NOTICE OF JOINT LEGISLATIVE HEARINGS ON PRIVACY AND GOVERNMENT INFORMATION SYSTEMS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP76M00527R000700140093-6
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
20
Document Creation Date:
December 19, 2016
Document Release Date:
November 21, 2001
Sequence Number:
93
Case Number:
Publication Date:
June 11, 1974
Content Type:
OPEN
File:
Attachment | Size |
---|---|
CIA-RDP76M00527R000700140093-6.pdf | 3.86 MB |
Body:
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140( 3 t%
S 10252
CONGRESSIONAL RECORD -SENATE June 11, 1974
the applicable base period (as those terms
are defined in subsection (0)). If he deter-
mines that the price index had changed by a
percentage (of its level in the base period)
equal to 3 per centum or more, the amount of
the educational assistance or subsistence al-
allowance payable to eligible veterans or eli-
gible persons pursuing a program of educa-
tion or training, other than a program by cor-
respondence or a program of flight training,
in an educational institution under chapter
31, 34, or 35 of this titlV shall be changed
by the same percentage (adjusted to the
nearest one-tenth of 1 per centum), effective
with respect to such allowances for months
after the quarter in which the determina-
tion is made.
"(b) In the case of any individual who first
becomes entitled to an educational assistance
or subsistence allowance in or after the
month in which a change becomes effective
under subsection (a), the amount of such
allowances payable to or with respect to him
on the basis of such entitlement shall be de-
termined by applying such change (or, if
more than One change has become effective
under subsection (a), by applying all such
case may be, without regard to this secti .
"(c) Any change under subsection )
shall apply with respect to all educat al
pa ble
assistance or subsistence allowances i
under chapters 31, 34, and 35 of this'itle
during the period in which. such cha a is
effective regardless of the provisions Jinder
which such allowances are payable r the
manner in which the amounts pay le are
determined, but shall be applied th re-
spect to the allowances payable to" r" with
respect to any particular individ al only
after all of the other applicable pr isions of
this title which relate to eligibe for and
the amount of such allowances, a all prior
changes made in such allowancender this
"(d) If the amount of the c e in any
educational assistance or substenng ts allow-
ance under subsection (a) is t a multiple
of $0.10 it shall be raised to a next higher
multiple of $0.10 In the case a multiple of
$0.05 or adjusted to the ne est multiple of
"(e) For purposes of tsection-
-,(I) the term 'price dex' means the
Consumer Price Index 11 items, United
States city average) pu shed monthly by
the Bureau of Labor . tistica; and the
average level of the pri index for the three
months in any calen r quarter shall be
deemed to be the level;i- . f the price index in
"(2) the term 'bas period' means-
"(A) the calenda quarter commencing
July 1, 1974, with r set to the first change
under subsection (a ', and
"(B) the ealendKr quarter immediately
preceding the qu er in which the deter-
mination constit ng the basis of the most
recent change der subsection (a) was
made, with respe to any change under sub-
section (a) afte the first such change."
(b) The tabi_ of sections at the beginning
of chapter 36 title 38, United States Code,
is amended by, ? ding at the end thereof the
an s."
(c) The erdment made by subsection
(a) of this ction shall apply only with re-
spect to 'angel in educational assistance
and subsi nee allowances under chapters
31, 34, an 35 of title 38, United States Code,
for mon s in and after the second calen-
dar qu r beginning after the date of the
enactm t of this section on the basis of
Bete ations made (under section 1796 of
such le, as added by subsection (a) of
this section) In and after the first calendar
quarter beginning after the date of the
enactment of this section.
NATIONAL CO SSION ON SUP-
PLIES AND ORTAGES ACT OF
1974-AME NTS
AMENDM 9 NOS. 1441 AND 1442
(Ordered, be printed, and to lie on
Mr. YMPHREY submitted two
amendn ts, intended. to be proposed
by himo the bill (S. 3523) to establish
a Te orary National Commission on
Supptes and Shortages.
AMENDMENTS
AMENDMENT NO. 1348
Senator from Indiana (Mr. HARTKE), the
Senator from Maine (Mr. HATHAWAY),
the Senator from Iowa (Mr. HUGHES),
the Senator from Wyoming (Mr. Mc-
GEE), the Senator from New Hampshire
(Mr. MCINTYRE), the Senator from Min-
nesota (Mr. MONDALE), and the Senator
from Wisconsin (Mr. NELSON) were
added as cosponsors of Amendment No.
1348 to the bill (S. 2005) to provide ade-
quate reserves of certain agricultural
commodities, and for other. commodities.
AMENDMENT NO. 1428
At the request of Mr. PROXMIRE, the
Senator from Tennessee (Mr. BROCK)
was added as a cosponsor of Amendment
No. 1426 to the bill (H.R. 11221) to pro-
vide full deposit insurance for public
units and to increase deposit insurance
from $20,000 to $50,000.
NOTICE OF JOINT LEGISLATIVE
HEARINGS ON PRIVACY AND GOV-
ERNMENT INFORMATION SYS-
TEMS
Mr. ERVIN. Mr. President, hearings
on bills relating to privacy ? and Govern-
ment information systems will be held
before an ad hoc subcommittee of the
Senate Government Operations Com-
mittee and the Judiciary Subcommittee
on Constitutional Rights On June 18, 19,
and 20. The joint hearings will be held in
room 3302 of the Dirksen Senate Office
Building at 10 a.m.
The legislation before the Govern-
ment Operations Committee is S. 3418,
which I have cosponsored with Senators
PERCY and MUSKIE, to establish an ad-
ministrative structure to oversee rules
for the gathering and disclosure of in-
formation concerning individuals, and to
provide management systems in Federal
agencies, State and local governments
and other organizations concerning such
information, and for other purposes.
Bills pending before the Constitutional
Rights Subcommittee of which I am also
chairman, are: S. 2810, introduced by
Senator GOLDWATER, to protect the con-
stitutional right of privacy of individuals
concerning whom identifying numbers
or identifiable information is recorded by
enacting principles of information prac-
tice in furtherance of amendments I, III,
IV, V, IX, X, and XIV of the U.S. Con-
stitution;
S. 2542, introduced by Senator BAYH
to protect the constitutional right of pri-
vacy of those individuals concerning
whom certain records are maintained;
and
S. 3116, introduced by Senator HAT-
FIELD, to protect the individual's right to
privacy by prohibiting the sale or dis-
tribution of certain information.
With these legislative hearings, the
Government Operations Committee will
continue its oversight of the develop-
ment and uses of automatic data pro-
cessing in the Federal Government. The
intergovernmental nature of nationwide
systems involving electronic and manual
transmission, sharing and distribution of
data about citizens has significant im-
plications for our federal system. In its
attempt to respond to citizens' demands
for quality and quantity in services, gov-
ernment and the private sector have
turned to the large data banks, compu-
terized information systems and man-
agement techniques which will help
them get the job done. Where these
practices and systems neglect the ad-
ministrative and technical concern for
privacy, due process, and surveillance
over the individual, they are taking a toll,
which is yet unmeasured, on constitu-
tional principles of accountability, re-
sponsibility and limited government. The
cost to the taxpayer in dollars and cents
concerns every American, for in the in-
terest of promoting efficient government,
the taxpayer may also be paying for loss
of his privacy. That may be the price of
insufficient monitoring by the public and
Congress of the haphazard, ad hoc,
ways modern government has found to
meet its information needs, and which
public officials use to meet. their political
needs.
Two Subcommittees of the Govern-
ment Operations Committee are pre-
sently conducting oversight into major
aspects of this problem. For instance, the
'Permanent Subcommittee on Investiga-
tions, chaired by Senator JACKSON, is pre-
sently conducting an inquiry into sur-
veillance practices in and out of govern-
ment, including government wiretapping,
eavesdropping, recording, industrial es-
pionage and bugging of labor negotia-
tions, and other monitoring practices.
The Intergovernment Relations Sub-
committee chaired by Senator MusKIE,
who is also a sponsor of the pending bill,
is considering legislation concerning
electronic surveillance and the need to
reorganize departments and agencies en-
gaging in such practices. That subcom-
mittee is also studying a major aspect
of Federal administration which affects
individual privacy; this is~ the classifica-
tion of Federal records and the laws and
rules governing access, release and with-
holding of information which govern-
ment collects about people.
The sponsors have introduced S. 3418
for purposes of discussion on the issues
of what standards Congress should set
for the protection of privacy in the devel-
opment and management of Federal in-
formation systems, especially those
which have been computerized with
capacity for the sharing of records
among departments and governments
and across State boundaries. I expect
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
J2.cr?4e 11, 1974
CONGRESSIONAL RECORD - SENATE
Mr. JAvrrs. I point out that i list of
States not covered includes such rsely
populated States as Montana and Lo na,
so forth. I thank the Senator from Utah for
making that clear. There is no exclusivity
about this.
Mr. LONG. Mr. President, I ask unanimous
consent to have printed In the RECORD a list
of the States that would benefit under what
we we;^e able to work out with the House.
There being no objection, the list was or-
dered to be printed in the RECORD, as follows:
Estimated Estimated maxi-
maximum mum total
number of additional costs
beneficiaries (thousands)
Alaska________________ 1,100-1,500 $600-$800
Maine __------------- - 7,000-8,000 3,000-3,500
Massachusetts--------_- 49,300 30, 000
Michigan- _.---- _----- - 71,400-97,300 40,700-55,400
Nevada____ ____________ 6, 700 3,600
New Jersey . :__________ 80,000-120,000 48, 000-72, 000
Puerto Rico ------ 33, 000-42, 000 9, 000-11:000
Rhode Island ---------- - 8, 000-9, 000 5,000
Vermont-_ ---- _-____ 3,600 2,000-3,000
Washington. _______-___ 42, 000 17,000.
Total -------------- 300.000-380,000 160, 900-202,100
Federal share__- _____________________ 80,000-I01,000
The PRESIDING OFFICER. The question is on
agreeing to the conference report.
The conference report was agreed to.
Mr. l.c:NG. Mr. President, I move to recon-
sider the vote by which the conference report
was agreed to.
Mr. IBENNETT. I move to lay that motion on
the table.
The motion to lay on the table was agreed
to.
Mr. JAVITS. Mr. President, that com-
mitment was given to myself and the
Senator from California (Mr. TuNNEY) In.
October of 1972. Since that time, it has
become clear that remedial action must
be taken In order to permit the Federal-
State extended unemployment compen-
sation program to function as Congress
intended. That need is highlighted by the
string of temporary amendments to
which Congress agreed In an attempt to
remedy the defects in the trigger mecha-
nism on a temporary basis In June 1973,
December 1973, and March 1974.
These amendments will again lapse on
July 1 of this year unless further action
Is taken. It Is time that we sought a per-
manent solution to the Inadequacy of
those trigger requirements so that we can
offer some measure of assurance to those
workers who are unemployed that there
will be an adequate program of benefits
available to them.
The amendment that I am privileged
to cosponsor would provide for the ex-
tended benefits program to trigger on In
any State in which the insured unem-
ployment rate equaled or exceeded 4 per-
cent for any 13-week period. The off
trigger would be activated when the in-
sured unemployment rate in that State
dropped below 4 percent for any 13-week
period. The thrust of this amendment is
to eliminate the requirement that the in-
sured unemployment rate exceed the rate
for the corresponding period of the pre-
vious 2 years by at least 20 percent. If
any State is experiencing a severe unem-
ployment problem, it is of little relevance,
particularly to the individual unem-
ployed worker seeking a job, whether
that State has experienced such similar
periods of high unemployment previ-
Under this amendment the following
2 4! tates are currently eligible to pay
ex t ed unemployment benefits :
AIa , California, Connecticut, Dela-
ware, all, Idaho, Maine, Massachu-
setts gan, Minnesota, Montana, , MI Nevada. Jersey, New Mexico, New
York, Nort akota, Oregon, Pennsyl-
vania, Puerto co, Rhode Island, Utah,
Vermont, Was gton, and West Vir-
ginia.
Only two States, ichigan and Dela-
ware, would be eiigi to continue pay-
ing those benefits of July 1 if this
amendment is not agr to. The con-
tir. uation of this amendm t would pro-
vice for the payment of ded bene-
fits for up to 1,400,000 woraker ither cur-
rently receiving, or potential] igible to
receive benefits during ficsal y 1975.
]: hasten to point out to the tors
that this amendment simply perms the
States to trigger into the extended b e-
or :aot they wish to participate in the pro-
gram. In addition, this amendment in-
volves no increased general fund expend-
itures on the part of the Federal Govern-
ment since the extended benefits pro-
gram is financed in equal part from the
various State unemployment accounts,
and from the Federal extended benefits
account, both of which are financed by
an employer payroll tax.
Mr. President, I ask unanimous con-
ser. t that a table showing the number
of ;;iotentiatl beneficiaries of this amend-
ment supplied by the Department of
Labor be inserted Into the RECORD.
The PRESIDING OFFICER. Without
objection, it Is so ordered.
Et:TIMATED EXTENDED BENEFITS. FISCAL YEAR 1975
[Asst mptions- (r) Drop 120 percent Trigger Criteria; (2) Insured
un:mployment rate-3.8 percent; (3) All States affected will
pa:.s conforming legislation]
Number of Total costs
beneficiaries (millions)
Alabama----------------------------- '
Alaska__________________ 2,000 01.1
Arizoia-------------- - -- __
Arkansas---------------- 2,800 1.4
Califc rnia------------ ____ 244,100 136.2
Colorado---------------------- -
Connucticut_-__--c_--_--. 75,000 52.4
Delaware -'
Distri:t of Columbia_______y
Florica---------------- - --- --'
Georgia--- -------------- ---
-------------------------------'
Guam------ --------------------------------
Hawa i------------------ . 3,000 2.1
Idaho_______________-_-~ 3,100 1.0
Illinois -_------
-----------------------------------------=
Indiana------------------ --
Iowa-------------------__---
Kansas- - - --------------------------=
____________
Kentucky---------------- ---?-------------
Louisiana-----------?--`--? =-------------------------
Maine ____________--_-__. 19,200 7.0
Mary Iand------------ ----- =_=------_----------'
Masse chusetts-.________-- 122,500 .79.6
Michigan______________143,200 $5.9
Minnesota_______________ 12,500 4.9
Missi:sippi----------------------------------------- -----_
510251
Number of Total casts
beneficiaries (motions)
Missouii_________________ 15, 000 $5.7
Montana_________________ 2, 500 .7
Nebraska -------------------------------
Nevada------------------ 7,800 4.5
New Hempshire------------------------------?----------
NewJersey______________ 167,400 101.0
New Mexico______________ 2,900 .9
New York________________ 270, 000 164.7
North Carolina------------------------ -----------------
North Cakota_____________ 1, 600 .6
Ohio---------------------------------------------`------
Oklahoma-----------------------------------------------
Oregon------------------ 21,400 10.9
Pennsylvania ------------- 55,600 35.0
Puerto Rica______________ 106, 400 26.8
Rhode Istand_____________ 21,200 12.0
South Carolina-------------------------------------------
South Dakota --------------------------------------------
Tennessee-----------------------------------------------
Texas-- Utah -------------------- 1,500 .5
Vermon;_________________ 4,700 3.0
Virginia -------------------------------------------------
Virgin Islands --------------------- -------------------- ---
Washington -------------- 108,800 60.7
West Virginia_____________ 3, 700 1.4
Wisconsin------------------------------------------------
Wyoming-----------------------------------------------
United States total-------- 1,417,900 800.0
Note: Costs would be shared 50-50 by States and Federal
Government.
FAIR CREDIT BILLING ACT-
AMENDMENT
(Ordered to be printed, and to lie on
he table.)
to d to be proposed by them, jointly,
to t bill (H.R. 11221) to provide full
depo - insurance for public units and to
lucre deposit insurance from $20,000
INCRE OF ALLOWANCES TO
VE S-AMENDMENT
AM MENT NO. 1440
(Ordered to printed, and to lie on
Mr. BELLMO r. President, S. 2784
has recently been eported out of the
Senate Veterans' 'rs Committee and
placed on the Sena calendar. During
consideration of t most important
measure it is my in t to offer an
amendment calling fo an escalator
subsistence and educatio allowances
similar to present provisio of the so-
Mr. President, I ask ous con-
sent that the full text of amend-
ment be printed in the Rncoiw t this
ment Was ordered to be printed in
RECORD, as follows:
AMENDMENT No. 1440
On page 105, line -, insert the following
new section:
Title VI. Sec. 601. Chapter 36 of title 38,
United States Code, Is amended by adding at
the end thereof a new section as follows:
1796. COST-OF-LIVING INCREASE IN EDUCA-
TIONAL ASSISTANCE AND SUBSIST-
ENCE ALLOWANCES.
"(a) As soon as possible after the begin-
ning of each calendar quarter, the Admin-
istrator sifall determine the extent by which
the price Index in the preceding calendar
quarter was different than the price Index
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974 CONGRESSIONAL RECORD -SENATE
hearings to produce expert advice not
only on the standards to be set, but on
the scope of the bill and how far the
law should affect State, local, and private
data banks. The hearings will also help
us determine what kind of Federal struc-
ture should be established to enforce or
advise on standards.
Congress is now considering a number
of legislative proposals directed to spe-
cific problem areas of the law governing
the privacy of the individual such as
criminal justice data banks, military
surveillance of civilian politics, wiretap-
ping and eavesdropping, private credit
data banks, employee privacy, behavior
modification, lie detectors, and com-
puter technology. These are some of the
techniques and governmental programs
which have concerned Congress and the
public.
In contrast to such special legislation,
the proposals considered in the June
hearings represent general legislation to
protect the privacy of all citizens and to
build into the structure and practices of
government a strengthened respect for
the privacy and other freedoms guaran-
teed by the Bill of Rights.
S. 3418 is similar, but not identical, to
omnibus legislation introduced by Rep-
resentatives EDWARD KOCH and BARRY
GOLDWATER, JR., which is being consid-
ered by the House Government Opera-
tions Subcommittee on Foreign Opera-
tions and Government Information
chaired by Representative WILLIAM
MOORHEAD. Their. joint efforts are con-
tributing greatly to the chances for en-
actment of major privacy protections
this year. Individually, many Members
of the House of Representatives have
for a number of years sponsored ' bills
reflecting sections of this proposal re-
lating to mailing lists, a Federal privacy
board, Federal questionnaires, and
changes in the freedom of information
law.
Portions of S. 3418 are similar to the
measures pending before the Constitu-
tional Rights Subcommittee. Another
portion is comparable to my bill S. 1791
of the 91st Congress, which was to limit
the threats to privacy from burdensome,
overly personal questionnaires by which
Government agencies sought statistical
information through coercive collection
techniques.
S. 3418 and the related bills deal with
requirements to reveal one's social secu-
rity number to government and private
organizations, with personal statistical
questionnaires, mailing lists, and reme-
dies for official information programs
which may pass constitutional bound-
aries.
In addition to the thousands of com-
plaints which people have sent to Con-
gress, we now have for guidance on this
subject the investigative hearings, re-
ports, and findings of a number of con-
gressional committees, private organiza-
tions and Government departments. One
of these studies, "Records, Computers
and Rights of Citizens," was ordered by
the former Secretary of Health, Educa-
tion, and Welfare, Elliot Richardson, who
will testify on June 18 on the findings
of his study and the need for congres-
sional and administrative action.
Another influential and comprehensive
report entitled "Privacy and ? Freedom"
by the Association of the Bar of the City
of New York was directed by Prof. Alan
F. Westin of Columbia University. Re-
cently, Dr. Westin conducted another
study with Michael F. Baker for the.
National Academy of Sciences entitled
"Databanks in a Free Society." I am
pleased to announce that in addition to
presenting testimony on the pending leg-
islation, Dr. Westin has agreed to serve
as a consultant to our hearings and to
give us the benefits of his considerable
research and analysis in this area of the
law.
With the establishment of the new
Domestic Council Committee on Right to
Privacy chaired by the Vice President,
Congress now has additional resources
and assistance in its efforts to protect
privacy, and we look "forward to their
cooperation in our studies.
Vice President FORD has accepted an
invitation to present a statement on
June 19 which will be delivered by the
committee's Executive Director, Mr.
Philip Buchan.
Other witnesses with special knowl-
edge in this area of the law and admin-
istration will include Members of Con-
gress - who have sponsored privacy leg-
islation, representatives of the National
Governors Conference, the National Leg-
islative Conference, the. National As-
sociation for State Information Systems,
Government Management Information
Sciences, the National League of Cities,
the U.S. Conference of Mayors, the
American Civil Liberties Union, Liberty
Lobby, public administration specialists,
and other interested organizations and
individuals.
The Subcommittee on Constitutional
Rights conducted excellent hearings in
March of this year on criminal justice
data bank legislation, in 1971 on "Fed-
eral Data Banks, Computers and the
Bill of Rights," and in 1969 on "Privacy,
the Census and Federal Questionnaires."
These hearings elicited for Congress a
wealth of information about public com-
plaints and attitudes concerning the
establishment and the management of
Federal programs to investigate citizens
in order to store, distribute, and ex-
change information about them. We
found that some of these programs were
none of the business of the Government
and infringed totally or in part on con-
stitutional freedoms. Other programs
were meant to obtain the great amount
of information which Congress must
have to legislate wisely and which the
executive branch must have in order
to 'administer the laws properly. In
some instances, however, it was charged
that lawful programs went beyond their
purpose in scope, and in some cases, that
the lack of adequate control permitted
unauthorized access to this Government
information, or allowed its transfer and
distribution to unauthorized persons and
those who had no need for it in the per-
formance of their duties.
