on the processes of maintaining indi- vidual rights before coming to the Presi- dency, warned that? Liberty has never come from government. . . . The history of liberty is the history of limitations of government power, not the Increase of it. In contradistinction to the classical liberalism embodied in these profound observations of Jefferson and Wilson, de- spite the clear warnings from history as prior human experience, and even de- spite the all-too-apparent results a the rapid growth of, government in our mod- em age, we seem, as a people, to have learned little. For, that government has grown disproportionately to the whole of society is factually indisputable, and that such growth has occasioned an ever- growing threat to individual liberty is, in my opinion, equally indisputable. In both absolute and percentage terms, government's growth has been virtually without restraint during the past nearly half century. It has exceeded all bounds of necessity and perspective. What are the facts? Between 1940 and 1976? The Federal Government's gross an- nual revenue rose by 42 times?from $7 billion to $297.5 billion; Total Federal expenditures rose by 35 times?from $10.1 billion to $349.4 bil- lion?and will probably go even much higher in 1976; The Federal debt outstanding rose by 14 times?from $42 billion to $605-plus billion; Federal expenditures per person rose by over 15 times; The Congress enacted nearly 15,000 public laws; Federal employment zoomed to over 2.8 million people; Federal forms, to be painstakingly filled out by individuals and corporations, grew and grew in number and com- plexity; Federal investigatory surveillance, and monitoring staffs grew to enforce each and every measure; The number of Federal initiatives, most of which are reinforced through interventionist regulatory powers and policies, mushroomed; and The Federal agencies which execute these powers and policies?and, fre- quently, call for more?grew accordingly. It is almost impossible to itemize the areas of conduct now subject to Federal Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 II 5554 Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9 CONGRESSIONAL RECORD ? HOL SE June 16 , 1975 control because there are so many, but a cursory examination of any Govern- ment organization chart shows us the areas of out lives now subject to Govern- ment regulation: health, education, wel- fare, labor, commerce, housing, trans- portation, finance, agriculture, environ- ment, communications, wages and prices, energy, labor-management relations, trade, alcohol, tobacco, firearms, savings, community relations, civil affairs, land and natural resource uses, recreation, commodities, securities, insurance, mar- keting, consumer affairs, productivity, nutrition, research, forestry, product standards, travel, economic development, shipping, vocational and career oppor- tunities, employment standards, occupa- tional safety, child development, retire- ment and income security, rehabilitation, interest rates, credit availability, land sales, aviation, railroads, highways, safety, institutionalized voluntarism, arts and humanities, equal employment op- portunity, export-import terms, truck- ing, small business, veterans, postal serv- ice. ad infinitum. The unfortunate, yet perhaps inescap- able, Impact of the exercise of this vast amount of Government authority was in- fringement upon privacy. The manifestations were myriad: data banks, wiretapping, electronic surveil- lance, eavesdropping, credit histories, medical histories, income tax informa- tion, information systems, regulatory report filings, disclosure statements, data exchanges. Separately?and, most assuredly, when taken collectively?these devices and procedures add up to a growing in- fringement on the right to be let alone, the right to privacy. We simply must come to better under- stand the relationship between the ex- tent of government and the threats to privacy. Government can carry out its almost unlimited functions only through Information gathering, analysis, dissem- ination, and exchange. Thus, we should reduce the range of those functions. We can, and we should, do those things which we think are necessary to protect the right of privacy, and such measures as the Privacy Act of 1974 are definitely steps in the right direction. I think most Members are aware of my efforts in that regard?the sponsorship of legislation which was incorporated Into that act, the Goldwater-Kemp pri- vacy amendments to the Federal Energy Act of 1974, the support for additional protection of student records, the intro- duction of the first comprehensive medi- cal privacy proposal. But throughout that work I was, and I remain, constantly aware of the more fundamental causes of the intrusions we are trying to guard against?the growth in Government in- tervention in our private lives. We can address the causes of invasion of privacy with substantial effectiveness only when we address the size and ex- tent of government and set about to re- duce and limit it.. This, I think, we must very soon do, or our entire way of life will be substanti- ally altered?and it will not be for the good. GENERAL LEAVE Mr. K ASTENMEIER. Mr. Speaker, I ask unanimous consent that all Members may have 5 legislative days in which to revise and extend their remarks on the subject of the special order today of the gentleman from Ohio (Mr. MOSHER) . The SPEAKER. Is there objection to the request of the gentleman from Wis- consin? There