It is a rare person who has escaped
the quest of modern government for
information. Complaints which have
come to the Constitutional Rights Sub-
committee and to Congress. over the
S 10253
course of several administrations show
that this is a bipartisan issue which ef-
fects people in all walks of life. The com-
plaints have shown that despite our rev-
erence for the constitutional principles
of limited Government and freedom of
the individual, Government is in dan-
ger of tilting the scales against those
concepts by means of its information-
gathering tactics and its technical ca-
pacity to store and distribute informa-
tion. When this quite natural tendency
of Government to acquire and keep and
share information about citizens is en-
hanced by computer technology and
when it is subjected to the unrestrained
motives of countless political adminis-
trators, the resulting threat to individ-
ual privacy make it necessary for Con-
gress to reaffirm the principle of limited
Government on behalf of freedom.
The complaints show that many Amer-
icans are more concerned than ever be-
fore about what might be in their records
because Government has abused, and
may abuse, its power to investigate and
store information.
They are concerned about the transfer
of information from data bank to data
bank and black list to black list because
they have seen instances of it.
They are concerned about intrusive
statistical questionnaires backed by the
sanctions of criminal law or the threat
of it because they have been subject to
these practices over a number of years.
The pending legislation represents a
partial solution to these concerns. There
are alternatives to some of the provisions.
For instance, enforcement of the act
and the advisory functions which are
located in an independent privacy board
might be relocated or distributed to the
General Accounting Office and the courts.
Furthermore, after receiving testimony
the committee may want to alter the
scope of the legislation.
I want to commend Senator PERCY for
his interest in this subject and his
initiative in working with House spon-
sors to bring the legislation before the
Government Operations Committee in
connection with its oversight of the use
of governmental data banks and com-
puter technology, and its monitoring of
surveillance practices throughout gov-
ernment which may threaten freedom.
I hope the joint efforts of the Senate
Government Operations Committee and
the Constitutional Rights Subcommittee,
whose members and staff have great
expertise in this area of the law, will
result in enactment of the basic legisla-
tive guarantees which are 'needed if
America is to face up to the computer
age.
It should be noted that these pending
bills follow patterns and raise- Issues
similar to those in criminal justice legis-
lation, S. 2963 and S. 2964, which I have
cosponsored with the following Senators
who include members of the Judiciary
and Government Operations Commit-
tees: Senators HRUSKA, MATHIAS, KEN-
NEDY, BAYH, TUNNEY, YOUNG, BROOKE,
MANSFIELD, ROBERT BYRD, BURDICK, ROTH,
HUGH SCOTT, THURMOND, FONG, and
GURNEY.
We welcome suggestions and com-
ments from Members of Congress and
Approved For Release 2006/10/20: CIA- RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10254
CONGRESSIONAL RECORD - SENATE June 11, 1974
others with an interest in and knowl-
edge about these matters. Those wishing
to submit statements for the record
should communicate with the Govern-
ment Operations Committee,. room 3306
of the Dirksen Office Building, Washing-
ton. D. C. 20510, telephone 225-7469.
I?.~i an article entitled "The First
Amendment-A Living Thought in the
Computer Age," from volume 4 of the
Columbia Human Rights Review, 1972,
I have described some of the many com-
plaints which people have registered to
the Constitutional Rights Subcommittee
and to Members of Congress about atti-
tudes and program of government which
threaten the privacy guaranteed under
the first amendment. At the conclusion
of the article, there is suggested a seven-
part legislative program to remedy these
complaints, part of which is reflected in
the pending legislation. Additional ex-
afnmles of questionable data banks have
been revealed, many of them documented
in the forthcoming report of the sub-
committee's comprehensive survey of the
laws and rules affecting individual pri-
vacy in. Federal data banks and com-
puterized information systems. These
new revelations to Congress merely
serve to reaffirm my conviction that early
congressional action is needed to imple-
ment the Constitution.
I ask unanimous consent that the ar-
ticles be printed at this point in the
RECORD.
There being no objection, the articles
were ordered to be printed in the RECORD,
as follows:
From the Columbia Human Rights Review,
Volume 4, No. 1 (1972) ]
TI -TT, FIRST AMENDMENT: A LMNG THOUGHT
IN THE COMPUTER AGEI
(By Sass J. EsvIN, Jr.')
Sherwood Anderson wrote words about
America as true today as they were in the
thh,d decade of this century:
":America ain't cemented and plastered yet.
'I'acy're still building 1t.... All America asks
is to look at it andlisten to it and under-
stand it if you can. Only the understanding
aint important either; the important thing
is to believe in it even if you don't under-
stand it. and then try to tell it, put it down,
Because tomorrow America is going to be
scmething different, something more and
new to watch and listen to and try to under-
stand; and, even if you can't understand,
believe.,,
Anyone seeking to understand contem-
porary America must deal with our national
experience with computer technology. They
must understand that it has become an es-
sential tool in the "cementing and plaster-
ing' of our nation. They must understand
that it has at once presented our country its
greatest hope and its greatest challenge;
keeping faith with our historical heritage
ant. commitment to freedom, while enjoying
the fruits of a rich industrialized society
urnler a democratic constitution.
Throughout our nation the people involved
with computer technology have charge of a
great national resource which will affect the
course of our economic and social progress.
wore important, insofar as it affects the exer-
cise of governmental power andthe power of
large special interest groups, the new tech-
nology may help determine the course of
freedom and human rights in our land.
In the process, I believe Americans could
find wisdom in Sherwood Anderson's advice
"to believe" in America. I say this because,
as we grasp for the new computer technology
and seek theories of systems analysis for our
social problems, Americans may tend to for-
get to look to the -z own history. Some, in
their haste to solve today's problems, may
fear to translate America's promise of free-
dom into the program language of the ccin-
puter age.
Those whose are initiated Into the te?h-
nological mysteries of computer hardware
and software may take great pride. Through
their deeds and genius they have helped
people go to the moon, produce music, create
art, conduct off-track betting, run railroads,
and administer welfare systems. They help
maintain our national defense and they keep
our economy running. They aid in catching
criminals and they establish instant credit.
They locate marriage-mates for people and
they prejudge elections almost- before the
votes are cast.
A tape storage system has been described
which -will make it possible to store a dossier
on every living person in the United States
and to retrieve any one of them in a maxi-
mum of 28 seconds.. With such feats to their
credit, these people know better than any
body that in the application of their knowl-
edge, they plan a major role in the economic
and social well-being of our society. They are
responsible for bringing to our nation all the
wondrous blessing of computer technology,
especially scientific methods of processing
information.
They can bend these machines to their will
and make them perform feats undreamed of
ten or even five years ago.
They have a special understanding of the
new information flow charts for the vast data
systems in our government.
They hold the access code to control ever
the technology as it affects the individua` in
our society.
They may hold the key to the final achieve-
ment of the rule of law which is the promise
of our constitution-
With this body of knowledge, theref ire,
they bear special responsibility for the
preservation of liberty in our country. That
they have accepted this responsibility is clear
from the Privacy themes of many recent con-
ferences of computer professionals, equip-
ment manufacturers, and computer user:, in
the governmental and private sectors.
Their power Is not limited to their teelni-
cal expertise, but is augmented by the steer
numbers in the computer-related pro?es-
sions.
Advertisements on TV. radio, In news-
papers, and even on buses daily remind the
public of the inducements and rewards of
a career in computer and data process-tng
fields.
In the Federal Government, their
numbers are growing. An inventory of auto-
matic data processing equipment shows that
in 1952 there were probably two computers
in government. In 1971, there were 5,961
In 1960, there were 48,700 man-years used
In federal automated data processing func-
tions. This includes systems analysis and de-
sign, programming. equipment selection and
operation, key punching, equipment main-
tenauoe and administrative support. In l'170,
there were about 136,504 man-years useu in
direct ADP work.
A recent illuminating report by the Na-
tional Association. for State Information 1'iys-
tem: shows that in 35 states in 1971, over
twenty-four and a half thousand people were
engaged in. ADP. Twenty -eight states to-
gether spent 181 million dollars of their
budgets on such personnel:!
To glance through their professional jour-
nals, newspapers and bulletins each month
Is to be constantly amazed at the breadth
and reach of the theories and aceompi.sh-
menrs4 It also deepens a layman's wonder
at the complex language which sometimes
defies translation Into ordinary English.
For all of these reasons, the general pub-
lic stands in superstitious awe of the skills
and knowledge, the machines and instru-
ments, and the products derived and trans-
mitted by them. For the uninitiated, the
computer print-out bears a mystique and an
aura of scientific rationality which makes it
appear infallible. This is true for most law-
yers and probably for most people In politi-
cal life.
There is a theory abroad today in aca-
demic circles that America is divided Into
two worlds. One of them is the world of
science and technology ,5 inhabited by peo-
ple who are part of a technological and elec-
tronic revolution. In the other world are said
to live all the rest of the people whose ideas
and values are based on an earlier age.
In accordance with their theory, some have
tried to stamp the scientist with motives and
values different from those of other Ameri-
cans; with goals oriented only toward effici-
ency or shorn of compassion, or, alternative-
1y, with exclusive ability to determine social
priorities. I cannot agree with this analysis,
for I believe there is a yearning In every hu-
man heart for liberty, and for the freedom to
express oneself according to the dictates of
conscience. Despite a man's commitment to
a chosen profession, he wants the freedom to
fulfill himself as an individual and to use his
Clod-given faculties free from the coercion of
government.
So I do not believe Americans dwell in two
worlds. Regardless of our origins, I believe
we share a common heritage and a common
destiny in that we are all engaged in seach-
ing for freedom. We share, according to the
mandates of the Constitution, a common
understanding that the best protection for
that freedom rests on the limitations on the
power of government and on the division of
that power.
I cannot agree with such an analysis for
another reason. Since the Senate Constitu-
tional Rights Subcommittee began its study
of computers, data banks and the Bill of
Rights, I have received many letters from
computer specialists, systems designers, engi-
neers, programmers, professors and others
in the scientific community which prove
that despite, and perhaps because of their
professions, they share the same concern
about invasion of privacy as all other Amer-
icans, the same apprehensions about excesses
of governmental surveillance and inquiries.
Above all, they realize, perhaps better than
others, that while the information technology
they deal with can extend the intellect of
man for the betterment of society, it also
extends the power of government a million-
fold.'
It makes it possible for government to ad-
minister more efficiently and to offer vastly
better services to the taxpayers.
At the same time, it extends and unifies
official power to make Inquiries, conduct in-
vestigations, and to take note of the
thoughts, habits and behavior of individuals.
Of course, government has always had such
power, but on a much smaller scale than to-
day. Similarly, men possessing the power of
government have always had the capacity for
bad motives, simple errors or misguided pur-
pose. There have always been problems with
errors in the manual files. Now, computers
may broadcast the image of these errors
throughtout a national information system.
What the electronic revolution has done
is to magnify any adverse affects flowing
from these influences on the life of the in-
dividual and on his proper enjoyment of the
Tights, benefits and privileges due a free
man in a free society.
I reject the notion of division of Ainerf-
aans on the basis of scientific and techno-
logical values. If I had the unhappy and
well-nigh impossible task of distinguishing
two types of Americans, I believe I would dis-
tinguish between those who understand the
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
tune 11, 19'74 . CONGRESSIONAL RECORD -SENATE
terized dossiers. It also illustrates the lack
of sufficient criminal, civil, or administrative
sanctions against unwarranted sharing and
disclosure of such confidential information.
To my knowledge, no punitive action was
taken except for a disciplinary personnel ac-
tion filed against an agent of the Federal Bu-
reau of Investigation, who was then allowed
to retire.
The weakness of any applicable regulations
is demonstrated by the report of the Bureau
of Narcotics and Dangerous Drugs that its
current disclosure order "would not cover the
release of collateral intelligence information,
information contained in dead files, or in-
formation on nondefendants, such as that
disclosed in the Alioto testimony." The Bu-
reau further stated that under the provisions
of its new Agents Manual it is only a "breach
of integrity" to make unauthorized disclosure
of files which are restricted to official use.a5
MISUSE OF MMITARY INTELLIGENCE RECORDS
Another case as illustrates how the Army's
investigative intelligence services and files
were put to private use to obtain the dismis-
sal of an employee of a private business. In
this instance an Army intelligence agent
whose routine duties involved security in-
vestigations and surveillance -for the Army's
civil disturbance prevention program de-
scribed to the Subcommittee how he was
ordered by his superiors to conduct an in-
vestigation of the bank loan records, police
and court records of the private citizen and
was told to give the resulting Information
to the employee's supervisor. He later learned
that the investigation had been ordered by
an intelligence officer as a personal favor for
an official of the company. When the agent
reported this to his superiors, he was told
in a classified letter that the matter involved
"national security" A year later, following
his separation from the service, the agent
reported the incident to the Inspector Gen-
eral of the Assistant Chief of Staff for the
Pentagon, who began an investigation. All of
his allegations were confirmed and firm disci-
plinary actions were taken against the guilty
officers. It was too late, however, for the sub-
ject of the Army investigative report, who
had already been dismissed.
These cases illustrate the concerns over
political administrative and technical prob-
lems of access, confidentiality and purging
of erroneous or outdated records in computer
systems. But these are issues which have
long concerned legislatures, bar associations
and others.
The major reason for public apprehension
about computer technology and information
sciences is the use of them to acquire, proc-
ess, analyze and store information about
activities and matters which are protected
by the First Amendment.
What people writing to Congress fear most
is the uses to which this technology may be
put by men of little understanding but
great zeal. They know that, applied to un-
lawful or unwise programs, computers merely
absorb the follies and foibles of misguided
politically-minded administrators.
In Federal Government, the new technol-
ogy, combined with extended Federal-state
services and their spin-off information sys-
tems; have produced vast numbers of in-
vestigators, analysts, and programmers de-
voted to the study of people and society.
With the zeal of dedicated civil servants,
they are devoted to the building of data
bases on the habits, attitudes and beliefs of
law-abiding citizens. Much of what they
gather is trivial; much of it goes far beyond
the needs of government. Some of it is shared
extensively and often unnecessarily by agen-
cies who are components of these large in-
formation systems.
People seeking government jobs in some
agencies are told to reply to personality tests
asking:
I believe there is a God. _
I believe in the second coming of Christ.
I believe in a life hereafter.
I am very religious (more than most
people).
I go to church almost every week.
I am very strongly attracted by members
of my own sex.
I love my father.
My sex life is satisfactory.
Once in a while I feel hate toward mem-
bers of my family whom I usually love.
I wish I were not bothered by thoughts
about sex.
When the Subcommittee held hearings on
these practices, government officials ex-
plained that there was no right or wrong
answer to the questions, that the responses
were coded and analyzed by the computer .37
I asked whether they did not think such
inquiries violated the privacy of the indi-
vidual's thought about matters that were
none of the business of government. The reply
was that there was no Supreme Court deci-
sion holding that people who apply for fed-
eral employment have a constitutional right
to privacy.
- There was a Civil Service program telling
employees to fill out computer punch cards
stating their racial, ethnic or national origin
along with their social security number .'18
In the land renowned for being the "melting
pot" of the world, over 3 million individuals
had to analyze their backgrounds and reduce
them to one of four squares on an IBM card.
If they protested that these matters were
none of the business of government, they
were blacklisted in their offices and harassed
with computer-produced orders to return the
completed questionnaire. The resemblances
between this. program and those of totali-
tarian. governments in our recent history
were all too obvious.
The Census Bureau makes more use of
computer technology for personal inquiries
than anyone? It conducts surveys for its own
uses backed by the criminal and civil sanc-
tions. One of these, the decennial census,
asked people such questions as:
Marital Status: Now married, divorced,
widowed, separated, never married.
(If a woman) How many babies have you
ever had, not counting stillbirths?
Do you have a flush toilet?
Have you been married more than once?
Did your first marriage end because of
death of wife or husband?
What was your major activity 5 years ago?
What is your rent?
What is your monthly electric bill?
Did you work at any time last week?
Do you have a dishwasher? Built-in or
portable? ,
How did you get to work last week? (Driver,
private auto; passenger, private auto; sub-
way; bus; taxi; walked only; other means).
How many bedrooms do you have?
Do you have a health condition or dis-
ability which limits the amount of work you
can do at a job?
How long have you had this condition or
disability?
Under even heavier sanctions, the Census
Bureau puts questionnaires to farmers, law-
yers, owners of businesses, and others, se-
lected at random, about the way they handle
their business and finances'0
The Census Bureau also makes surveys
for many other departments and agencies.e
For example, they put out statistical ques-
tionnaires which the Department of Health,
Education, and Welfare wanted to send to
retired people asking:
How often they call their parents;
What they spend on presents for grand-
children;
How many newspapers and magazines they
buy a month; ,
If they wear artificial dentures;
"Taking things all together, would you
say you're very happy, pretty happy, or not
too happy these days?"
S 10257
And many other questions about things
on which government has no business de-
manding answers.
These people are not told that their
answers are voluntary, but are harassed to
reply and are given the impression they will
be penalized if they do not answer?-
There are many other examples of in-
quiring social and economic data that are
backed by the psychological, economic, or
penal sanction of government. Clearly, Gov-
ernment has great need for all kinds of in-
formation about people in order to govern
efficiently and administer the laws well;
similarly, Congress must have large amounts
of meaningful information in order to legis-
late wisely.
However, I believe these examples of gov-
ernmental data collection illustrate my con-
tention that the First Amendment wraps
up the principle of free speech, which in-
cludes the right to speak one's thoughts
and opinions as well as the right to be free
of governmental coercion to speak them.
There are other examples of government
programs which, well-meaning in purpose,
are fraught with danger for the very free-
doms which were designed to make the
minds and spirits of all Americans free, and
which work to keep America a free society.
A number of these would be impractical, if
not impossible, without the assistance of
computer technology and scientific data
processing.
It is those First Amendment freedoms
which are the most precious rights con-
ferred upon us by our Constitution: the free-
dom to assemble peaceably with others and
petition government for a redress of griev-
ances; the freedom to worship according to
the dictates of one's own conscience free
of government note-taking; the freedom to
think one's own thoughts regardless of
whether they are pleasing to government or
not; the freedom to speak what one believes
whether his speech is pleasing to the govern-
ment or not; the freedom to associate with
others of like mind to further ideas or poli-
cies which one believes beneficial to our
country, whether such association is pleas-
ing to government or not.
THE SECRET SERVICE
In the pursuit of its programs to protect
high government officials from harm and
federal buildings from damage'" the Secret
Service has been pressured to create a com-
puterized data bank. Their guidelines for in-
clusion of citizens in this data bank re-
quested much, legitimate information but
also called for information on "professional
gate crashers;" "civil disturbances;" "anti-
American or anti-U.S. Government demon-
strations in the United States or overseas;"
pertaining to a threat, plan, or attempt by
an individual or group to "embarrass per-
sons protected by the Secret Service or any
other high U.S. Government official at home
or abroad;" "persons who insist upon per-
sonally contacting high government officials
for the purpose of redress of imaginary
grievances;" and "information on any per-
son who makes oral or written statements
about high government officials in the fol-
lowing categories: (1) threatening state-
ments, (2) irrational statements, and (3)
abusive statements."
Americans have always been proud of their
First Amendment freedoms which enable
them to speak their minds about the short-
comings of their elected officials. As one in
political life, I have myself received letters
I considered abusive. Similarly, I have ut-
tered words which others have deemed
abusive. While I am not a "professional gate
Crasher," I am a malcontent on many issues.
I have written the President and other high
government officials complaining of griev-
ances which some may consider imaginary;
and on occasion, I may also have "embar-
rassed" high government officials.
One man wrote me his concern about this
program and commented:
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10258
CONGRESSIONAL RECORD - SENATE June 11, 1974
"^T`he Secret Service ought to go after my
moi.her-in-law, too. On her last visit she said
tha. the Vice President doesn't seem to
havi too many brains. She also said that
Seliator - has a face like a carbuncle.
SY.o?ild I report this to the Secret Service? "
Tere is no doubt that the physical pro-
te--tion of the President and high govern-
ment officials is a legitimate government
purpose and all reasonable means must be
taken in pursuit of It. Nevertheless, such
broad and vaguely worded standards for in-
ves=.igating and adversely reporting Ameri-
can:3 to their government on the basis of
their utterances could, at one time or an-
othcr, include most members of Congress
and most politically aware citizens. It could
cover heated words exchanged in political
debate and discussion anywhere in the
country. Yet civil and military officials
throughout the Federal government and in
some local law enforcement agencies were
requested to report people coming to their
attention who were thought to fit these
criteria.
"1'he Subcommittee has not received com-
plete answers to our questionnaire on the
subject of this computer and the national
reporting system it serves. However, we have
indications that other broad and zealous in-
forination programs, including the Army
civil disturbance system" are sharing or
feeding on entries which, if not carefully
evaluated, may produce serious consequences
for the rights and privileges of citizens. Il-
lustrating the misunderstandings and mis-
interpretations possible is the fact that mlli-
tarv doctors have expressed to me their con-
cern about an allegedly "secret" agreement
between the Defense Department and the
Secret Service which they were told was a
recent one and which required reporting of
all servicemen receiving administrative dis-
charges. One psychiatrist writes' of his con-
cern for the confidentiality of medical rec-
ords in such action:
"' see very little reason for this. My im-
pression of the individuals whom I recom;
mended for such a discharge was that these
were immature individuals who were not
able to adapt to the service for one reason
or another. Not by any stretch of the im-
agination were these individuals unpatriotic
or a threat to the security of the nation.""
When I asked the Secretary of the Navy
about this, the Subcommittee was informed
that a person is not reported to the Secret
Service merely because he received an ad-
ministrative discharge from the Navy or Ma-
rine Corps47 However, we were informed that
Pursuant to Naval regulations issued under
a secret 1965 Agreement," the Navy reports
an average of 400 persons annually. We
learned, for example, that among the many
categories of people to be reported were
not only servicemen but civilian employees
of the Defense Department who were dis-
charged on security or suitability grounds
anc: who showed "evidence of emotional in-
stailflity or irrational or suicidal behavior,
expressed strong or violent sentiments
against the United States," or who had "pre-
vio is arrests, convictions, conduct or state-
ments indicating a propensity for violence
anc antipathy for good order In Govern-
C4@_7 t." n9
MILITARY SPYING
e'? aother example of First Amendment in-
for nation programs is the Army program
for spying on Americans who exercised their
First Amendment rights. Despite these rights,
ant despite the constitutional division of
poser between the federal and state govern-
ments, despite laws and decisions defining
the legal role and duties of the Army, the
Army was given the power to create an in-
formation system of data banks and com-
puter programs which threatened to erode
these restrictions on governmental power.,"
Allegedly, for the purpose of predicting
and preventing civil disturbances wl?tch
might develop beyond the control of state
and local officials, Army agents were sent
throughout the country to keep surveillance
over the way the civilian population ex-
pressed their sentiments about government
policies. In churches, on campuses, in class-
rooms, in public .meetings, they took notes,
tape-recorded, and photographed people who
dissented in thought, word or deed. This in-
cluded clergymen, editors, public officials, and
anyone who sympathized with the dissenters.
With very few, if any, directives 51 to guide
their activities, they monitored the member-
ship and policies of peaceful organizations
who were concerned with the war in South-
east Asia, the draft, racial and labor prob-
lems, and community welfare. Out of this
surveillance the Army created blacklists; of
organizations and personalities which were
circulated to many federal, state and local
agencies, who were all requested to supple-
ment the data provided. Not only descrip-
tions of the contents of speeches and politi-
cal comments were included, but irrelevant
entries about personal finances, such as the
fact that a militant leader's credit card was
withdrawn. In some cases, a psychiatric diag-
nosis taken from Army or other medical -ec-
ords was included.
This information on individuals was pro-
grammed into at least four computers ac-
cording to their political beliefs, or their
memberships, or their geographic residely e g
The Army did not just collect and share
this information. Analysts were assigned the
task of evaluating and labeling these people
on the basis of reports on their attitudes,
remarks and activities. They were then coded
for entry into computers or microfilm data
banks .
The Army attempts to justify its surveil-
lance of civilians by asserting that it was col-
lecting information to enable the President
to predict when and where civilians might
engage in domestic violence, and that the
President was empowered to assign this task
to it by the statutes conferring upon him
the power to use the armed forces to sup-
press domestic violence.
I challenge the validity of this assertion.
Under our system, the power to investigate
to determine whether civilians are abofi to
violate federal laws is committed to federal
civil agencies, such as the FBI; and the
power to investigate to determine whether
civilians are about to violate state laws is
reposed in state law enforcement officers.
If President Johnson believed he ought to
have had information to enable him to pre-
dict when and where civilians might engage
in future domestic violence, he ought to have
called upon the FBI or appropriate state law
enforcement officers for the information,
He had no power to convert the Army into
a detective force and require it to spy on
civilians.
This conclusion is made plain by the Con-
stitution and every act of Congress relating
to the subject. Sections 331, 332, 333 and 334
of Title 10 of the United States Code :er-
tainly did not confer any such power on the
President. These statutes merely authorised
him to use the armed forces to suppress
domestic violence of the high degree specified
in them, and conditioned their use for that
purpose upon his issuing a proclamation im-
mediately ordering the offenders "to disperse
and retire peaceably to their abodes within
a limited time."
The only other statute relevant to the
subject is section 1385 of Title 18 of the
Code, which prohibits the use of any part of
the Army or Air Force "as a posse comitt;tus
or otherwise to execute the law . . . except in
cases and under circumstances expressly au-
thorized by the Constitution or Act. of
Congress."
The legislative history of this statute is
fully revealed in the opinion of United States
District Judge Dooling in Wrynn v. United
States, 200 F. Supp. 457 (E.D.N.Y. 1961).
When the words of this statute are read in
the light of its legislative history, it is ob-
vious that the statute is not limited by the
expression "as a posse comitatus or other-
wise," but operates as a prohibition against
the use of the Army to execute the laws
without reference to whether it is employed
as a posse comitatus or as a portion of the
Army. Indeed, the statute embodies "the in-
herited antipathy of the American to the
use of troops for civil purposes." 1200 F.
Supp. at 4651.
President Johnson's use of the troops to
spy on civilians, to build data banks and
create computerized information systems,
discloses that relevance of this statute to our
day is sadly clear. Since neither the Consti-
tution nor any Act of Congress expressly, or
impliedly, authorized such use, the Presi-
dent was forbidden by section 1385 of Title
18 of the United States Code to use the Army
to spy on civilians.
The Army's spying violated First Amend-
ment freedoms -of the civilians who became
aware that they or the groups to which they
belonged had been placed under surveillance.
This is so because it undoubtedly stifled
their willingness to exercise their freedom of
speech, association and assembly."
If any proof were needed of the logic and
truth of this statement, it can be drawn
from such testimony as the Subcommittee
received from Dr. Jerome Wiesner who com-
mented:
"Many, many students are afraid to par-
ticipate in political activities of various kinds
which might attract them because of their
concern about the consequences of having
a record of such activites in a central file.
They fear that at same future date, it might
possibly cost them a job or at least make
their clearance for a job more difficult to
obtain." "
The Subcommittee has heard no testimony
yet that the Army's information program
was useful to anyone. The only result of the
testimony by the Defense_ Department was to
confirm my belief that under the Constitu-
tion and under the laws, the Army had no
business engaging in such data-gathering
and that the scope and breadth' of the sur-
veillance was so broad as to be irrelevant to
the purpose.
Congress has still to discover the complete
truth about these Army computers. Appar-
ently, even officials responsible for intelli-
gence did not know of the existence of the
computers for implementing the program.
The Subcommittee has repeatedly requested
the testimony of the Army Generals who
would he most knowledgeable about the com-
puters and what they contained. We have
just as-repeatedly been denied their testi-
mony as well as delivery and declassification
of pertinent documents demonstrating the
scope and purpose of the program .m The
Army said it would cut back on the data-
gathering on lawabiding citizens and would
defer to the Department of Justice. So I
asked the Justice Department officials how
many computers that Department had con-
taining information on people who lawfully
exercised their First Amendment free-
doms." 57
I had seen newspaper articles quoting the
director of the Justice Department's Inter-
divisional Information Unit. He said there
that the computer's list of thousands of
names is not a register of "good guys" or
"bad guys." "It is simply a list of who par-
ticipated in demonstrations, rallies and the
like." This would include non-violent peo-
ple as well as violent, he said "e On the basis
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974 CONGRESSIONAL RECORD - SENATE
proper limits and uses of governmental
power and those who do not.
HoWever much we try to rationalize deci-
sions through the use of machines, there
is one factor for which the machine can
never allow. That is the insatiable curiosity
of government to know everything about
those it governs. Nor can it predict the in-
genuity applied by government officials to
find out what they think they must know
to achieve their ends.
It is this curiosity, combined with the
technological and electronic means of satis-
fying it, which has recently intensified gov-
ernmental surveillance and official inquiries
that I believe infringe on the constitutional
rights of individuals.
Congress received so many complaint about
unauthorized government data banks and in-
formation programs that the Subcommittee
undertook a survey to discover what compu-
terized and mechanized data banks govern-
ment agencies maintain on people, especially
about their personal habits, attitudes, and
political behavior. We have also sought to
learn what government-wide or nation-wide
information systems have been created by
integrating or sharing the separate data
bases. Through our questionnaire, we have
sought. to learn what laws and regulations
govern the creation, access and use of the
major data banks in government?
The replies we are receiving are astound.
ing, not only for the information they are
disclosing, but for the attitudes displayed
toward the right of Congress and the Amer-
ican people to know what Government is
doing.
In some cases, the departments were
willing to tell the Subcommittee what they
were doing, but classified it so no one else
could know .8 In one case, they were willing
to tell all, but classified the legal authority
on which they relied for their information
powerg
Some reports are evasive and misleading.
Some agencies take the attitude that the in-
formation belongs to them and that the last
person who should see it is the individual
whom it is about Y0 A few departments and
agencies effectively deny the information by
not responding until urged to do so.n
They reflect the attitude of the Army cap-
tain who knew Congress was investigating
the Army data banks and issued a directive
stating:
"The Army General Counsel has re-em-
phasized the long-standing policy of the Ex-
ecutive Branch of the Government . . . that
all files, records and information in the pos-
session of the Executive Branch is privileged
and is not releasable to any part of the Legis-
lative Branch of the Government without
specific direction of the President."13
So, on the basis of this study, and on the
withholdings of information from the Amer-
ican people which the Subcommittee has ex-
perienced, >s I have concluded that the claim
of the Government departments to their own
privacy is greatly overstated. The truth is
that they have too much privacy in some of
their information activities. They may cite
the Freedom of Information Act 14 as author-
ity for keeping files secret from the Individ-
ual as well as from the Congress. They then
turnaround and cite "inherent power"16 or
"housekeeping authority"10 as a reason for
maintaining data banks and computerized
files on certain individuals; or they may cite
the conclusions of independent Presidential
factfinding commissions 17
So far the survey results show a very wide-
ranging use of such technology to process
and store the information and to exchange it
with other federal agencies, with state and
local governments and, sometimes, with pri-
vate agencies.
Most of this is done in connection with ad-
ministration of Government's service pro-
grams. However, a number of these data
banks and information programs may par-
take of the nature of largescale blacklists.
This is so because they may encompass
masses of irrelevant, outdated or even In-
correct investigative information based on
personalities, behavior and beliefs. Unwisely
applied or loosely supervised, they can oper-
ate to deprive a person of some basic right.
For Instance, a Federal Communications
Commission response v shows that the FCC
uses computers to aid it in keeping track of
political broadcast time, in monitoring and
assigning spectrums, and in helping it make,
prompt checks on people who apply for
licenses. The Commission reported that it
also maintains a Check List, which now has
about 10,900 names. This Check List, in the
form of a computer print-out, is circulated
to the various Bureaus within the Commis-
sion. It contains the names and addresses
of organizations and individuals whose qual-
ifications are believed to require close ex-
amination in the event they apply for a
license. A name may be put on the list by
Commission personnel for a variety of rea-
sons, such as a refusal to pay an outstand.
ing forfeiture, unlicensed operation, license
suspension, the issuance of a bad check to
the Commission or stopping payment on a
fee check after failing a Commission exam-
ination.
In addition, this list incorporates the
names and addresses of individuals and or-
ganizations appearing in several lists pre-
pared by the Department of Justice, other
Government agencies, and Congressional
committees. For example, the list contains
information from the "FBI Withhold List,"
which contains the names of individuals or
organizations which are allegedly subver.
sive, and from the Department of Justice's
"Organized Crime and Racketeering List,"
which contains the names of individuals
who are or have been subjects of investiga-
tion in connection with activities identified
with organized crime. Also included in the
list are names obtained from other Govern-
ment sources, such as the Internal Revenue
Service, the Central Intelligence Agency, and
the House Committee on Internal Security.
According to the Commission, the use of the
data arose in 1964 because during the course
of Senate Hearings chaired by Senator Mc-
Clellan, it was discovered that a reputed
racketeering boss in New Orleans, Louisiana,
held a Commission license. In order that such
licensing not take place in the future, the
Commission established liaison with the re-
sponsible divisions within the Department
of Justice to be kept current on persons who
might have such affiliations.
The Civil Service Commission maintains
a "security file" in electrically powered rotary
cabinets containing 2,120,000 index cards 19
According to the Commission, these bear lead
information relating to possible questions of
suitability involving loyalty and subversive
activity. The lead information contained in
these files has been developed from published
hearings of Congressional committees, State
legislative committees, public investigative
bodies, reports of investigation, publications
of subversive organizations, and various
other newspapers and periodicals. This file
is not new, but has been growing since World
War II.
The Commission chairman reported:
"Investigative and intelligence officials of
the various departments anca agencies of the
Federal Government make extensive official
use of the file through their requests for
searches relating to investigations they are
conducting."
In another "security investigations index"
the Commission maintains 10,250,000 index
cards filed alphabetically covering personnel
investigations made by the Civil Service
S 10255
applicants on whom investigations were
made or are in process of being made.
Then, the Commission keeps an "inves-
tigative file" of approximately 625,000 file
folders containing reports of investigation
on cases investigated by the Commission. In
addition, about 2,100,000 earlier Investiga-
tive files are maintained at the Washington
National Records Center in security storage.
These are kept to avoid duplication of in-
vestigations or for updating previous in-
vestigations. ?
The Housing and Urban Development De-
partment in considering automation of a de-
partmental system which would integrate
records now included in FHA's Sponsor
Identification File, Department of Justice's
Organized Crime and Rackets File, and
HUD's Adverse Information FileR? A data bank
consisting of approximately 325,000 3 x 5 in-
dex cards has been prepared covering any in-
dividual or firm which was subject of or
mentioned prominently in, any investigations
dating from 1954 to the present. This in-
cludes all FBI investigations of housing mat-
ters as well.
In the area of law enforcement, the Bureau
of Customs has Installed a central automated
data processing intelligence network which is
a comprehensive data bank of suspect in-
formatioll available on a 24-hour-a-day basis
to Customs terminals throughout the coun-
try?'
According to the Secretary of the Treasury:
"These records include current information
from our informer, fugitive and suspect lists
that have been maintained throughout the
Bureau's history as an enforcement tool and
which have been available at all major ports
of entry, though in much less accessible and
unable form. With the coordinated efforts of
the Agency Service's intelligence activities,
steady growth of the suspect files is ex-
pected."
There is the "Lookout File" of the Passport
Office and the Bureau of Security and Con-
sular Affairs= This computerized file il-
lustrates the "good neighbor" policy agencies
observe by exchanging information in order
to keep individuals under surveillance for in-
telligence and law enforcement purposes.
Maintained apart from the twenty million
other passport files, its basic purpose is to
assist in screening passport applicants to
make certain they are citizens of the United
States and that they are eligible to receive
passports. Requests for entry into this sys-
tem are received from component agencies
of the Department, from other government
agencies, or in the limited category of child
custory, from an interested parent or guard-
ian.
The Department assured the Subcommit-
tee that data recorded in this "Lookout File"
is not disseminated. Rather, it serves as a
"flag" which, if a "hit" or suspect Is recorded,
is furnished to the original source of the
lookout and consists of the name of the in-
dividual and the fact that he has applied
for a passport. The individual is not told
that he Is in the file until the information
is used adversely against him. Then, accord-
ing to the report, "he is fully informed and
given an opportunity to explain or rebut the
information on which the adverse action is
based."
Among some of the reasons listed for peo-
ple being in the Lookout File are the follow-
ing:
If the individual's actions do not reflect to
the credit of U.S. abroad;
If he is wanted by a law enforcement
agency in connection with criminal activity;
If a court order restricting travel is out-
standing or the individual is involved in a
custody or desertion case;
"If he is a known or suspected Communist
or subversive;
"If he is on the Organized Crime
d
an
Records in this index relate to Incumbents of Rackets List or is a suspected delinquent in
Federal positions, former employees, and military obligations."
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10256
CONGRESSIONAL RECORD - SENATE June 11, 104
The Defense Industrial Security Clearance
Office is preparing to computerize its card
flies on over one and a half million private
citizens who are employees of businesses do-
ing classified contract work for the Federal
Government w
r: a Federal Deposit Insurance Corpora-
tion maintains information on people now
associated with banks insured by the FDIC
or who have been associated with such banks
in the past U It keeps a file on the names
of individuals gained from newspapers and
other public sources if they are character-
ize d as having an unsatisfactory relationship
with any insured bank or any closed insured
bank. This also includes information sup-
plied to the Corporation by other investiga-
tive or regulatory agencies an persons con-
nected with an insured bank.
The Army maintains the U.S. Army In-
vestigative Records Repository (USAIRR)
which contains about 7,000,000 files relating
principally to security and criminal investi-
gations of former and present members of
the Army, civilian employees and employees
of private contractors doing business with
the Army. The other services maintain simi-
lar Investigative flles.-
There is a Defense Central Index of In-
ve.atigation operated by the Army for the
entire Defense Department. The Index is de-
signed to locate any security or criminal in-
vestigative file for any Defense agency and
will be computerized shortly. It contains
identifying data such as name, date of birth
and social security number on people who
have ever been the subject of investiga-
tions fB
There are all the data banks and oom-
pc:teers in the Department of Justice 29 for
intelligence, for civil disturbance preven-
tion_: for "bad checks passers;" for organized
crime surveillance; and for federal-etate law
enforcement cooperation through the com-
puterized National Crime Information
Center.
On the basis of our investigation of oom-
plaints reviewed by Congress,e I am con-
viaced that people throughout the country
are more fearful than ever before about
those applications of computer technology
and scientific information processing which
may adversely affect their constitutional
rights. Furthermore, my study of the Con-
stitution convinces me that their fears are
wel? founded.
First, they are concerned that through a
computer error they may be denied basic
fairness and due process of law with respect
to benefits and privileges for which they
have applied.
Secondly, they are concerned about illegal
access and violation of confidentiality of
personal information which is obtained
about them by government or industry.
These are actions which for any one in-
dividual or for entire groups may lead to a
loss of the ability to exercise that "pursuit
of happiness" which the Declaration of In-
dependence declares is one of the unalien-
able rights of man.
These are actions which, by producing
erroneous reports, may limit or deny a per-
son's economic prospects and thereby impair
that liberty which under the 5th and 14th
amendments government may not impair
wit-lout due process of law.
ARREST RECORDS
This possibility is Illustrated by a letters.
I received from a man who describes the ef-
fect on his life of an incident which occurred
when he was fifteen years of age. In connnec-
tion with a locker theft, he was taken to the
police station, finger printed, questioned and
then he left, cleared of charges. He was not
involved in any incident subsequently except
a few minor traflic violations. He served 11
years in the armed services and held the
highest security clearances. After gaining
employment with a city government, he dis-
covered that the youthful incident was, 15
years later, part of an FBI file and dis-
tributed to employers on request. He was
asked to explain the incident for personnel
records and to state why he withheld the hi-
formation. Although he was unaware of the
record, he believes the failure to list the inci-
dent was a factor in not gaining employment
in several instances, and he was told he
would have to institute court action to have
the record expunged.
The problem he and millions of others
face with respect to their records is illus-
trated by a regulation issued by the Attor-
ney General last year restating the goal of
the Federal Bureau of Investigation "toeon-
duct the acquisition, collection, exchange,
classification, and preservation of ldentlfi_a-
tion records . . . on a mutually beneficial
basis." ED Among the agencies listed as eligible
to receive and supply information were rail-
road police, bankin,; institutions and insur-
ance companies.
In Washington, D,C., a young man who was
an Innocent bystander during a campus
demonstration was arrested by police and
then released. Knowing that the FBI could
distribute such records to employers, he hired
a lawyer and spent large sums of money in a
suit to have his arrest record expunged. The
lawer court denied his request, but the Court
of Appeals ruled that, in the District of Co-
lumbia at least, arrest records should be ex-
punged for innocent bystanders caught up in
mass police arrests 3L
In another case, a young man was arrested
on probable cause and fingerprinted in Cali-
fornia. When the police could not connect
him with the case, he was released. He sought
to have his arrest record expunged, or alter-
natively, to have strict limitations placed
on its dissemination to prospective employ-
ers and others by the Federal Bureau of
Investigation. While the U.S. District Court
denied his request for expungement, it did
say that his arrest record may not be revealed
to prospective employers except in the case
of any Federal agency when he seeks employ-
ment with that agency. However, it could
be distributed for law enforcement purpo>es.
Congress later restored this power to the
FBI temporarily in an annual appropriation
bill.
Judge Gesell's comments in this case of
Menard v. Mitchell 22 are significant for the
issue of arrest records, but also for the Army's
computer surveillance program and for many
other government intelligence systems now
being designed. He stated that while "can-
duct against the state may properly subject
an individual to limitations upon his future
freedom within tolerant limits, accusations
not proven, charges made without supporting
evidence when tested by the judicial process,
ancient or juveni)e transgressions long since
expiated by respdnsible conduct, should not
be indiscriminately broadcast under govern-
mental auspices." He also said:
"The increasing complexity of our society
and technological advances which facilitate
massive accumulation and ready regurgita-
tion of farflung data have presented rr:)re
problems in this area, certainly problems not
contemplated by the framers of the Constitu-
tion. These developments emphasize a press-
ing need to preserve and to redefine aspects
of the right of privacy to insure the basic
freedoms guaranteed by this democracy.
"A heavy burden is placed on all branches
of Government to maintain a proper equilib-
rium between the acquisition of Information
and the necessity to safeguard privacy.