was no objection. The SPEAKER pro tempore. (Mr. McFsLn) Under a previous order of the House, the gentleman from Pennsyl- vania (Mr. COUGHLIN), is recognized for 60 minutes. [Mr. COUGHLIN addressed the House. His remarks will appear hereafter in the Extensions of Remarks.] ANNIVERSARY OF THE LENINGRAD TRIAL The SPEAKER pro tempore. Under a previous order of the House, the gentle- man from Pennsylvania (Mr. EILBERG) , is recognized for 30 minutes. Mr. EILBERG. Mr. Speaker, on this date 5 years ago the Russian Govern- ment shocked, and outraged the world by sentencing 11 persons, 9 Jews and 2 Christians, to death or lengthy prison terms for simply trying to act as free men are supposed to be allowed to act. The sentences, which were imposed to deter other persons from their "dissi- dent" activities were partially reduced after protests poured in from around the world. Despite the harshness of the sentences and other continued and brutal harass- ment by the Soviet Government the Jews of Russia are still trying to emigrate to freedom. Last month I visited Russia with some other Members of Congress and we were able to meet with some of these men and women in Moscow and Leningrad. In Kiev the people whom we were supposed to see were ordered out of the city for the duration of our visit, but we were able to meet with the wife of one of the men who had applied for an exit visa. In Moscow we spoke with: Vitaly Rubin, Leonid Raines, Irma Chernyak, Sophia Belotserkovskaya, Alexander Lerner, Ida Nudel, Vladimir Slepak, Anatoly Scharansky, and Joseph and Dina Belli n. Our Leningrad meetings were with; Leopold Ekchilevsky, Boris Krumgalz, Mark Frevdin, Vladimir Sverdlin, Alex- andr and Oksana Chertin, George Saki- riusky, Fla and Elleonora Ginsburg, Jeaniette "Janne Kartseva, Felix Aronovich and Ilya Shostakovsky. As I stated previously, the people with whom we were supposed to meet in Kiev were ordered out of the city. Their names are: Ilya Zlobinsky, Vadim Sheinis, Aleksandr Mizrukhin, Vladimir Kislik, and Kim Fridman. We were, however, able to meet and talk to Mizrukhin's wife, Mils,. Every one of these people, without hes- itation, said they wanted their cause and themselves individually to get as much publicity and support as possible. They all asked us to mention their names to the Russian officials with whom we would be meeting later. They absolutely contradicted the peo- ple in this country who claim we are hurting them or the cause of Soviet Jewry by publicly supporting them or Putting pressure on the Soviet Govern- ment in their behalf. At this time Mr. Speaker, I would like place on the RECORD a statement of support for the persons sentenced 5 years ago today at the Leningrad trials and the more than 40 Soviet Jews who have been imprisoned for trying to reach freedom. STATEMENT OF SUPPORT FOR PERSONS SENTENCED Five years ago today, justice was a victim ::f the Soviet legal system. On this date in 1970, the Soviet govern- ment shocked the world with the arrest of eleven persons. All received harsh prison terms, some as long as 15 years. One was sen- tenced to death, but in response to cries of outrage from the free world, the sentence was commuted to 15 years. Nine Jews and two Christians. They were ',he "criminals" of the First Leningrad TriaL For keeping typewriters in their homes, they were criminals. For owning books with the word "Jew" In them, they were criminals. And for pos- sessing letters from relatives in Israel, they were criminals. What followed their arrest was part of a :ystematic plan to subdue the remarkable Jewish national movement that emerged in the USSR. It was a plan whose goal was to 61lence and intimidate Jews seeking to emi- grate to Israel. The defendants were charged with such crimes as "betrayal of the father- land;" "responsibility-for the preparation of a crime and for attempted crimes;" "misap- propriation of State or public property;" "anti-Soviet agitation or propaganda;" and "participation in an anti-Soviet organiza- tion." Sadly, the Leningrad Trial was only the ,ieginning. Since then the Soviet Union has used its legal system to harass Soviet Jews whose only crime is the desire to emigrate to their ancient homeland, Israel?a right ,tuaranteed by Soviet law and international Within recent months Mark Nashpits and Boris Tsitlionik were arrested and sentenced -.o five years in exile for demonstrating on -iehalf of Soviet Jewish prisoners of consci- including those convicted in the Len. Ingrad Trials of 1970. Mikhail Leviev, a Soviet Jew who sought an exit visa, was tried and sentenced to death 'or "economic crimes"; and Dr. Mikhail -thtern, a highly respected Vinnitsa physi- 4an. has been sentenced to eight years hard Abor on trumped-up charges of accepting -ribes from his patients. In these and other cases the defendants sere refused counsel of their choice. Testi- nony on their behalf was suppressed and Jocuments fraudulently altered in order to onvict them. The arrests that took place on June 15th, _970 are a reminder of the extremes to which -3oviet-authorities will go in seeking to pre- -lent Soviet Jews from emigrating to Israel. But those arrests were not accepted in silence by men and women of conscience .1noughout the free world. Just today, for '3-stance, more than 500 lawyers from -.Oroughout Greater Philadelphia have joined o publish a newspaper advertisement voic- ' ng their outrage at this mockery of justice. Approved For Release 2001/08/30 : CIA-RDP77M00144R000800110060-9