Systematic recordation and dissemination of
information about individual citizens in a
form of surveillance and control which may
easily Inhibit freedom to speak, to work, and
to move about in this land. If information
available to Government is misused to pub-
licize past incidents in the lives of its citizens
the pressures for conformity will be Irresisti-
ble. Initiative and Individuality can be suffo-
cated End a resulting dullness of mind and
conduct will become the norm. We are far
from having reached this condition today,
but surely history teaches that inroads are
most likely to occur during unsettled times
like these where fear or the passions of the
moment can lead to excesses."
There are many similar cases pending
throughout the states. Present laws are not
sufficient to assure that an individual will be
judged on his merit and not by inacurrate
arrests records distributed 'by a national
law enforcement computer.w
LAW ENFORCEMENT INTELLIGENCE RECORDS
Such threats to privacy and liberty arise
with special force in the area of intelligence
records. The Subcommittee study reveals
two serious problems which have acquired
national urgency through the introduction
of computer technology. First, the problem of
safeguarding intelligence Information from
improper release by government Itself, and
secondly, the problem of confining its collet.
tion to appropriate areas and subjects.
Government has, and should have, power
to collect information, even raw, unverified
intelligence information, in fields in which
government has a lawful, legitimate interest.
But this great power imposes a solemn re-
sponsibility to see that no one is given access
to that information, except the Government
itself for some legitimate purpose. There
could never, for instance, be justification for
Government to disclose intelligence gathered
about citizens pursuant to its powers, to
other citizens for their own personal or
financial aggrandizement. Nor should Gov-
ernment through disclosure of confidential
documents aid and abet the writing of
sensational articles in private journals
operated for commercial profit. '
Nevertheless, the Subcommittee received
testimony and evidence about two cases,
which illustrate the misuse of confidiential
intelligence information for such purposes.
One involved a man In political life, the
mayor of San Francisco, who was the subject
of an article in Look Magazine purporting to
establish that he associated with persons
involved in organized crime. When the
Mayor sued the magazine for libel, he under-
took through subpoena power to learn the
basis for such charges and where and how
the authors obtained their information. He
learned that they bad received confidential
information-and documents from intelligence
data banks. The information came from files
and computer printouts of a number of
major Federal, state and local government
law enforcement agencies. They involved
the U.S. Attorney General's Office, the Federal
Bureau of Investigation, Internal Revenue
Service, Federal Bureau of Narcotics, the
Customs Bureau, the Immigration and Na-
turalization Service, the California Criminal
Identification and Investigation Bureau, the
California State Department of Justice, and
the Intelligence Unit of the Los Angeles Po-
lice Department. By their own testimony for
the case, the authors of the article admitted
that they examined, obtained or borrowed
originals or copies of such law enforcement
records containing much raw unevaluated
intelligence information on numerous people
Including the names of three U.S. Presidents,
the state Governor, a number of Senators,
and manyprivate law-abiding citizens, not
accused of any crime. These documents were
obtainable despite the fact that many of
them were stamped "Confidential" or-
Property of U.S. Government For official
use only. May not be disseminated or con-
?ents disclosed without perms ,lion.... .
There is more about these and other dis-
closures in.the hearing reco_, but I believe
the Mayor's testimony 24 illustrates many of
of the dangers to privacy in this age of large
Investigative networks and instant compu-
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974 CONGRESSIONAL RECORD - SENATE
proper limits and uses of governmental
power and those who do not.
However much we try to rationalize deci-
sions through the use of machines, there
is one factor for which the machine can
never allow. That is the insatiable curiosity
of government to know everything about
those it governs. Nor can it predict the in-
genuity applied by government officials to
find out what they think they must know
to achieve their ends.
It is this curiosity, combined with the
technological and electronic means of satis-
fying it, which has recently intensified gov-
ernmental surveillance and official inquiries
that I believe Infringe on the constitutional
rights of individuals.
Congress received so many complaint about
unauthorized government data banks and in-
formation programs that the Subcommittee
undertook a survey to discover what compu-
terized and mechanized data banks govern-
ment agencies maintain on people, especially
about their personal habits, attitudes, and
political behavior. We have also sought to
learn what government-wide or nation-wide
information systems have been created by
integrating or sharing the separate data
bases. Through our questionnaire, we have
sought to learn what laws and regulations
govern the creation, access and use of the
major data banks in government .7
The replies we are receiving are astound-
ing, not only for the information they are
disclosing, but for the attitudes displayed
toward the right of Congress and the Amer-
ican people to know what Government is
doing.
In some cases, the departments were
willing to tell the Subcommittee what they
were doing, but classified it so no one else
could know .9 In one case, they were willing
to tell all, but classified the legal authority
on which they relied for their information
power .9
Some reports are evasive and misleading.
Some agencies take the attitude that the in-
formation belongs to them and that the last
person who should see it is the individual
whom it is about 30 A few departments and
agencies effectively deny the information by
not responding until urged to do so.n
They reflect the attitude of the Army cap-
tain who knew Congress was investigating
the Army data banks and issued a directive
stating:
"The Army General Counsel has re-em-
phasized the long-standing policy of the Ex-
ecutive Branch of the Government ... that
all files, records and information in the pos-
session of the Executive Branch is privileged
and is not releasable to any part of the Legis-
lative Branch of the Government without
specific direction of the President."'a
So, on the basis of this study, and on the
withholdings of information from the Amer-
ican people which the Subcommittee has ex-
perienced, 18 I have concluded that the claim
of the Government departments to their own
privacy is greatly overstated. The truth is
that they have too much privacy in some of
their information activities. They may cite
the Freedom of Information Act 14 as author-
ity for keeping files secret from the individ-
ual as well as from the Congress. They then
turnaround and cite "inherent power"'s or
"housekeeping authority"10 as a reason for
maintaining data banks and computerized
files on certain individuals; or they may cite
the conclusions of independent Presidential
factflnding commissions 17
So far the survey results show a very wide-
ranging use of such technology to process
and store the information and to exchange it
with other federal agencies, with state and
local governments and, sometimes, with pri-
vate agencies.
Most of this is done in connection with ad-
ministration of Government's service pro-
Footnotes at end of article.
grams. However, a number of these data
banks and information programs may par-
take of the nature of largescale blacklists.
This is so because they may encompass
masses of irrelevant, outdated or even in-
correct investigative information based on
personalities, behavior and beliefs. Unwisely
applied or loosely supervised, they can oper-
ate to deprive a person of some basic right.
For instance, a Federal Communications
Commission response v shows that the FCC
uses computers to aid it in keeping track of
political broadcast time, in monitoring and
assigning spectrums, and in helping it make
prompt checks on people who apply for
licenses. The Commission reported that it
also maintains a Check List, which now has
about 10,900 names. This Check List, in the
form of a computer print-out, is circulated
to the various Bureaus within the Commis-
sion. It contains the names and addresses
of organizations and individuals whose qual-
ifications,are believed to require close ex-
amination in the event they apply for a
license. A name may be put on the list by
Commission personnel for a variety of rea-
sons, such as a refusal to pay an outstand-
ing forfeiture, unlicensed operation, license
suspension, the -issuance of a bad check to
the Commission or stopping payment on a
fee check after failing a Commission exam-
ination.
In addition, this list incorporates the
names and addresses of individuals and or-
ganizations appearing in several lists pre-
pared by the Department of Justice, other
Government agencies, and Congressional
committees. For example, the list contains
information from the "FBI Withhold List,"
which contains the names of individuals or
organizations which are allegedly subver-
sive, and from the Department of Justice's
"Organized Crime and Racketeering List,"
Which contains the names of individuals
who are or have been subjects of investiga-
tion in connection with activities Identified
with organized crime. Also included in the
list are names obtained from other Govern-
ment sources, such as the Internal Revenue
Service, the Central Intelligence Agency, and
the House Committee on Internal Security.
According to the Commission, the use of the
data arose in 1964 because during the course
of Senate Hearings chaired by Senator Mc-
Clellan, it was discovered that a reputed
racketeering boss In New Orleans, Louisiana,
held a Commission license. In order that such
licensing not take place in the future, the
Commission established liaison with the re-
sponsible divisions within the Department
of Justice to be kept current on persons who
might have such affiliations.
The Civil Service Commission maintains
a "security file" in electrically powered rotary
cabinets containing 2,120,000 index cards 18
According to the Commission, these bear lead
information relating to possible questions of
suitability involving loyalty and subversive
activity. The lead information contained in
these files has been developed from published
hearings of Congressional committees, State
legislative committees, public investigative
bodies, reports of investigation, publications
of subversive organizations, and various
other newspapers and periodicals. This file
is not new, but has been growing since World
War II.
The Commission chairman reported:
"Investigative and intelligence officials of
the various departments ancj agencies of the
Federal Government make extensive official
use of the file through their requests for
searches relating to investigations they are
conducting." -
In another "security investigations index"
the Commission maintains 10,250,000 index
cards filed alphabetically covering personnel
investigations made by the Civil Service
Commission and other agencies since 1939.
Records in this index relate to incumbents of
Federal positions, former employees, and
If they wear artificial dentures;
"Taking things all together, would you
say you're very happy, pretty happy, or not
too happy these days?"
S 10255
applicants on whom investigations were
made or are in process of being made.
Then, the Commission keeps an "inves-
tigative file" of approximately 625,000 file
folders containing reports of Investigation
on cases investigated by the Commission. In
addition, about 2,100,000 earlier investiga-
tive files are maintained at the Washington
National Records Center in security storage.
These are kept to avoid duplication of in-
vestigations or for updating previous in-
vestigations.
The Housing and Urban Development De-
partment in considering automation of a de-
partmental system which would integrate
records now included in FHA's Sponsor
Identification File, Department of Justice's
Organized Crime and Rackets File, and
HUD's Adverse Information File" A data bank
consisting of approximately 325,000 3 x 5 in-
dex cards has been prepared covering any in-
dividual or firm which was subject of or
mentioned prominently in, any investigations
dating from 1954 to the present. This in-
cludes all FBI investigations of housing mat-
ters as well.
In the area of law enforcement, the Bureau
of Customs has installed a central automated
data processing intelligence network which is
a comprehensive data bank of suspect in-
formatiop available on a 24-hour-a-day basis
to Customs terminals throughout the coun-
try 21
According to. the Secretary of the Treasury:
"These records include current information
from our informer, fugitive and suspect lists
that have been maintained throughout the
Bureau's history as an enforcement tool and
which have been available at all major ports
of entry, though in much less accessible and
unable form. With the coordinated efforts of
the Agency Service's intelligence activities,
steady growth of the suspect files is ex-
pected."
There is the "Lookout File" of the Passport
Office and the Bureau of Security and Con-
sular Affairs?2 This computerized file il-
lustrates the "good neighbor" policy agencies
observe by exchanging information in order
to keep individuals under surveillance for in-
telligence and law enforcement purposes.
Maintained apart from the twenty million
other passport files, its basic purpose is to
assist in screening passport applicants to
make certain they are citizens of the United
States and that they are eligible to receive
passports. Requests for entry into this sys-
tem are received from component agencies
of the Department, from other government
agencies, or in the limited category of child s
custory, from an interested parent or guard-
ian.
The Department assured the Subcommit-
tee that data recorded in this "Lookout File"
is not disseminated. Rather, it serves as a
"flag" which, if a "hit" or suspect is recorded,
is furnished to the original source of the
lookout and consists of the name of the in-
dividual and the fact that he has applied
for a passport. The individual is not told
that he is in the file until the information
is used adversely against him. Then, accord-
ing to the report, "he is fully informed and
given an opportunity to explain or rebut the
information on which the adverse action is
based."
Among some of the reasons listed for peo-
ple being in the Lookout File are the follow-
ing:
If the individual's actions do not reflect to
the credit of U.S. abroad;
If he is wanted by a law enforcement
agency in connection with criminal activity;
If a court order restricting travel is out-
standing or the individual is involved in a
custody or desertion case;
"If he is a known or suspected Communist
or subversive;
"If he is on the Organized Crime and
Rackets List or is a suspected delinquent in
military obligations."
ances which some may consider imaginary;
and on occasion, I may also have "embar-
rassed" high government officials.
One man wrote me his concern about this
program and commented;
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10256
CONGRESSIONAL RECORD -SENATE June 11, 1974
T-ie Defense Industrial Security Clearance highest security clearances. After gaining the pressures for conformity win be irresisti-
Office is preparing to computerize its card employment with a city government, he tits- ble. Initiative and individuality can be suffo-
flies on over one and a half million private coverrd that tt,A ronnt1.fni -nrlAn.....e. ,K ..-a--. -} - ~__.~.--- - - -
S I0258 CON GRESSIONAL RECORD - SENATE June 11, 1974
"The Secret Service ought to go after my formation system of data banks and com- cases and under circumstances expressly au-
mother-in-law, too. On her last visit she said puter programs which threatened to erode tborized by the Constitution or Act of
that the Vice President doesn't seem to these restrictions on governmental power"' Congress."
have too many brains. She also said that Allegedly, for the purpose of predicting The legislative history of this statute is
Senator - has a face like a carbuncle. and preventing civil disturbances which fully revealed in the opinion of United States
Should I report this to the Secret Service? u might develop beyond the control of state District Judge Dooling in Wrynn v. United
There is no doubt that the physical pro- and local officials, Army agents were sent States, 200 F. Supp. 457 (E.D.N.Y. 1961). words
of this
statute teci;ion of the President and high govern- throughout the country to keep surveillance thee nghteof its legislative h stem, it is in
meal, officials is a legitimate government over the way the civilian population
purpose and all reasonable means must be pressed their sentiments about government vious that the statute is not limited by the
taken in pursuit of it. Nevertheless, such policies. In churches, on campuses, in class- expression "as a posse comitatus or other-
broad and vaguely worded standards for in- rooms, in public meetings, they took notes, wise," but operates as a prohibition against
vestigating and adversely reporting Ameri- tape-recorded, and photographed people who the use of the Army to execute the laws
cans to their government on the basis of dissented in thought, word or deed. This in- without reference to whether it is employed
their utterances could, at one time or an- .eluded clergymen, aeditors, witblic the officials, and Aas a rmy. Isle com to statute ema port bodiesntof the
could anyone
Congress
cod ather, most include most
politically members aware ti ofzens. It could
very f w, if any, directives 51 to guide herited antipathy of the American to the citizens. troo cover heated words exchanged in political their activitiesie8 they pease?uaorthe ganizati~ns Supp.fat 4661s for civil purposes." [200 F.
the tr licies
on's
use
debate and discussion anywhere in the ship and po
civil and military officials e who Asia rt?h e draft, racialhandai bo pSouth- rob- spyron civilians, a to bui d data banks and
some local the Federal government and in
some cal law enforcement agencies were isms, and community welfare. Out of this ? create computerized information systems,
requested to report people coming to their surveillance the Army created blacklists of discloses that relevance of this statute to our which
ince
sadl
clear.
were
neither the Co criteria. who were thought to fit these circulated to many federal, state and local tuition nor yny Act of Congress expressly, or
criteria. agencies, who were all requested to supple- impliedly, authorized such use, the Presi-Section
1 The Subcommittee has not rnaire reed on cothe me ment the data provided. Not only descrip- dee t was United forbidden by Code to use385 the Title
1 of the States
piste answers to our questionnai tions of the contents of speeches and politi-
repcrti of this computer and the national cal comments were included, but irrelevant to spy on civilians.
subject
indications it serves. broad However, o have entries about personal finances, such as the The Army's spying violated First Amend-
m . and zealous my fact that a militant leader's credit card was ment freedoms -of the civilians who became
indications programs, other
cormation programs, including sha Army withdrawn. In some cases, a psychiatric diag- aware that they or the groups to which they
civil disturbance system,45 are hcareg or nosis taken from Army or other medical rec- belonged had been placed under surveillance.
feeding on entries which, if not carefully hiss was included.
for the rights an This is so because it undoubtedly stifled
privileges serious of citizens. Il- consequences This information on individuals was pro- their willingness to exercise their freedom of
evaluated, rights and may,produce
grammed into at least four computers Sc- speech, association and assembly 54
interpret the misunderstandings and mil- cording to their political beliefs, or their If any proof were needed of the logic and ations ,nary do tors have expressed s doe fact that mill- memberships, or their geographic residence 62 truth of this statement, it can be drawn
tarp doctors have egedeyed to me their fonThe Army did not just collect and share from such testimony as the Subcommittee
fen el "secret" agreement the this information. Analysts were assigned the received from Dr. Jerome Wiesner who com-
tern about an allegedly
Secween the Defense Department told of evaluating and labeling these people mented:
recent on See rvice and which which required they were epld reporting was a on the basis of reports on their attitudes, "Many, many students are afraid to par-
them of various kinds
all ate in n political atc activities
receiving ch rges One ychiatriadmindxnns' of his dis- for remarks entry i and in-to activities. computers They or were microfilm then coded data which sthe cbecause of their
having
such ac daises consequences
a central file.
charges. fs. One confidentiality rites' of his con- banks 53 'record about
tern for the confidenalof medical rec- The Army attempts to justify its surveil- They fear that such
some future dace, t might
of ds in such action: lance of civilians by asserting that it was col-
", see very little reason for this. My im- letting information to enable the President possibly cost them a job or at least make
pression of the individuals whom I recom_ to predict when and where civilians might their clearance for a job more difficult to
mended for such a discharge was that these engage in domestic violence, and that the obtain." s;
were immature individuals who were not President was empowered to assign this task The Subcommittee has heard no testimony
able to adapt to the service for one reason to it by the statutes conferring upon him yet that the Army's information program
or another. Not by any stretch of the im- the power to use the armed forces to sup- was useful to anyone. The only result of the
agination were these individuals unpatriotic press domestic violence. testimony by the Defense Department was to
or a threat to the security of the nation." c I challenge the validity of this assertion, confirm my belief that under the Constitu-
informed tion and under the laws, the Army had no
our system, the power to f data-gathering
ohhen I asked the Secretary of the Nav3 Under
about this, the Subcommittee was informed to determine whether civilians are e about t to to and business that the engaging scope in and such dbreadth of the sur-
that e v -person is not reported the ad... violate federal laws is committed to federal veillance was so broad as to be irrelevant to
5
service merely because he received an n ad? civil agencies, such as the FBI; and the the purpose.
roinistrative discharge from the Navy or Ma.- power to investigate to determine whether Congress has still to discover the complete
rive Corps" However, we were informed the .' civilians are about to violate state laws is truth about these Army computers. Appar-
Pursuant to Naval regulations issued under reposed in state law enforcement officers. mils, even officials responsible for intelii-
annually, report; If President Johnson believed he ought to gene did not know of the existence of the
a secret ge of 400 persons the
1966 ,48 Navy lop average ex e, persons among the n:T have had information to enable him to pre- computers for implementing the program.
learned, for example, that among the man? diet when and where civilians might engage The Subcommittee has repeatedly requested
not tegnlys r people but civilian employee3 e3 in future domestic violence, he ought to have the testimony of the Army Generals who
of tonly he servicemen but cvilian em called upon the FBI or appropriate state law would be most knowledgeable about the com-
charged c the on Defense D security or :Department who suitability were dins enforcement officers for the information. puters and what they contained. We have
a suir:d who showed "evidence of emotional in- He had no power to convert the Army into just as-repeatedly been denied their testf-
stability or irrational or suicidal behavior, a detective force and require it to spy on mony as well as delivery and declassification
of pertinent documents demonstrating the
This conclusion is made plain by the Con- scope and purpose of the program.? The
atainst expressed the strong United or States," or violent who se had "pr ad "pre- This e- civilians.
would cut back on the data-
vious arrests, convictions, conduct or state- stitution and every act of Congress relating Army said
;vents indicating a propensity for violence to the subject. Sections 331, 332, 333 and 334 gathering on lawabiding citizens and would the nited States
rtment I
the
defer
cer-
and antipathy for good order in Govern- tai Title not c nferany such power on the asked the JusticeaD partmentJofficialsSh w
n.en t." '"
MILITARY SPYING President. These statutes merely authorized many computers that Department had con-
Another example of First Amendment in - him to use the armed forces to suppress taming information on people who lawfully
fC'rmation programs is the Army program domestic violence of the high degree specified exercised their First Amendment free-
in them, and conditioned their use for that dims." 5'
these then ur ose upon his issuing a proclamation im- I had seen newspaper articles quoting the
Fir s Amp do Americans who exercised
anstmen the lions i u tionalivi rights, mediately ordering the offenders "to disperse director of the Justice Department's Inter-
federal of and retire peaceably to their abodes within divisional Information Unit. He said there
pod despite the constitutional
power between the al and d state se govern- a limited time." that the computer's list of thousands of definir. ten le, l roles laws and decisions m , U e The only other statute relevant to the names is not a register of "good guys" or
the legal role and duties of the Army, n- subject Is section 1385 of Title 18 of the "bad guys." "It is simply a list of who par-
?.xmy was given the power to create an in- Code, which prohibits the use of any part of ticipated in demonstrations, rallies and the te Army or Air Force as a ['oatnotes at end of article.
or otherwise to execute` the laws&. c except in pleas well as violent, he said se Onlthe basis
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974 CONGRESSIONAL RECORD -SENATE
of these reports, I asked for the testimony of
this official, but for some strange reason,
he could not be located.
Despite questioning during the hearings
and correspondence with the Justice De-
partment, we have been unable to obtain
an accurate description of the use of Justice
Department computers for collecting, proc-
essing and analyzing information on lawful
First Amendment activities of citizens. Nor
have we been able to ascertain or obtain the
standards followed by the Department In de-
ciding what individuals should be the sub-
jects in such files, or how they should be
excluded from such files.
LEGISLATIVE REMEDIES
There has been much discussion of the
need for new laws granting access to indi-
vidual records. I believe a person should have
the chance to expunge, update and correct
his records. With the advent of systematic
record-keeping, a man needs the chance
which a businessman has to go into economic
bankruptcy and obtain a discharge from his
past.
I believe, however, that we must go beyond
that relationship between the individual and
his records. We must act to restore a healthy
balance to the relationship between the citi-
zen and his government, and necessarily be-
tween Congress and the Executive Branch.
Mere access to and knowledge of his Individ-
ual file is not enough. Remedial action must
be addressed to the curbing of the power of
government over the individual and to re-
stricting. its power to deny information about
government programs. The claim to an in-
herent power to monitor, investigate and
compile dossiers on law-abiding citizens on
the off-chance that they might need to be
investigated for a legitimate governmental
purpose at some time in the future must also
be opposed.
As a result of the Subcommittee's experi-
ence in playing hide-and-go-seek with the
Federal Government's computers and with
the people who plan and supervise them, I
am convinced these computers have too much
privacy today. The Congress, the press and
the public should have available an habeas
corpus action for entire computer systems
and programs themselves. No department
should be able to hide such broad-based data
programs and information systems. If they
are lawful, the American people then have a
right to full knowledge about the operation
of their government. If they are not lawful
and relevant for some purpose, they should
be exposed for what they are-attempts to
intimidate citizens into silence and con-
formity.
First, we need to devise some judicial
remedy for confronting and testing the
nature, purpose, legality and constitution-
ality of governmental data banks and large-
scale Intelligence information systems which
by their very existence may threaten the
quality of our First Amendment freedoms or
whose contents may affect economic pros-
pects, reputations or rights. Now pending
before the United States Supreme Court is
just such a challenge to the Army surveil-
lance program and the military data banks,
including at least four computer systems for
storing and processing information on Amer-
ican across the land. ]Tatum v. Laird, no. 71-
288 (1971) (argued March 27, 1972) ] The
lower court has denied standing to sue to
plaintiffs who were subjects of surveillance
and computer dossiers on grounds that they
have not shown injury. 144 F.2d 947 (D.C.
Cir. 1971) ].
Congress must strengthen and enforce re-
porting requirements for computer systems.
Not even in the audit of computers which
the present law requires the General Services
Administration to conduct each year is it
possible for Congress, the press, and the pub-
lic to get minimum information about all of
the management uses of computers in
government.
Secondly, r believe we must devise legal
means of assuring the reporting of large
government data banks to a central office
established independently of the executive
branch. This would require the filing of
policy statements describing exactly what
agencies feed a particular information sys-
tem and who would receive or access data
routinely from a particular data bank. These
policy statements should be public records.
In this way, people would have due notice
of possible sharing of information by other
agencies or state or local governments.
Thirdly, out of these directives, a graphic
national information-flow chart would be
designed and made available for public in-
spection. An individual concerned about his
record could then go to the respective agen-
cies and exercise his rights under the Free-
dom of Information Law to inspect his files.
Fourth, there is a need to fully implement
the principle of open government implicit in
the Freedom of Information Law by reducing
the number of exemptions In it which the
Executive Branch may use to deny or with-
hold information. This would make the ju-
dicial remedies it "contains more meaningful.
Fifth, I believe there must be established
a new independent agency for setting and
enforcing strict standards in software and
hardware for the assurance of security, con-
fidentiality and privacy of records. These
would be applied to all phases of gathering,
processing and transmitting information
about people by government computer sys-
tems. This would include such problems as
Interception of electronic transmissions and
tapping of systems.
Sixth, Congress must enact specific prohi-
bitions on unconstitutional or unwise prac-
tices which unfairly augment government's
power to invade individual privacy. Examples
of such legislation would be: (1) a ban on
use of military resources to conduct unwar-
ranted surveillance over civilians and to cre-
ate and share data banks on them, and (2) a
ban on unconstitutional means of coercing
citizens into revealing personal information
about themselves sD Such a bill is S. 2156
which would prohibit requirements on ap-
plicants and employees to submit to lie de-
tectors' in order to work?^ Another bill is
S. - 1438, designed to protect federal em-
ployees and applicants from unwarranted de-
mands for information about such matters
as their race, national origin, religious be-
liefs and practices, sexual attitudes and con-
duct, and personal family relatlonahips c1
Another necessary protection would be a pro-
hibition on distribution of arrest records to
private companies and severe restrictions on
their availability within government.-
Seventh, is the need for America to take a
stand on whether or not every person is to
be numbered from cradle to grave, and if so
whether or not that number is to be the
social security number. Until now, the idea
of a universal standard identifier has been
merely discussed in philosophical terms, but
the need to reduce people to digits for the
computer age has prompted wide govern-
ment use of the number for identifying in-
dividuals in government files. Private indus-
tries, businesses and organizations have fol-
lowed suit to the dismay of many people who
have registered strong complaints against
this practice with the Subcommittee. They
were supported by the findings of a Social
Security Task Force which reported in 1971
that :
"The Increasing universality of the Social
Security Number in computer data collec-
tion and exchange presents both substantial
benefits and potential dangers to society;
and that in order to maximize the benefits
and minimize the dangers, there needs to be
developed a national policy on cQmputer
data exchange and personal identification in
America, including a consideration of what
S 10259
safeguards are needed to protect individuals'
rights of privacy and due process." "
In outlining the areas In which state legis-
latures and the Congress must make impor-
tant judgments, this Task Force stated:
"Defining the proper role of the Social Se-
curity Number in society requires that broad
social judgments ? be made first about the
desirability of large-scale computer record-
keeping in various settings; second, about
the kinds of data necessary and appropriate
to record about individuals within a given
setting; third, about the safeguards needed
to insure that the computer is being used
within a given setting in ways that protect
fundamental human rights; and fourth,
about the desirability of any kind of uni-
versal Identification system in terms of its
psychological impact on the individual citi-
zen." 0 4
SUMMARY
From the Subcommittee study of privacy
and government data banks one conclusion
is undeniable. This is that the extensive use
of computerized systems to classify and ana-
lyze men's thoughts, speech, attitudes, and
lawful First Amendment behavior raises seri-
ous questions of denial of substantive' due
process to our entire society. To try to con-
dense the truth about what men believe and
why they believe is a futile exercise which
can lead to. that tyranny over the mind
against which Thomas Jefferson swore eter-
nal hostility. Without grave dangers to our
constitutional system, we cannot permit
government to reduce the realities of our po-
litical life and the healthy traffic in our
marketplace of ideas to,marks on magnetic
tapes and data on a microfilm.
Professor Robert Boguslaw ^ 6 eloquently de-
scribed the dangers posed by this "technol-
ogy-screened power" when he wrote that
"the specification of future and current sys-
tem'states' within this orientation charac-
teristically requires an Insistence upon a uni-
formity of perspective, a standardization of
language, and a consensus of values that is
characteristic of highly authoritarian social
structures. Nonconforming perspectives, lan-
guage, and values can be and, Indeed, must
be excluded as system elements."
He further points out certain engineering
truths and certain human truths which face
every politician, administrator, analyst and
programmer who tries to use computers to
convey either more or less than the straight
facts about people. First is the truth that
the strength of high-speed computers is pre-
cisely in their capacity to process binary
choice data rapidly. But to process these
data, the world of reality must at some point
in time be reduced to binary form. Second
is the truth "that the range of possibilities
is ultimately set by the circuitry of the com-
puter, which places finite limits on alterna-
tives for data storage and processing." Third
is the truth "that the structure of the lan-
guage used to communicate with the com-
puter restricts alternatives." Then there is
the truth "that the programmer himself,
through the specific sets of data he uses in
his solution to a programming problem and
the specific techniques he uses for his solu-
tion, places a final set of restrictions on ac-
tion alternatives available within a com-
puter-based system."
It is in this sense that computer pro-
grammers, the designers of computer equip-
ment, and the developers of computer lan-
guages possess power in our society.
These limitations of men as well as ma-
chines are what I remembered as I listened
to the young Army analyst describing his
assignment to condense truth for the Army
data systems by assigning numbers to peo-
ple on the basis of their speech and
thoughts "
On the shoulders of technology' experts
who are aware citizens rests the responsibil-
ity for guiding those politicians who seek
computer-based solutions to political prob-
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10260
CONGRESSIONAL RECORD - SENATE June 11, 197'4
lenis. At this point Inour history, they, more
thin anyone, realize that computers have
only those values which are designed and
programmed into them.
li the attitude of the present Administra-
tion is any indication, Government will make
increasing use of computer technology in
pursuit of its current claim to an inherent
power to investigate lawful activities and to
label people on the basis of their thoughts.
Municipal, state and federal agencies con-
tinue to plan, devise and build intelligence
systems for many purposes. It devolves on
those people involved in computer technol-
ogyto make known the restrictions and the
limitations of the machines as well as the
alternatives for what is proposed. When the
political managers ignore or abdicate their
responsibility to assure the application of
due process of law, they may have the final
say over the constitutional uses of power.
What they say may not be popular with
those who use their services, especially gov-
ernment departments. But I would suggest
that when they advise on extending the
power of government, they serve a higher
law--the Constitution.
The technologicalforces which affect the
quality of our freedoms come in many guises
and under strange terminology. They are
dreamers who would decry the advent of
the computer as casting some sorcerer's
shn.dow across an idyllic land. In their phil-
osophical rejection or fear of this most in-
tricate of machines, they would deny the
spark of divinity which is the genius of
man's mind; they would reject the progress
of civilization itself. So there is no reason
to condemn out of hand every governmental
application of computers to the field of in-
formation processing or to systems study.
Our society has much to gain from com-
puter technology. To assure against its po-
litical misuse, however, we need new laws
restricting the power of government and
implementing constitutional guarantees. We
need increased political awareness of an in-
dependent nature by information specialists
who understand the machines and the sys-
tems they constitute.
We do not, as some suggest, need new con-
stitutional amendments to deal with these
problems. The words of the original amend-
ments will do, because they envelop our na-
tional concepts of personal freedom and I
believe they can encompass anything which
jeopardizes that freedom.
As Justice Oliver Wendell Holmes said:
"A word is not a crystal, transparent and
unchanged; it is the skin of a living thought
and may vary greatly in color and content
according to the circumstances and the time
In which it Is used." 6 r
1 believe that Americans will have to work
harder than ever before in our history so
that the First Amendment remains a living
thought in this computer age. -
Otherwise, we may find the individual in
our society represented not by a binary form,
but by one digit.
And that will be "zero."
Otherwise, America may lose its cherished
reputation as "the land of the Second
Chance." -
FOOTNOTES
? C' S. Senator, North Carolina.
1 Based on an address before the Spring
Joint Computer Conference of the Federa-
tion of Information Processing Societies, At-
lantic City, N.J., May 20, 1971.
INVENTORY of AUTOMATED DATA PROCESS-
ING EQUIPMENT IN THE UNITED STATES FISCAL
YEAR 1971, GENERAL SERVICES ADMINISTRATION,
at 1.5. A report providing information on the
digi,al electronic computers installed
throughout the U.S. Government, which
de-Junes "computer', as a configuration of
ELPE components which includes one cen-
tra.l processing system concept which recog-
nizes the growing importance of configura-
tions with more than one central processi,,g
unit. This report responds to requiremei.*,s
of P.L. No. 89-306, Stat. (Oct. 30, 1965) and
S. Doc. No. 15 (1965), REPORT TO THE PRE:;I-
DENT ON THE MANAGEMENT or AUTOMA"'iC
DATA PROCESSING IN THE FEDERAL GOVERN-
MENT.
91970 NASIS REPORT, INFORMATION Svs-
TEMS TECHNOLOGY IN STATE GOVERNMENT
at 18, developed by the State of Illinois and,
the National Association for State Informa-
tion Systems, Council of State Govern-
ments.
4 See generally COMPUTERWORLD (a weel_iy
periodical servicing the computer commu-
nity) : DATAMATION: DATA MANAGEMENT; - and
BUSINESS AUTOMATION.
6 See, e.g., Brzezinksi, Between Two Ages,
America's Role In the Technotronie Era, al-
though all authors do not engage in such
distinctions with the same judgments or
purposes.
9 Hearings on Federal Data Banks, Compu-
ters and the Bill of Rights Before the Sub-
comm. on Constitutional Rights of the Sen-
ate Comm. on the Judiciary, 92d Cong, 1st
Bess. [Feb. 23-25 and Mar. 2-4, 9-11, 15 and
17 (1971)] [hereinafter cited as as 1971
Hearings.] Testimony of Robert Bigelow, at-
torney, describing concern of professional
computer organizations and press, id. at 680;
Bibliography, lists of public discussions on
privacy and computers in the United States
and abroad, id. at 692 et seq.; Testimony of
professor Caxton Foster, University of Mass.,
Department of Computer and Information
Sciences, id. at 707.
C For a sample of questionnaire sent to 1,1l
of accurate information, both before and
during disorder, has created special control
problems for police," and the recommenda-
tion that "Federal-State planning should en-
sure that Federal troops are prepared to pro-
vide aid to cities.. , ."
The Department also cited a report filed
by Cyrus Vance following the Detroit 1967
disturbances. 1971 Hearings, at 378.
For law enforcement reliance on the Ker-
ner Commission and similar commissions,
see e.g., testimony of Richard Verde for the
Law Enforcement Assistance Administration.
1971, Hearings. at 608:
Several States also developing with LEAA
funds information systems related to civil
disorders. Most of these systems have as their
objective either tension detection and fore-
casting or providing support to tactical units.
It should be noted that the Kerner Commis-
sion studied this problem carefully and ree-
oinmended that the police develop adequate
intelligence for tension-detecting as well as
on-the-scene information for tactical units.
Many of the systems LEAA supports in the
civil disorders area arose out of the recom-
mendations of the Kerner Commission and
similar commissions established by the
States.
For reliance on Warren Commission find-
ing of information gaps, see response to Sub-
committee questionnaires by the Secret
Service, Nov. 21, 1969, reprinted at 115 Cox-TG.
Rea. 39,114 (1969), and by the State Depart-
ment Jan. 4 and Mar. 10, 1970; both responses
in Subcommittee file.
i8 Response to questionnaire, in Subcom-
mittee files, Mar. 25, 1971.
agencies and departments with slight alter-
19 Id. Aug. 18,
1970.
ations, see Letter to Secretary of
Defense
$9 Id. June 22,
1970.
Melvin Laird, July 20, 1970 1971
Hearings
Id. May 28,
1970.
at 1182, and to Attorney General Mitchell,
June 9, 1970. Id. at 1212.
6 See, eg., State Department response to
questionnaire, concerning its "Lookout File."
See Letter of Sept. 9, 1970 to Subcommittee
Chairman from Assistant Secretary of De-
fense Robert Moot, and list of classified en-
closures, 1971 Hearings at 1186.
9 Navy Department response, Aug. 13, 1970,
citing a Roosevelt Executive memorandum
assigning responsibilities for intelligence ac-
tivities. Id. at 1201.
SO Department of Transportation response.
Testimony of Secretary Volpe. Id. at 720.
Many other agencies will inform the individ-
ual of the general contents of his file, if he
is denied some right, benefit or privilege and
regulations permit a hearing or right of con-
frontation or cross-examination-but not
before.
u Department of Health, Education, and
Welfare, series of letters over a two year
period on file with Subcommittee, and as of
March, 1972, no response has been received
containing substantive answers.`
>a Directive, ICGP-G-S3, Jan. 9, 1971, Re-
lease of Official Information to Legislative
Branch of Government. 1971 Hearings, at
1179.
13 Ervin, Secrecy in a Free Society, 213 NA-
TION 454 (1971). See generally Hearings on
Executive Privilege Before the Subcomm. on
Separation of Powers of the Senate Comm.
on the Judiciary, 92d Cong., 1st Bess. (1971).
Testimony by Senator Tunney at 381 and
William Rehnquist at 420.
14 5 U.S.C. ? 552 (1970).
15 See, e.g., 1971 Hearings, at 375, 431, 385.
Testimony of Assistant Secretary of Defense
Froehike. Id. at 602, 599; testimony of As-
sistant Attorney General Rehnquist, note 13,
supra.
-See, e.g., Justice Department response to
Subcommittee questionnaire.
17 For Defense Department reliance on the
findings of the National Advisory Commis-
Sion-on Civil Disorders (Kerner Commission),
see testimony of Assistant Secretary of De-
fenseFroehlke, 1971 Hearings, at 379; noting
the Commission's finding that the "absence
22 Id. Jan. 4, 1970.
23 Id. Aug. 1970. See also 1971? Hearings, at
375, Froehlke testimony on this and other
Defense Department records systems.
u Response to questionnaire, Feb. 22, 1972.
See also 12 U.S.C. ? 1811 et seq. (1964).
Amendments to Federal Deposit Insurance
Act, requiring bank recording and reporting
to Internal Revenue Service transactions, S.
REP. 91-1139 and H.R. REP. 91-975.
26 See note 23 supra.
26 Response to Subcommittee question-
naire, Aug. 1970. Also described in Froehlke
testimony, note 23, supra and in Army Un-
dersecretary Beal letter of Mar. 20, 1970, re-
printed in 1971 Hearings, Part II at 1051, and
SID 116 CONG. REc. 26327-51 (1970).
01 For descriptions and citations to sup-
porting statutes and regulations, see re-
sponse to Subcommittee questionnaires,
1971 Hearings, Part II at 1312-68. See also
d+scussion in testimony of Justice Depart-
ment officials. Id. Part I at 597, 849.
28 For descriptions and summaries of
some of these complaints and concerns. Re-
marks of Senator Ervin, 116 CoNG. REc. 30,-
797, 41,751, 43,944 and 117 CoNG. REc. S. 985
(daily ed. Feb. 8, 1971). In particular, note
opening statements by Subcommittee Chair-
man each day of 1971 Hearings outlining is-
sues of concern for the day. Of interest here
is a Dec. 1971 report, A National Survey of
the Public's Attitude Toward Computers,
sponsored by the American Federation of
Information Processing Societies and TIME
MAGAZINE noting that:
There is major concern about the use of
large computerized information files. Thirty-
eight percent of those surveyed believe com-
puters represent a real threat to people's
privacy as opposed to fifty-four percent who
disagreed. Sixty-two percent are concerned
that some large organizations keep informa-
tion about millions of pepole. In addition,
fifty-three percent believe computerized in-
formation files might be used to destroy in-
d;vidual freedoms; fifty-eight percent feel
computers will be used in the future to keep
people under surveillance; and forty-two
percent believe there is no way to find out if
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974
CONGRESSIONAL RECORD - SENATE
information about you stored in a computer
is accurate. In general, the public believes
government should make increased usage of
computers In a number of areas, that such
usage will make government more effective,
and, that there will, and should be, Increas-
ing governmental involvement in the way
computers are used.
29 Letter, identity withheld, in Subcommit-
tee files with comment by the Director of the
Federal Bureau of Investigation.
00 28 C.F.R. ? 0.85 (b); codifying rulings
by the Attorney General pursuant to 28
U.S.C. ? 534 which provides:
(a) The Attorney General shall-
(1) acquire, collect, classify, and preserve
identification, crime and other records; and
exchange these records with, and for the
official use of, authorized officials of the Fed-
eral Government, the States cities, and penal
and other institutions.
(b) The exchange of records authorized by
subsection (a) (2) of this section is subject
to cancellation if dissemination is made out-
side the receiving departments or related
agencies.
(c) The Attorney General may appoint
officials to perform the functions authorized
by this section.
"Morrow v. District of Columbia, 417 F.
2d 728 (D.C. Cir. 1969). For a summary of
case law on this subject, see Longton,.
Maintenance and Dissemination of Records
of Arrest Versus the Right to Privacy, 17
WAYNE L. REv. 995 (1971).
ffi Menard v. Mitchell, 430 P.2d 486 (D.C.
Cir. 1970), decision upon remand, 328 F.
Supp. 718 (D.D.C. 1971). The Court con-
strued 28 U.S.C. ? 534 narrowly to avoid the
constitutional issues raised by Menard and
found that:
It is abundantly clear that Congress never
intended to, or in fact did, authorize dis-
semination of arrest records to any state or
local agency for purposes of employment or
licensing checks.
It found certain faults with the present
system: (1) State and local agencies receive
criminal record data for employment pur-
poses whenever authorized by local enact-
ment, and these vary state by state and local-
ity by locality. (2) The Bureau cannot pre-
vent improper dissemination and use of the
material It supplies to hundreds of local agen-
cies. These are no criminal or civil sanctions.
Control of the data will be made more difficult
and opportunities for improper use will in-
crease with the development of centralized
state information centers to be linked by
computer to the Bureau. (3) The arrest rec-
ord material is Incomplete and hence often
inaccurate, yet no procedure exists to enable
individuals to obtain, correct or supplant the
criminal record information used against
them, nor indeed is there any assurance that
the individual even knows his employment
application is affected by an FBI fingerprint
check.
The Court Invited Congressional action,
noting that: with the increasing availability
of fingerprints, technological developments,
and the enormous increase in population,
the system is out of effective control. The
Bureau needs legislative guidance and there
must be a national policy developed in this
area which will have built into it adequate
sanctions and administrative safeguards.
90 Congressional response to the District
Court's invitation has taken several forms,
among them, a bill, S. 2545, introduced, but
not acted on, to authorize the Attorney Gen-
eral to exchange criminal record information
with certain state and local agencies. Re-
marks by Senator Bible, S. 14558, 117 CONG.
REc. (daily ed. Sept. 20,1971); and an amend-
ment to the Department of Justice Appro-
priation Act of 1972 temporarily restoring
the power over arrest records limited by the
Menard decision. 117 CoNC. REc, S. 20461
(daily ed. Dec. 3, 1971). House Judiciary Sub-
committee No. 4 on Mar 18 began hearings
on H.R. 13315, a bill introduced by Rep. Ed-
wards, "to provide for the dissemination and
use of criminal arrest records in a manner
that insures security and privacy."
A related, but more comprehensive bill,
S. 2546, was introduced by Senator Hruska
on Sept. 20, 1971, 117 CONC. REc. (daily ed.)
to insure the security and privacy of crim-
inal justice information systems. This is
termed the Attorney General's response to
an amendment to the Omnibus Crime Con-
trol Act of 1970, 18 U.S.C. J? 351, 1752, 2516,
3731 (1964), requiring the Law Enforcement
Assistance Administration to submit legis-
lative recommendations to promote the in-
tegrity and accuracy of criminal justice data
collection. LEAA demonstrated a prototype
computerized system for exchange of crim-
inal history information with the states, a
project known as SEARCH-System for
Electronic Analysis and Retrieval of Crim-
inal Histories. In Dec. 1970, Project SEARCH
was turned over to the FBI for the develop-
ment of an operation system to be part of
the National Crime Information System. The
bill deals with criminal offender record in-
formation as well as criminal intelligence
information.
A discussion of the philosophical, consti-
tutional and legal issues and problems re-
lated to such a computerized system is found,
with bibliographies, in Security and Privacy
Consideration in Criminal History Informa-
tion Systems, Technical Rept. No. 2, July,
1970, by Project SEARCH, California Crime
Technological Research Foundation, funded
by the Law Enforcement Assistance Admin-
istration, Department of Justice. Also per-
tinent is the testimony of LEAA officials on
the use of information and intelligence sys-
tems by criminal justice agencies. 1971 Hear-
ings, on the National Crime Information
Center. Id. at 914.
For a model state act proposed for crim-
inal offender record information, See gen-
erally Technical Memorandum No. 3, May,
1971 by Project SEARCH.
As we have a highly mobile population, so
we have a highly mobile criminal population,
which requires that governments be able to
share rapidly the information in their data
banks in the interest of law enforcement.
The problem is determining what agencies
and what officials should control what in-
formation.
14 See 1971 Hearings at 493-530. Testimony
of Joseph Alioto, Mayor of San Francisco,
and exhibits submitted. For response of Jus-
tice Department officials, see testimony of
William Rehnquist, id. at 604, 878-88, and a
series of memoranda from the Federal Bu-
reau of Investigation, the Bureau of Narcotics
and Dangerous Drugs, which memoranda
were submitted by Assistant General Rehn-
quist with the caveat that.
Under the traditional notions of separa-
tion of powers, it seems to me probable that
the Department could justifiably decline to
furnish portions of this information ... Id, at
1371,
sr 1971 Hearings, Part II at 1375. In his
memorandum of Mar. 5, 1971, the Director of
the Bureau of Narcotics and Dangerous Drugs
noted" . . . it is possible that the documents
or information in these four exhibits could
have been passed to the LOOK reporters by a
BNDD employee." He cites BNDD Order 0-98,
May 27, 1970 as the Bureau's current public
information policy and as essentially a re-
statement of 28 C.F.R. Pt. 50, ? 50.2, which
covers the dissemination of most types of in-
formation for the Department. However, he
states that the strongest applicable regula-
tions in this matter are found in 28 C.F.R. Pt.
45, ? 45.735: "No employee shall use for finan-
cial gain for himself or for another person, or
make any other improper use of, whether by
direct action on his part or by counsel, rec-
ommendation, or suggestion to another per-
S 10261
son, information which comes to the em-
ployee by reason of his status as a Depart-
ment of Justice employee and which has not
become part of the body of public informa-
tion."
Obviously, the disclosure of documents
stamped "For official use only" would be con-
trary to this regulation if, in fact, the dis-
closures were made by Department of Justice
employees.
as For statement submitted by a Special
Agent of Military Intelligence and related
correspondence, see 1971 Hearings, Part II at
1451-1457.
aI See generally Hearings on Psychological
Tests and Constitutional Rights Before the
Subcomm. on Constitutional Rights of the
State Comm. on the Judiciary, 89th Cong.
1st Bess. (1965) and Hearings on S. 3779 on
Privacy and the Rights of Government Em-
ployees, 89th Cong., 2d Bess. (1969).
08 See 1966 Hearings, supra note 37. In con-
nection with a proposal introduced to pro-
tect the consttiutional rights of employees
of the executive branch and to prevent un-
warranted governmental invasion of their
privacy, see Senate remarks of Senator Ervin
including discussion of need for law pro-
hibiting requirements to reveal Information
on race, religion, national origin, personal
family relationships, sexual attitudes and
conduct and religious beliefs and practices
in 112 CONC. REc. 16081, 18634 (1966), 113
CONC. REc. 4039, 10663, 27994 (1967), 114
CONG. REc. 11235, 17161, 19613 (1968),
115 CONE. REC. 2343, 117 CONG. REC.
(daily ed. Apr. 1 and May 11, 1971). By such
legislation, government may be prevented
from intruding into protected First Amend-
ment areas on subjects which should have
nothing to do with the operation of a civil
service merit system. By exclusion of such
sensitive, subjective Information from the
computer systems, initially, government will
be precluded from basing individual or gen-
eral social judgments on outdated standards,
changing mores, variants In ethnic, cultural
or geographical backgrounds, or previous
conditions of the individual's mind, heart,
and personality. It will necessarily be con-
fined to a consideration of current informa-
tion relevant and pertinent to the problem
at hand.
00 See generally Hearings on S. 1791 and
Privacy, the Census and Federal Question-
naires Before the Subcomm. on Constitu-
tional Rights of the Senate Judiciary Com-
mittee, 91st Cong., 1st Sess. (1969) and hun-
dreds of letters and complains about coer-
cive statistical questionnaires. Appendix also
contains judicial, legal and constitutional re-
search materials as well as examples of many
social and economic questionnaires. See also
Pipe and Russell, Privacy: Establishing Re-
strictions on Government Inquiry, 18 AMER.
UNrv. L. REV. 516 (1969). For a summary of
the hearings, see Senate remarks of Senator
Ervin, 115 CONC. REc. 17718 (1969). For pos-
sible political uses of such information ac-
quired as economic and social indicators, see
Report by House Government Operations
Committee, Subcommittee on Government
Information, on Department of Labor brief-
ings on economic statistics; and 23 WESTERN
POL, Q. 235 (1970). See also the finding and
recommendations on privacy and confiden-
tiality of the PRESIDENT'S COMMISSION ON
FEDERAL STATISTICS (1971).
40 See 1969 Hearings, supra note 39, testi-
mony on behalf of the National Federation
of Independent Business at 199, of attorney
and farm owner William Van Tillburg at 74,
W. Schliestett, businessman at 66, J. Can-
non, attorney at 7,263.
61 id. at 830. Table of Census surveys of
population and households, conducted for
other government agencies, with indication
of penalties and compliance techniques. In
many of these, the data Is kept on tape or
film by both the Census Bureau and the
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10262
CONGRESSIONAL RECORD - SENATE June 11, 1974
sponsoring agency, and the confidentiality
rules of the sponsoring agency apply.
42 Id., at 251. Assistant Secretary of Com-
merce Chartener:
Assistant Secretary of Commerce Ca,ta-
vErvs a. The wording deliberately has been
rather subtle in its form. We never use the
word "mandatory" on a questionnaire. In-
stead, people will be told that "your answer
is required by law." In other cases, they may
be told that a survey is authorized by law or
it Is important to your government or some-
thing of that sort. Now, the followup pro-
cedure is used not for purposes of coercion
but rather in order to verify the correctness
of an address.
Senator ERVIN. Do you not agree with me
that such a procedure Is designed to Implant
In the mind of the recipient of these ques-
tionnaires the impression that he is re-
quiredby law to answer them?
Mr. CHARTENER. If it is a mandatory ques-
tionnaire that would bethe case. In other in-
stances, the repeated mailings which may go
up to five or may involve telephone calls or
even a personal call are simply a means of
emphasizing the importance that the Gov-
ernment feels in getting this response . .
The Department of Commerce opposed en-
actnient of a simply-worded statute advising
people that their responses to these statis-
tica.; questionnaire were voluntary. Id. at 282.
Senator ERVIN. Would the Department of
Commerce and its Bureau of the Census be
opposed to enactment of Federal statutes
which would require that the Bureau of the
Census advise every citizen on a question-
naire sent out by the Bureau that where it
Is not required by law, not mandatory, this
is an effort to elicit information desired by
the Government on a voluntary basis?
Mr. CHARTENER. Senator, I think we would
oppose that. This Is a matter of rather subtle
psychology. I do not think, personally, and
this is the position of the Department, that
we ought to go out of our way to ten people-
they do not need to bother filling out this
questionnaire. .
Serrator Exvne. You think the statutes gov-
erning those questionnaires, which are man-
datcrrv and which are subject to the criminal
penalty if not answered readily, are under-
standable by the average layman?
Mr. CHARTENER. I do not think any law 19
written to be readily understandable by the
average layman. That is why we have lawyers,
That compare the testimony of the Secre-
tary of the Department of Health, Education,
and Welfare in the 1971 Hearings at 788, op-
posing legislation, but favoring administra-
tive notice of voluntariness for that Depart-
mert's forms.
53 1.15 CoNG. REC. 3356 (1969) and guidelines
printed there. See also note 17, supra, corre-
spondence and guidelines printed at 1541,
1971 Hearings, Part II. See remarks of Rep.
Stanton, 118 CoNG. REc. at H208 (daily act
Jan.. 24, 1972) [Complaints Against Secret
Service].
!* le=tter in Subcommittee files.
.vF-e Department of the Army Civil Dis-
turbance Information Collection Plan, May 2,
196, collection priorities and requirements
and distribution list for government agen-
cies. Printed in 1971 Hearings at 1126, 1138.
Tht; ?clan also appears with remarksof Sena-
tor Payh, 117 CoNG. REC. 2290 (dally ed,
Mar. 2, 1971).
K" Letters in Subcommittee files (identities
withhold).
' Utter of Inquiry from Subcommittee
Chairman, July 6, -1971, citing the large num-
ber of reasons for which a person can receive
an administrative discharge, ranging from
family hardship to national security grounds,
the inadequate procedures and safeguards
surrounding such discharges, and the threat
to individual freedom from unrestricted re-
porting of law-abiding citizens, who may be-
come subjects of official surveillance through
no fault of their own or of the Secret Service.
dAThis December 14, 1965 agreement be-
' ween the Defense Department and theSe-
r;ret Service was Implemented within the
:)Tavy Department by SECKAV Instruction
5500.27, 18 March 1966, which contains 5
copy of the agreement. Administrative au-
f2iority for this regulation is cited as Defense
:9ept. Directive 5030.34, dated 30 Dec. 196:?;
+rtatutory authority for assistance to the SE.-
oret Service is cited as P.L. No. 90-331 (June
+3, 1W) which provides for assistance to the
iaecret Service on request.
'P Appendix B of Agreement. Under Appen-
1lix A, identification data, photograph, physi-
oal description, date and place of birth, em,.
:$Loyment, marital status and identifying
]lumbers are to be furnished, together witls
nmmmarles or excerpts from DOD files as ap-
plicable to an individual or group reported.
In a related exchange of correspondence,
'he Subcommittee Chairman, in response tD
complaints, directed an Inquiry to the Secre-
szry of the Navy, on April 22, 1970 about a
:Qavy directive which required that In any
,we where enlisted personnel were to be sap-
irated, under other than honorable conditior,:r
Within the continental United States, local
civil police authorities were to be notified i_
advance of the name, race, sex and place and
-late of birth of the person, and of the time
and place such separation Is to be effected..
This regulation seemed to serve no useful
:'unction since the Army and the Air Force
:'unctioned without one. On may 7, 1970, the
:'.Navy Department notified the Subcommittee
!drat they concurred in this view and woul?U
delete the reporting requirement, (Corre-
upondence in Subcommittee files.)
r For legal and constitutional implications,
is well as a comprehensive historical sccoun+;,
++ee testimony of Christopher Pyle, an attor-
:ley and former Captain in Army Intelligence.
See 1971 Hearings at 147, and exhibits provid-
ng examples of nation-wide military sur-
'Feiilarrcec
See E7roin, Privacp and Governmental In-
uuestigations, 1971 Urivv. ILL. L. FoxuM 137
11971) for an account of the various plans
card their lack of relevance to the problem of
Putting down civil disturbances, and for
analysis of the Defense and Justice Depart.
rent's claims to constitutionality for the
actions of the military. Texts of four "plans,"
.971 Hearings at 1123 1119, 1154, 1781.
Memorandum at 1129. 1141, 1278-98, showing
attempts by civilians to cut back on the pro-
as The bulk of investigative activity by the
Army's own personnel occurred at the field
level. Agents collected Information and filed
"spot reports,- -agents reports." and "sunt-
rnartes of investigation." Most of this data
was forwarded up the chain of command but
record copies were kept in data centers at
every level of command. Manual files .were
maintained at every leveL At least four and
possibly more computer systems were em-
ployed to store, analyse and retrieve the in-
formation collected. Many files on lawful
ritizen:s were microfilmed and integrated
with other flies on persons who were suspect-
ed of violations of security and espionage
laws. These computer systems were located
in the headquarters of the Intelligence Com-
mand (Fort Holabird), the Continental
Army (Fort Monroe), the Third Army Corps
Fort Hood), and in the Pentagon. More than
one computer data bank was maintained in
come of these locations. (Subcommittee in-
? restigation. )
sr Testimony of Ralph Stein on the difficulty
of labeling young people on the basis c f
their speech, when a difference of one digi';,
was the difference between a communist and
ai non-communist. 1971 Hearings at 248, 260.
See Brief for Respondents filed in Ta-
'um v. Laird in the Supreme Court of the
United States, No. 71-288, challenging the
Army's surveillance program, and arguing
that plaintiffs' claims are justifiable and ripe
for adjudication; that the present inhibiting
effect on the exercise of First Amendment
rights creates a justiciable controversy; that
the justiciability of their claims is enhanced
because the military exceeded its constitu-
tional and statutory authority and Intruded
into civilian affairs; that they have standing
to adjudicate these claims for themselves
and the claims of others similarly situated;
and finally, that they argue that their case
cannot be mooted by the Army's assertion
that its domestic surveillance activity has
been reduced. The appendix contains an in-
teresting and landmark study of the chilling
effect of overbroad governmental programs on
First Amendment activity from the social
science view.
All of the plaintiffs named have been sub-
jects of political surveillance, and an are be-
lieved to be subjects of reports, files, or dos-
siers maintained by the Army.
In an amid brief filed by Senator Ervin
on behalf of the Unitarian Universaijat Asso-
ciation, the Council for Christian Social Ac
tion, United Church of Christ, the American
Friends Service Committee and the National
Council of Churches of Christ, the question
posed for review is framed as follows:
Do individuals and organizations not af-
filiated with the armed services present a
Justiciable issue under the First, Fourth,
Fifth and Ninth Amendments when they ai-
lege that their rights of free expression, pri-
vacy and association have been infringed by
unauthorized, unnecessary and Indiscrimi-
nate military investigations of their political
'activities and personal lives? Brief for Re-
spondents as amicus curiae at 7, Laird v.
Tatum, No. 71-288 (1971).
F,ssenitial though the freedoms are,_they are
not easily exercised in a climate of fear, dis-
cord, and dissension, especially when the
ideas being expressed are those which are
displeasing to government and unsettling to
the majority of citizens.... It is as such a
time that the First Amendment is most
necessary, most in danger, and most difficult
to exercise.... The First Amendment how-
ever, was made for the timid as well as for
the brave. While government cannot instill
courage in the meek, It may not take ad-
vAntage of a climate of fear to undertake
a program which has the effect of restricting
the First Amendment only to the very cour-
ageous. Government action, such as military
surveillance, seemingly innocuous In the ab-
stract, has the very real effect of suppres-
sing the exercise of the First Amendment.
The coercive power of this government ac-
tion lies in the national climate of fear and
doubt, and in the very real, tangible appre-
hension of some unknown form of retribu-
tion by government on those who it fears
and therefore watches. That such apprehen-
sion exists in America today is manifest. Id,
at 15.
&' 1971 Hearings at 765.
6" See exchange of correspondence on this
subject. Id. Part II at 1046 A, 1180 Indices to
letters.
5 Id. at 597, 849.
s" Id. at 616-92.
aS. 1791, 91st Cong., 1st Bess. (1969).
5' Senate remarks of Senator Ervin, 117
COND. REC. (daily ed. June 24, 1971.)
81 See S. Rep. 92-554 for legislative history
(Now pending before the House Post Office
and Civil Service Committee with House ver-
sions).
1971 Hearings at 782 (complaints read
into the hearing record by the Chairman).
ex SOCIAL SECURrrY NuMHES TASK FORCE RE-
roar to the Commissioner 17 (May, 1971).
ea Id. at 15.
It is clear that If the SSN became the sin-
gle number around which all or most of an
individual's interactions with society were
structured, and if practices of the sort we
have been discussing were to continue, the
individual's opportunity to control the cir-
curnstances under which information about
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974
CONGRESSIONAL RECORD - SENATE
himself is collected and disclosed would be
greatly circumscribed.
cr, See BOGUSLAw, THE NEW UTOPIANS (1965),
especially the chapter entitled The Power of
Systems and Systems of Power at 181, 186,
190. I would dispute his observation of some
years ago that people in the information-
processing profession "are scientists and en-
gineers-objective experts whose only con-
cern is technical efficiency and scientific de-
tachment." Id. at 198. It is indeed true, how-
ever, that: to the extent that customers (and
this may include government agencies or pri-
vate industry) abdicate their power preroga-
tives because of ignorance of the details of
system operation, de facto system decisions
are made by equipment manufacturers or
information-processing specialists. Id. at 198.
Implicit in the various issues raised during
the Subcommittee Hearings is the wise ob-
servation of Professor Boguslaw that:
The paramount issues to be raised in con-
nection with the design of our new comput-
erized utopias are not technological-they
are issues of values and the power through
which these values become translated into
action. Id. at 200.
In this case, I believe it is the constitu-
tional value protected by the First Amend-
ment.
8e See note 53 supra.
?' Towne v, Eisner, 245 U.S. 418, 425 (1918).
COMPUTERS AND PRIVACY: A PROPOSAL FOR
SELF-REGULATION
(By Edward J. Grenier, Jr.*)
In framing the issues in its landmark
Computer Inquiry, the Federal Communica-
tions Commission cited the critical impor-
tance of the preservation of Information
privacy:
"Privacy, particularly in the area of com-
munications, is a well established policy and
objective of the Communications Act. Thus,
any threatened or potential invasion of pri-
vacy is cause for concern by the Commission
and the industry. In the past, the invasion
of information privacy was rendered difficult
by the scattered and random nature of in-
dividual data. Now the fragmentary nature
of Information is becoming a relic of the
past. Data centers and common memory
drums housing competitive sales, inventory
and credit information and untold amounts
of personal information, are becoming com-
mon. This personal and proprietary informa-
tion must remain free from unauthorized
invasion or disclosure, whether at the com-
puter,, the terminal station, or the inter-
connecting communication link." 1
Congress, too, has demonstrated an in-
creasing concern with the possible threats
to individual privacy which might result
from the establishment, by the. federal gov-
ernment or by private industry, of a national
data bank? In fact Paul Baran of Rand
Corporation, testifying several years ago be-
fore a congressional subcommittee, stated
that the United States Is unconsciously mov-
ing toward an integrated, nationwide, auto-
mated information system:
"My thesis Is this: Today we are already
building the bits and pieces of separate au-
tomated information systems in both the
private and government sectors that so
closely follow the pattern to the present in-
tegrated communications structure that a de
facto version of the system you are now pon-
dering is already into the construction phase.
It is in many ways more dangerous than
the single data bank now being considered." 8
Although the threat posed by automated
information systems to the privacy of indi-
viduals is perhaps the most dramatic aspect
of the "computer revolution," another very
important aspect Is the possibility of unau-
thorized disclosure of proprietary data. The
"privacy problem" in both of these contexts
is most acute where the separate proprietary
data of a large number of businesses or sen-
sitive personal information about thousands
of individuals is stored or processed In multi-
programmed, time-sharing data processing
systems and transmitted to and from the
processing and storage units over common
communications lines. In such systems, there
exists at numerous points a high potential
for "information leakage," including leakage
due to hardware and software failures and
wire taps 4
In addition to examining both of these
aspects of the privacy problem from the point
of view of the computer system operator,
this article proposes the establishment of a
logical legal framework which would serve
the public interest by assuring, first, that
computer systems which handle sensitive in-
dividual or proprietary data will meet certain
minimum standards established for the pro-
tection of privacy, and, second, that computer
system operators will be able to continue to
operate in a competitive economy unhindered
by either overly restrictive governmental
regulation or the fear of private legal lia-
bility. The analysis and suggestions herein
set forth are relevant to all types of com-
puter systems which store information or
use computer porgrams belonging to persons
or entities other than the computer system
operator or which collect and store informa-
tion about private individuals .5
The computer industry, which when viewed
in its broadest significance extends from
manufacturers of main frame hardware to
computer service bureaus and computerized
information services, should now cooperate
with the communications industry to adopt
and implement, under the auspices of the
federal government, a comprehensive sys-
tem of self-regulation to ensure the privacy
and security of data. As a corollary of such
a scheme, computer systems complying with
the established standards 9 should be freed
from certain types of civil legal liability for
the unauthorized or accidental divulgence of
individual or proprietary information?
THE PRESENT LEGAL SITUATION: A STUDY
IN UNCERTAINTY
For the purpose of analyzing the present
S 10263
Although the number of possible varia-
tions is almost without limit, these four ex-
amples are sufficient to illustrate some of
the difficulties which computer service com-
panies may face.
From the point of view of the computer
service company, the first two examples pre-
sent issues of contractual or, possibly, tort
liability.9 The customer whose proprietary
data has been obtained without authority by
some third party might well have a claim
for breach of contract against the computer
service company. However, the results in
such a situation can be quite diverse. If the
computer service company is dealing with
large, sophisticated customers, service con-
tacts are likely to be thorough and well-
defined, specifying with detail the degree of
privacy and security of data promised by the
company and expected by its customer. On
'the other hand, if the computer service com-
pany's customers are small and perhaps less
sophisticated, the contract between them
may tend to be of the boiler plate variety
and may not contain provisions adequate to
protect the privacy and security of data. But
uncertainty, rather than a complete absence
of protection, is more likely to be the case.to
Unfortunately, the outcome in any specific
situation will depend upon the prevailing
business practices and governing standards
in the state involved.
Examples 3 and 4 squarely raise the issue
of the extent to which an individual's "right
of privacy" will be afforded legal protec-
tion?1 Although most privacy cases Involv-
ing the disclosure of individual information
are likely to arise as tort actions, situations
could arise in which an individual might
have a claim based upon the law of contract.
For example, assume that a computer service
company enters Into a contract with com-
pany X to store personal data concerning
some one thousand employees of X and to
furnish the data to X upon request. Assume
further that the contract includes specific
provisions for protecting the privacy of the
individuals involved. If the computer com-
pany breaches the contract by allowing In-
formation to fall into the hands of a third
person who uses it to the injury of the em-
computer, it will be helpful to consider a few
illustrative situations:
"1. Computer service company A operates a
multi-programmed, time-sharing, remote-
access data processing system. It services 25
customers scattered over a wide area, each
with at least one remote terminal device.
Each of A's customers stores at least one
proprietary program and a good deal of data
in A's system. Companies X and Y are com-
petitors and are both customers of A. Let us
suppose that company X has been able to
obtain confidential data belonging to Y at
X's remote terminal.
"2. Assume the same basic set of facts with
the exception that A has 500 customers, most
of which are very small.
"3. Company A runs a computerized in-
formation service containing personal data
about thousands of individuals, including
credit data, medical data, employment data,
and educational data. A offers this service to
carefully selected classes of subscribers, each
of whom promises to use the Information
for only circumscribed and legitimate pur-
poses.8 Company A's subscribers are linked
to its computer system by remote terminal.
Mr. X, a nonsubscriber, manages to "tap Into
company A's system and connect an unau-
thorized remote terminal, thereby gathering
information about a number of individuals.
The information so obtained is used in an
article which he publishes in a national
magazine.
"4. Assume the same facts as in example 3,
except that a programmer-employee of com-
pany A, without authority, extracts infor-
mation about some individual from the sys-
tem and sells such information to Mr. X."
covery against the computer service com-
pany as a third party beneficiary of the com-
puter service contract,
In most situations, however, an individ-
ual's claim that his privacy had been vio-
lated would have to be founded upon the
tort of invasion of or interference with pri-
viacy. Although of relatively recent judicial
recognition, 13 this tort has developed to the
point where one noted commentator has
been able to discern the existence of four
separate torts under the rubric "invasion of
privacy": 14 (1) unreasonable Intrusion upon
the seclusion of another or into his private
affairs;" (2) appropriation of an individual's
name or likeness;19 (3) unreasonable public-
ity given to another's private life, or public
disclosure of a private fact about an in-
dividual;17 and (4) publicity which places
another in a false light in the public eye.18
The tort doctrine regarding the protection
of privacy, in its present state of develop-
ment, quite possibly would not provide a
basis for a finding of liability against the
computer service company in either example
3 or 4, where we have assumed that the
computer company took no deliberate ac-
tion to injure the plaintiff. However, the law
of privacy has developed in response to the
changing conditions of society, and the ad-
vent of the computer age is almost certain to
result in a further judicial expansion of the
doctrine-perhaps with legislative help?9 Al-
though four states apparently still reject the
right of privacy in its entirety,20 judicial ex-
pansion of the doctrine continues. In Gris-
wold v. Connecticut,21 for example, the Su-
preme Court seemed to find, in a context
quite far removed from the fourth amend-
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S10264
CONGRESSIONAL RECORD - SENATE June 11, 1974
men, prohibition . against unreasonable
searches and seizures, a constitutionally pro-
tected right of privacy inherent in several
amendments"
of special significance is the recent New
York decision in Nader v. General Motors
Cart." which extended the Griswold ra-
tionale prohibiting the violation of a con-
stl rational right to privacy to invasions by a
private corporations, not the state. The court
implicitly found that state inaction-the re-
fusal by the state court to entertain a law-
suit alleging a violation by the corporation
of ',he plaintiff's constitutional right to
privacy-constituted sufficient "state ac-
tion' to invoke the protection of the four-
teenth amendment' If the holding in Nader
survives, the implications for the computer
industry could be far-reaching.-
There can be no doubt that the computer
seiv:ce industry, dealing as it does with
personal data on hundreds or thousands of
individuals, strongly affects the public in-
tereit. I Indeed, against the background of
ex-sanding computer services the need for a
farther extension of the doctrine of right of
privacy has been vigorously asserted?r Thus,
one commentator has recently noted that
"[]he concept of privacy held by most
courts, considered revolutionary during the
Warren-Brandeis era, seems more fitted for
the 19th century rather than the 20th; a
'new privacy' must be formulated to protect
the individual from the technological ad-
vances of the computer age."'" Another com-
mon tator recently advanced the thesis that
the fifth amendment prohibition against the
taking of private property by the government
without just compensation, applicable to the
states through the fourteenth amendment,
should be extended to a similar destruction
or diminution of the right of individual
privacy.'"' Furthermore, actions by large pub-
lie corporations which result in -a diminution
of an individual's privacy should be regarded
as equivalent to state action and therefore
subject to the payment of "just compensa-
tion." '? The growing tendency to extend the
bounds of privacy protection Is thus mani-
fest. "a If, because of their vast informational
storage and ready access capabilities, com-
puters and computer systems become gent
erally regarded as great potential threats
to the individual's right of privacy, it would
not be surprising to find courts holding
computer service companies liable for the
unauthorized disclosureof information about
an individual " Moreover, the court might
go beyond the traditional concept that the
defendant must be guilty of an intentional
or deliberate wrongdoing in order to be held
liable under an invasion of privacy theory
and hold computer companies liable for neg-
ligently permitting an unauthorized release
of information. Indeed, if the information Is
sennitive enough and the damage from re-
lease is devastating enough, a court might
be tempted to dispense even with the require-
ment of negligence and simply hold the com-
puter company absolutely liable for the un-
authorized release?" Whether the computer
company's failure is technological H or hu-
tv an, a' should make no difference.
'the law usually has evolved to keep pace
with changing social, political, moral, and
economic circumstances. For those who might
d'smiss as "mere speculations" the above
thoughts about the possible evolution of
the law of privacy in response to the com-
r, zter revolution, it would be instructive
to consider a statement by Professor Arthur
huller during a recent symposium on the
computer and privacy:
"The computer is a many-splendored ani-
mai. It is myopic to think of it as little more
than a high speed calculator with a gland
condition. It's much more than that. Modern
information transfer technology in time will
prove to be the heart of a new communica-
tions network, a communications network
that ciiliers from many of the communication
networks that we are familiar with, such as
telephones, telegraph, radio, television and
news,rapers, only in technological and media
terms Accordingly, the computer must be
dealt with as a communications network
"In short, I am suggesting that we .re
dealing with a problem of immense impo-t-
ance .... [ G ] iven the large stakes, we should
not think simply in terms of the ethical or
moral implications of-a National Data Center,
or any other type of a data center. We must
recognize that we are dealing with a new
technology, whose applications are just be-
ginning to be perceived and whose capacity
to deprive us of our privacy simply cannot
be measured in terms of existing systems or
assumptions about the immutability of the
technology.""
It is apparent that the legal protection
given to the right ofprivacy is far from staffic
and may, within the reasonably foresee', :le
future, undergo marked changes. However,
except insofar as the changes may be founded
noon federal constitutional doctrines, the
developing principles may vary markelly
from state to state because the basic law
involved will be state, not federal, law" Far
the computer service company, this could
mean facing different standards of liability
in fifty different jurisdictions for the un-
authorized disclosure of information-an rm-
happy prospect for companies who do a na-
tional or regional business.
At present, there Is no body of federal law
governing privacy which might "preemit"
state law as applied to computer systems.
After receiving the mart' detailed and
thoughtful comments in its Computer In-
quiry- and the analysis of the responses prep-
ared by the Stanford Rosearch Institute, as
well ,Ls the institute's own recommendations,
the FCC has decided that It must. await -'he
collection of additional Information before
decking whether to exercise its regulatory
authority in the area of privacy and security
of data during transmission and storage."
Although it did take a significant step in
the privacy area in Title III of the Omnibus
Crime Control and Safe Streets Act of 1968,"?
Congress has not acted decisively in this
area. In Title III, Congress (1) outlawed ,he
interception and disclosure of wire or oral
communications, except as specifically au-
thorl:eed in the statute pursuant to cor.rt
order: 4" (2) amended section 605 of the Corn-
munlcations Act of 19341 to take into -
-to-count the foregoing addition to the federal
criminal code; e and (3) established a "Na-
tional Commission for the Review of Federal
and State Laws Relating to Wire Tapping
and Electronic Surveillance," which is to
stud,, the entire wiretapping and electronic
surveillance situation and make a final report
within seven years .41 One interesting feature
of this act is that It gives a civil cause of
attic, a for damages to "any person whose wire
or oral communication is intercepted, dis-
closed, or used in violation of this chap-
ter...." 44 Although this provision for civil
dam:.ges in Title III will provide a new, and
perhaps potent, remedy to the individual
citizen in protecting his privacy, the remedy
reaches only one aspect of the privacy prob-
lem in data processing, and it certainly does
not in any way preempt the various provi-
sions of state law dealing with invasions of
privacy. First, the remedy Is limited only to
persons whose wire or oral communications 46
are intercepted, disclosed, sr otherwise used
in violation of the act. Thus, this rem,dy
on its face does not reach the problem of the
unauthorized disclosure of stored informa-
tion. about- an individual, which is not "cc,tn-
mur. icated" by the individual himself to
someone else?" Secondly, it is not entirely
clear whether the act's sanctions will even
reach the problem of interception of data
bein; transmitted to or from a data bank,
or the disclosure of such data after in;er-
ception. The term "intercept," as used in the
act, means the "aural acquisition of the con-
tents of any wire or oral communication
through the use of any electronic, mechan-
ical, or other device." w Query whether trans-
mitted data is subject to such "aural acquisi-
tion," at least In the case of data sent over
a special digital communications network
using time division multiplexing techniques;
query whether courts would reach different
conclusions depending upon the technical
nature of the communications network over
which the data traveled"
A RATIONAL SocurroN: SELF-REGULATION BY
THE COMPUTER INDUSTRY UNDER GOVERN-
MENTAL AUSPICES
It is estimated that by the late 1970s, the
traffic volume over the nation's telephone
network will be about equally divided be-
tween voice and data transmission" rep-
resenting a far greater use of the telephone
network for data transmission than at pre-
sent. By 1975 more than 60 percent of the
computer hardware used in the United States
will be tied into the public communications
system, and estimates for 1984 have run as
high as 90 percent! Thus, we are on the
verge of an explosion In remote access data
processing, including a great number of
time-sharing, real-time systems. The trends
in the law discussed above "t may well be ac-
celerated by the quickening pace of tech-
nological progress.
The choice Iles with the computer indus-
try. It can go along and let events unfold in
an unstructed, haphazard manner and there-
by permit others to fashion for it the basic
standards and rules governing the conduct
of its business, or it can itself initiate ra-
tional means to control its own destiny and
at the same time serve the public interest
by assuring privacy and security of data, in
both transmission and storage. In an indus-
try whose whole thrust is to bring rational
order out of the potential chaos unleashed
by the information explosion, the choice
seems clear. Working from the foundations
already laid, the computer industry should
pull together, develop, and then enforce
standards of construction and operation for
computer systems which process data of such
a nature that privacy or security are neces-
sitated.
Before detailing the mechanics of this pro-
posal it would be well to point out what is
not being proposed. The regulation contem-
plated would not deal with such matters as
the rates or prices to be charged by com-
puter service companies; the rate of return
they should earn, the terms and conditions
of their sales to their customers, or other
matters relating to traditional economic or
rate regulation H Rather, the industry, under
federal governmental auspices, would de-
velop standards to assure that computer sys-
tems will incorporate a reasonable degree of
privacy protection and Vill be operated to
achieve the desired degree of privacy and
security of data necessary in any given cir-
cumstances r"
Any program of self-regulation should in-
clude at least the following features:
1. The program should be specifically au-
thorized and established by federal statute,
a prerequisite which would avoid the anti-
trust problems that Inevitably arise where
competitors or potential competitors associ-
ate to formulate industry standards 64 Indeed,
the statute should grant a specific antitrust
exemption for activities within its scope.
2. Because the program is one of self-
Iegulation, some statutory mechanism
should be established to permit govern-
mental administrative review of regulatory
standards, upon the complaint of interested
persons, before they become effective. Such
a mechanism would provide customers and
potential customers of the computer service
industry, as well as private individuals, with
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974 CONGRESSIONAL RECORD - SENATE
an opportunity to express their views on pro-
posed standards.
3. An organization composed of representa-
tives of the computer industry should be
established to promulgate and enforce the
desired standards. Such an agency should be
specifically recognized and granted authori-
tative powers by federal statute, and its de-
cisions in promulgating standards and in
supervising the operations of the computer
service industry should be final, though sub-
ject to specific types of review by an appro-
priate ,government administrative agency m
and, ultimately, limited judicial review.'
4. The industry agency charged with prom-
ulgation and enforcement should have the
power of periodic inspection to assure com-
pliance with standards regarding the privacy
and security of data.
5. The agency should have specific power
at least to conciliate disputes between us-
tomers and computer service companies and
between Individual 'citizens and computer
service companies, arising from, or related
to, the standards formulated by the industry
agency' Perhaps such conciliation can be
made a 'condition precedent to the bringing
of any lawsuit involving the standards or
application of the standards
6. The -industry agency should, under
guidelines set forth in the federal statute,
establish a licensing or certification system
for computer systems which will handle In-
formation about Individual citizens or pro-
prietary data :belonging to persons or com-
panies other than the computer system op-
erator. Before any such computer system is
permitted to commence operation, It should
be required to obtain a license certifying
that the Industry standards for the protec-
tion of privacy and security of data have
been met. Such standards should cover not
only the technical aspects of the computer
system, but also the -qualifications of key
personnel having access to the system. In
connection with the licensing procedure, the
applicant should be required to show that
it has developed, and will use, appropriate
procedures to comply with the standards
and to assure that its key employees comply
with the industry's code of conduct. As noted
above, after initial licensing the industry's
agency should have continuing Inspection
powers to assure that the licensee complies
with industry standards. Again, both in con-
nection with initial licensing and any sub-
sequent industry proceeding brought to en-
force compliance with standards, there
should be review by the concerned govern-
mental agency and, ultimately, limited ju-
dicial review. In the event of proposed major
alterations in the system, a system licensee
should be required to go through a new li-
censing procedure.
7. The Industry agency should have power
to promulgate and enforce a code of conduct
for programmers and other key personnel
working with computer system to which in-
dustry standards apply. Sanctions would be
Imposed upon individuals violating the code
of conduct, subject, of course, to adminis-
trative review by a government agency and,
ultimately, limited judicial review. Such
sanctions might include the Imposition of
fines, with the maximum fixed by, statute,
suspension from -employment, and, in the
case of the most flagrant violations, even
complete expulsion from the computer serv-
ice industry's
8. The federal authorizing statute should
specifically provide that industry standards
will be recognized and given full force and
effect in all judicial proceedings, both state
and federal. In fact, the statute should pro-
vide that, in the absence of an express
agreement to the contrary between a com-
puter service company and its customer,
the company will not be liable for any loss
or destruction of data, or "leakage" of data
to unauthorized persons, if the company's
computer system has been - duly licensed
and certified to be in compliance with the in-
dustry association's standards, and if in fact
the system was in compliance with such
standards at the time of the loss, destruc-
tion, or unauthorized disclosure. This same
exemption from liability should apply, in
the case of a claim against the computer
service company by an individual on ac-
count of unauthorized disclosure of data
about such individual61
The preceding framework is necessarily a
very broad-brush treatment of a highy com-
plex subject. However, If the Idea of self-
regulation is accepted and adopted by the
computer industry, the foregoing guidelines
can be a point of departure in constructing
the system. What is needed Is s broad con-
sensus within the industry as to the route to
be followed, which can then be translated
into concrete legislation and a detailed plan
of operation.
On the technical side, 'considerable effort
over the past few years has been devoted
to developing and improving hardware and
software techniques for assuring privacy
and security of data during both transmis-
lion and storag02 [In addition, many of the
comments filed in the FCC's Computer In-
quiry described various techniques used to
assure privacy in remote access data proc-
essing applications'" Thus there is a readily
available body of -recorded experience and
thoughtful comment upon which the stand-
ards makers could draw in beginning their
complex task.
One aspect of the foregoing proposal for
self-regulation must be given special atten-
tion. In the case of remote access data pro-
cessing the communications links between
the remote terminals and the 'computers
must be considered a part of the computer
"system" to be licensed or certified if there
is to be really effective privacy protection.
Yet, in virtually all instances, the -communi-
cations links will be furnished by common
carriers not related to the computer service
company seeking the license or certification''
Thus neither the computer company nor the
industry agency proposed above will have
control over the degree of privacy protection
afforded by a very important link in the com-
puter "system" to be licensed or certified.
The solution to this problem does not rest
in making the communications common car-
riers subject to regulation by the industry
agency proposed in this article. Any - reg-
ulatory scheme which'subjects.a company to
regulation directly by its customers must be
viewed with at least a healthy skepticism.
Thus the communications 'common carriers
should not be subject to regulation by the
computer industry agency insofar as these
carriers provide communications service in
connection with remote access data process-
ing'" Moreover, any such attempted reg-
ulation of the communications activities of
the communications common carriers by the
computer industry agency might well conflict
with existing regulation by the FCC on the
national level and by public service com-
missions on the state level.
Rather, the solution to the problem would
appear to lie in a well-organized system of
cooperation between the communications
carriers and the computer industry agency,
with regulatory assistance from the FCC as
required. There should be a continuing for-
malized liaison between the communications
carriers and the computer industry agency,
perhaps in the form of one or more repre-
sentatives of the communications industry
working full time in the liaison activity.
Such liaison could function effectively in at
least two types of situations: (1) when the
industry association is formulating privacy
protection standards, it should consult close-
ly with the communications industry to
assure that tariffed offerings affording. the
desired degrees of privacy protection in vari-
ous situations will be available to the com-
puter service industry; (2) if communica-
S 10255
tions problems arise In connection with any -
particular licensing proceeding under the
above proposal, the suggested liaison could
help to resolve the problem possibly. through
inducing the carrier involved to make a new
tariff offering or to amend an existing tariff
offering.
Of course, if the liaison activity should fail
to resolve any really significant problem,
recourse could be had to the FCC or the
appropriate state public service commission.
To ensure that the FCC will be able to act
effectively and expeditiously, the federal
statute authorizing the system of industry
self-regulation should expressly give the FCC.
whatever additional power that may be nec-
essary'"
There is presently one highly successful
example of industry self-regulation under
federal governmental supervision. For some
thirty years, the National Association of
Security Dealers [NASD] has created and
enforced a thorough program of self-regula-
tion for the securities Industry, including
member broker-dealer firms and Individual
registered representatives. Its principal ac-
tivities Include the administration _of exam-
inations to ensure the qualifications of em-
ployees in the securities industry, the
promulgation and enforcement of rules of
conduct and fair practice for the securities
industry, and the adjustment 'of grievances
between members and between Members
and the public a One of the most effective
tools in NASD's program of self-regulation
is its power to examine the books and rec-
ords of member firms to ensure 'compliance
with NASD rules as well as certain federal
regulations. This is equivalent to the in-
spection program proposed above for the
computer industry. In addition, NASD oper-
ates a program of voluntary arbitration,
both for disputes among Its members and for
disputes between the public and its mem-
bers. In the case of disputes of the latter
variety, the arbitration panel consists of
three members of the public and two rep-
resentatives from the securities business. In
a member versus member contest, the panel
consists of from three to five representatives
from securities industry. -
Although there are obvious differences be-
tween the securities industry and its prob-
lems and the computer industry and its
problems, NASD constitutes -a valid prece-
dent for the type of self-regulatory indus-
try agency proposed herein. By adopting a
NASD-type approach, the computer indus-
try can assure the creation of a rational and
orderly legal framework for resolving the
increasingly pressing problem of privacy in
the context of the computer revolution and,
at the same time, assure that regulation will
be in the hands of persons thoroughly cog-
nizant of the complexities of the situation
and the need for protection of individual
rights and proprietary Interests In data and
programs-all to the benefit of the public
interest.
FOOTNOTES
? Member, District of Columbia Bar, B.A.
1954, Manhattan College; LL.B. 1959, Harvard
Law School.
FCC Notice of Inquiry, Docket, No. 16979,
7 F.C.C.2d 11, 16-17, 8 P & F RADIO REG. 2d
1567, 1572 (Nov. 9, 1966) [hereinafter cited as
Computer Inquiry]. -
Y See generally Hearings on the Computer
and Invasion of Privacy Before a Subcomm.
of the House Comm. on Gov't Operations,
89th Cong., 2d Sess. (1966) [hereinafter cited
as Gallagher Hearings]; Note, Privacy and
Efficient Government: Proposals for a Na-
tional Data Center, 82 HAnv. L. REv. 400
(1968); Research Project--Computerization -
of Government Files, What Impact on the
Individual?, 15 U.C.L.A.L. REv. 1571 (1968).
-Gallagher "Hearings 122.
4See Ware, Security and Privacy in Com-
puter Systems, PROCEEDINGS, 1967 SPRING
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
S 10266
CONGRESSIONAL RECORD - SENATE June 11, 1974
JO:[NT COMPUTER CONFERENCE 279, 280 figure 1.
Effective protection of both individual pri-
vacy and proprietary data also demands con-
trol over the amount and character of the
data input entering the system. See Miller,
Personal Privacy in the Computer Age: The
Challenge of a New Technology in an Infor-
mation-Oriented Society, 67 MICH. L. REV.
1091. 1214-17, 1229-30 (1989) [hereinafter
cited as Miller]. Regulation of data input is
beyond the scope of this article which is di-
rected solely to controls in the storage and
utilization of the data previously collected.
An obvious example of the latter is the
automated credit bureau. Credit Data Cor-
poration maintains a large scale, on-line com-
puterized credit information system with
data centers located in Los Angeles and New
York City. Response of Credit Data Corp. to
FCC Computer Inquiry, March 5, 1968. See
generally Miller 1140-54.
,, See notes 54-61 infra and accompanying
text.
This paper does not deal with the prob-
lems presented by the voluntary disclosure
by the system operators of private informs.-
ticn about individuals stored in computer
systems or questions relating to the accuracy
of information about individuals contained
in such systems. For discussions of some of
the problems involved in the storage of in-
accurate information about individuals and
the voluntary disclosure of information
about individuals, whether accurate or inac-
curate, by the custodians of such informa-
tion, see Karst, "The Files": Legal Controls
Over the Accuracy and Accessibility of Stored
Personnel Data, 31 LAW & CONTEMP. PROS.
342 (1966); Sills, Automated Data Processing
and the Issue of Privacy, 1 SETON HALL L.
REV_ 7 (1970); Note, Credit Investigations
and the Right to Privacy: Quest for a Rem-
edy, 57 GEo. L.J. 509 (1969).
-1 What constitutes "legitimate" voluntary
disclosure of information by the informa-
tion service company is beyond the scope of
this paper.- See not 7 supra.
1 See generally Miller 1156-73.
LO See Lickson, Protection of the Privacy of
Data Communications by Contract: Another
Case Study on the Impact of Computer Tech-
nology on the Law, Bus. LAW, July 1968, at
979-80.
11Under certain variations of these ex-
aDlples, the contractual rights of the com-
puter service company's customer may also
be, involved.
12 See generally RESTATEMENT OF CON-
TRACTS ?? 133-47 (1932).
12 The Supreme Court of Georgia is con-
sidered to have laid the foundation for recog-
nition of a right to privacy as a fundamental,
legally protectible interest in Pavesich v. New
England Life Ins. Co., 122 Ga. 190, 50 S.E. 68,
69-70 (1905). Of course, the intellectual
foundation for recognition of invasion of
privacy as a separate tort had been laid in
Warren &Brandeis, The Right to Privacy, 4
ILisv. L. REV. 193 (1890).
"Prosser, Privacy, 48 CALIF. L. Law. 383, 389
(1960).
1s See e.g., Le Crone v. Ohio Bell Tel. Co.,
120 Ohio App. 129, 201 N.E. 2d 533 (1963)
(wiretapping of an individual's telephone).
15 See, e.g., Flake v. Greensboro News Co.,
212 N.C. 780, 195 S.E. 55 (1938) (photograph
of an actress used in a bread advertisement).
1c See, e.g., Brents v. Morgan, 221 Ky. 765,
299 S.W. 967 (1927) (sign in garage window
stating that the plaintiff's account with the
garage has been unpaid for a long time).
11 See, e.g., Peay v. Curtis Publishing Co.,
78 F. Supp. 305 (D.D.C. 1948) (newspaper
article on the alleged practices of Washing-
ton cab drivers in cheating the public on
fares, making use of the ? plaintiff's photo-
graph to illustrate the article).
11 For example. Congress is now consider-
ing legislation which would regulate the ac-
ti?,ities of credit bureaus and credit investi-
gating agencies, a field In which the com-
puter has been playing an ever-increasing
role. S. 823, 91st Cong., 1st Sees. (1969);
H.R. 7874, 91st Cong.,let Sess. (1969); H.R.
9150. 91st Cong., 1st Sees. (1969); H.R. 9888,
91st Cong., 1st Sess. (1969). The Senite
passed S. 823 on Nov. 6, 1969, 115 CoNG. REC.
13,905-11 (daily ed. Nov. 6, 1969) and re-
ported it to the House Committee on Bank-
ing and Currency on Nov. 12, 1989. Hearings
have been held this spring before the Hb,.ise
Committee.
"These states are Nebraska, Rhode Island,
Texas, and Wisconsin. RESTATEMENT (SEC-
oND) of TORTS, ch. 28A, at 100 (Tent. Draft
No. 13, 1967) .
381 U.S. 479 (1965).
21 See also Tehan v. Shott, 382 U.S. 406
(1966), where the Court pointed out that the
fifth amendment guarantee against sclf-
incrimination is really in part an extension of
an individual's right to privacy and "our
respect for the inviolability of the human
personality and of the right of each indi-
vidual 'to a private enclave where he may
lead a private life.' " Id. at 414 n. 12.
= 57 Misc. 2d 301, 292 N.Y.S. 2d 514 (Sup.
Ct. 1968), aff'd 298 N.Y.S. 2d 137 (App. Div.
1969).
Id, at 305, 292 N.Y.S. 2d at 518.
ffi The Appellate Division, in affirming the
trial court's refusal to discuss the case, held
that it need not pass upon the constitutional
grounds advanced by the trial court, 298
N.Y.S. 2d at 141. We shall have to await fur-
ther litigation to test the implications of
Nader.
26 See generally A. WESTIN, PRIVACY AND
FREEDOM (1967); Gallagher Hearings, supra
note 2; Pipe, Privacy; Establishing Restric-
tions on Government Inquiry, 18 AM. U.L.
REV. 516 (1969); Note, Credit Investigations
and the Right to Privacy; Quest for a
Remedy, 57 GEo. L.J. 509 (1969); Research
Project-Computerization of Government
Files, What Impact on the Individual? 15
U.C.L.A.L. REV. 1371, 1375 (1968) (foreword
by Mr. Justice Douglas).
m Note, Credit Investigations and the Right
to Privacy: Quest for a Remedy, 57 CEO. L.J.
509 11969).
29 Id. at 532.
2D Comment, Privacy, Property, Public Use,
and Just Compensation, 41 S. CAL. L. REV.
902, 909 (1968).
N Id. at 913. The author's main point is
made in the following statements:
"It can be argued that all large public
corporations, such as Timo, Inc., whose ac-
tivity has as great a societal impact as does
most governmental action, should be subject
to the same constitutional limitations as is
the government. Their activity should be
labelled 'public,' rather than 'private,' in
contradistinction to an individual's ac tiv-
ity. . In short, most corporations are at
least in part, fulfilling interests of the state,
and no longer fulfilling the traditional justi-
fications of private property. In these in-
stances they ought to be subject to the same
constitutional limitations as are imposed
that private property cannot be taken for a
public use without payment of just compen-
sation." Id. at 913-14.
And, as noted, the author would egl-ate
the "right of privacy" to "private property"
and would require the payment of just com-
pensation for any action which results in a
destruction or diminution of an individual's
right of privacy.
31 The American Law Institute, in a tenta-
tive draft of a portion of a new Restatement
of Torts, commented that new forms of the
tort of invasion of privacy in addition to the
four basic types already generally recognized
by the courts may emerge, especially in light
of recent decisions by the United States Su-
preme Court. RESTATEMENT (SECOND) OF
TORTS ? 652A, comment c (Tent. Draft No. 13,
1967). See also Westin, Science, Privacy, and
Freedom: Issues and Proposals for the 1970's,
Pt. 11: Balancing the Conflicting Demand, of
Privacy, Disclosure, and Surveillance, 66
COLUM. L. REV. 1205, 1232 (1966).
a, This might prove true whether the com-
panies are service bureaus, information serv-
ices, or some other type of computer service
company.
w Early manifestations of the theory of
strict liability are shown in Huthringer v.
Moore, 31 Cal. 2d 489, 190 P.2d 1 (1948) ; Ball
v. Nye, 99 Mass. 582 (1863) (percolation of
filthy water) ; Cahill v. Eastman, 18 Minn.
324 (1872) (underground water tunnel). For
an example of statutory extension of this
principle, see the relevant portions of the
Federal Safety Appliance Act, 45 U.S.C.
?? 1-60 (1964).
PA See, for example, situations 1, 2, and 3,
text at 497.
35 See, for example, situation 4, text at 497-
98.
3a Symposium: Computers, Data Banks,
and Individual Privacy, 53 MINN. L. REV. 211,
225--27 (1967). The growing concern over pro-
tecting privacy in our era of technological
explosion is evidenced by the fact that most
of the May-June 1969 issue of THINK, the
very informative magazine published by IBM,
is devoted to a special report on privacy. The
articles include Miller, Psychological Test-
ing: Can We Minimize the Perils?, THINK,
May-June 1969, at 24; Ruggles, How a Data
Bank Might Operate, id. at 22; Westin, Life,
Liberty, and the Pursuit. of Privacy, id. at 12;
Westin, New Lines Will Protect Your Privacy,
id. at 27. Professor Westin's concluding re-
marks in his first article are especially il-
luminating: "American Society now seems
ready to face the impact of science on pri-
vacy. Failure to do so would be to leave the
foundations of our free society in peril."
Westin, Life, Liberty, and the Pursuit of Pri-
vacy, id. at 21. In his second article, Pro-
fessor Westin points out that many orga-
nizers of private data banks, in growing rec-
ognition of the privacy problem presented
by the computer revolution, are establishing
administrative controls to assure the protec-
tion of privacy. Westin, New Laws Will Pro-
tect Your Privacy, id. at 31.
27 See Erie R.R. v. Tompkins, 304 U.S. 64
(1938), which laid to rest the notion that
there is any generally applicable federal
common law to be applied by the federal
courts in considering "general" issues in di-
versity cases. For a more thorough discus-
sion of the Erie line of cases, see 1 A. J.
MOORE, FEDERAL PRACTICE ? 0.318 (2d ed.
1965); Friendly, in Praise of Erie-And of
the New Federal Common Law, 39 N.Y.U.L.
REV. 383 (1964).
Computer Inquiry, Report and Further
Notice of Inquiry, 17 F.C.C. 2d 587, 592, 16
P & F RADIO REG. 2d 1505, 1510 (1969); Com-
puter Inquiry, Noticeof Proposed Rule Mak-
ing and Tentative Decision, 18 P & F RADIO
REG. 2d 1713, 1718 (1970). The regulatory au-
thority of the FCC in this area may, of course,
be limited in the absence of additional legis-
lation.
89 18 U.S.C. ?? 2510-20 (Supp. IV, 1969).
Id. ? ? 2511, 2515-19.
4147 U.S.C. ? 605 (Supp. IV, 1969).
u ? 803, 82 Stat. 212, 223 (1968) (reprinted
in full following 18 U.S.C. ? 2510 (Supp. IV,
1969)).
43 ? 804, Stat. 212 223-25 (1968) - (reprinted
in full following 18 U.S.C. ? 2510 (Supp. IV,
1969)).
41 18 U.S.C. ? 2520 (Supp.IV, 1969).
"As used in the statute, "wire communi-
cation" means:
any communication made in whole or in part
through the use of facilities for the trans-
mission of communications by the aid of
wire, cable, or other like connection between
the point of origin and the point of reception
furnished or operated by any person engaged
as a common carrier in providing or operat-
ing such facilities - for the transmission of
interstate or foreign communications. Id. ?
2510(1).
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
June 11, 1974 CONGRESSIONAL RECORD - SENATE
An "oral communication" means: "any
oral communication uttered by a person ex-
hibiting an expectation that such communi-
cation is not subject to interception under
circumstances justifying such expectation."
Id. ? 2510(2).
i0 See Miller 1201.
47 18 U.S.C. ? 2510(4) (Supp. IV, 1969) (em-
phasis added). It remains to be seen how the
definition will be interpreted. The legislative
history of the Act shows clearly that Congress
was preoccupied with the interception of
voice communications, whether by wiretap-
ping or other electronic devices. See S. REP.
No. 1097, 90th Cong., 2d Sess. 217-218 (1968).
The few cases that have cited Title III of the
Act have all been criminal cases or civil anti-
trust cases closely related to criminal cases
and have all dealt with voice communica-
tions. See, e.g., Alderman v. United States,
394 U.S. 165, 175 & nn. 8-9 (1969) ; United
States v. McCarthy, 292 F. Supp. 937, 943
(S.D.N.Y. 1968); Philadelphia Housing Au-
thority v. American Radiator & Standard
Sanitary Corp., 291 F. Supp. 247, 249-50 (E.D.
Pa. 1968); United States v. Schipani, 289 F.
Supp. 43, 60 (E.D.N.Y. 1968); United States v.
American Radiator & Standard Sanitary
Corp., 288 F. Supp. 701, 706--07 (W.D. Pa.
1968).
48 For example, the courts might arguably
distinguished between interception of data
transmitted by the regular analog telephone
network and that carried over a special dig-
ital network. See generally Miller 1206.
i9 See Chaney, Data Transmission Basics,
COMMUNICATIONS, Mar. 1969, at 27; of. Irwin,
Computers and Communications: The Eco-
nomics of Interdependence, 34 LAW & CoN-
TEMP. PROs. 360, 361 (1969).
70 Note, Computer Services and the Fed-
eral Regulation of Communications, 116 U.
PA. L. REV. 328 (1967).
61 See notes 13-17 supra and accompanying
text.
69 The respondents to the FCC's Computer
Inquiry, Including the Department of Jus-
tice, generally agreed that the computer serv-
ice industry should be permitted to develop
in the free competitive economy, and not as
a regulated utility. See L. KRAUSE, Analysis
of Policy Issues in the Responses to the FCC
Computer Inquiry, STANFORD RESEARCH IN-
STITUTE, REPORT No. 7379B-2, at 22-26 (1969).
The author agrees. For a thorough discus-
sion of the issues involved, see S. MATHISON
& P. WALKER, COMPUTERS AND TELECOMMUNI-
CATIONS: ISSUES IN PUBLIC POLICY 16-19
(1970). The FCC as of this time, agrees. See
Computer Inquiry, Tentative Decision, 1718-
22.
54 These standards should be defined to the
greatest extent possible.
54 For a discussion of the limitation im-
posed by the federal antitrust laws on
schemes of self-regulation within an indus-
try, see Silver v. New York Stock Exchange,
373 U.S. 341 (1963), where the Court cau-
tioned that such schemes will be closely
scrutinized because of their potential effect
on competition within the industry. See gen-
erally G. LAMB & S. IKITTELLE, TRADE ASSOCIA-
TION LAW AND PRACTICE ?? 11.1-.9 (1956);
Baum, Self-Regulation and Antitrust: Sup-
pression of Deceptive Advertising by the
Publishing Media, 12 SYRACUSE L. REV. 289
(1961); Rockefeller, Industry, Efforts at Self-
regulation, 10 ANTITRUST BULL. 555 (1965) ;
Developments in the Law-Deceptive Ad-
vertising, 80 HARV. L. REV. 1005, 1159-63
(1967).
5; Such a procedure would afford roughly
the same right to comment as is now granted
by section 4 of the Administrative Procedure
Act, 5 U.S.C. ? 553 (Supp. IV, 1969), which
provides for the filing of written comments,
after appropriate notice, in the case of ad-
ministrative agency rule making.
68 The author has deliberately refrained at
this time from suggesting what government
agency should undertake this function. The
FCC, with its broad expertise in the com-
munications field, might be the most logical
candidate. Perhaps a new agency under the
Department of Commerce might best do the
job. In any event, the Congress,, in selecting
or creating the agency to do the job, should
take meticulous care to assure that the
agency and the whole regulatory scheme will
work in tandem with a well defined national
communications policy, as well as in further-
ance of national policy in the privacy area.
See generally Miller 1236-39.
57 Cf. Silver v. New York Stock Exchange,
373 U.S. 341 (1963), where the Court utilized
the federal antitrust laws as a, basis for its
review of the procedural integrity of a system
of industrial self-regulation.
5e It may be appropriate to provide for
binding arbitration of such disputes instead
of merely conciliation. This would be feasible,
however, only if the industry agency were a
truly independent authority and had such
status and reputation for objectivity that
nonmembers of the computer service indus-
try would regard it as a fair tribunal.
19 See generally W. GELLHORN & C. BYSE,
ADMINISTRATIVE LAW 649-51 (4th ed. 1960).
For a discussion of the utility of the concilia-
tion process in an analogous context, see
1968 DUKE L.J. 1000 (conciliation procedure
in an Equal Employment Opportunity Com-
mission proceeding).
m Theft of a computer program might be
ground for such expulsion. In at least one
case, a court has held that computer pro-
grams are "property" subject to "theft"
under state law, and an employee of a com-
puter company who stole such programs was
guilty of felony theft. Hancock v. State, 402
W.2d 906 (Tex. Crim. App. 1966).
0 To reiterate, there should be no statutory
exemption from liability in the case of vol-
untary and deliberate acts by the computer
service company including companies offer-
ing computerized information services. At
least as this author now envisions the pro-
posed industry association, it would not deal
with criteria for the voluntary release of in-
formation to "interested persons," govern-
ment agencies, or other individuals, groups,
or organizations. It may well be that, as the
system develops and considerable experience
is gained with the arrangement proposed in
this article, it will eventually be appropriate
for the industry association to promulgate
standards governing the voluntary disclosure
of information. Of course, to be really ef-
fective, especially against the federal govern-
ment itself, the association should have spe-
cific federal statutory authority to promul-
gate and enforce such standards, and the
statute should expressly make them appli-
cable to government agencies.
69 For example, three excellent papers sum-
marizing some of the problems involved in
achieving privacy and security of data in
multi-programmed computer systems were
presented at the 1967 Spring Joint Computer
Conference. PROCEEDINGS, SPRING JOINT COM-
PUTER CONFERENCE 279-90 (1967). The indi-
vidual articles were Peters, Security Consid-
erations in a Multi-Programmed Computer
System, id. at 283; Ware, Security and Pri-
vacy in Computer Systems, id. at 279; Ware,
Security and Privacy: Similarities and Differ-
ences, id. at 287. The terms "security" and
"privacy" are used in special senses in those
papers, as summarized by Willis Ware in the
last=cited paper: "For the purposes of this
paper we will use the term 'security' when
speaking about computer systems which
handle classified defense information which
nonetheless must be protected because it is
in some respect sensitive." Id. The term "se-
curity" has been used in a broader sense
throughout this article.
69 See, e.g., Response of United States De-
partment of Justice (Mar. 5, 1988), filed in
Computer Inquiry, FCC Docket No. 18,979,
64 See Irwin, supra note 49, at 360-61
(1969) ; Miller 1099-1103.
S 10267
55 However, if the carriers utilize separate
subsidiaries to engageIn computer service op-
erations which would be subject to regula-
tion by the industry association if performed
by computer companies not related to com-
munications common carriers, such carriers
or their computer service subsidiaries should
be subject to industry regulation in the pri-
vacy area.
m Even if the FCC might be able to act pur-
suant to its existing general powers under the
Communications Act of 1934, 47 U.S.C. ? ? 151-
609 (1964), there may be considerable ad-
vantage in spelling out the FCC's jurisdiction
in this situation and perhaps providing for
special streamlined procedures.
If the FCC is to become involved in a signif-
icant way in this situation, perhaps it should
be the agency to review actions of the com-
puter industry agency although Congress
might wish to consider other alternatives be-
fore determining whether to give such juris-
diction to the FCC. See note 56 supra and ac-
companying text.
67 This description of the NASD and its ac-
tivities is taken from the 1968 NASD Presi-
dent's Report. 1968 NASD ANN. PRESIDENT'S
REP. Of interest to the computer industry in
formulating its system of self-regulation
might be the NASD's statement of purposes:
(1) To promote ... the investment . . . and
securities business, to standardize its princi.
ples and practices, to promote ... high stand-
ards of commercial honor, and to . pro-
mote among members observance of Federal
and State securities laws;
(2) To provide a medium through which
its membership may . consult, and co-
operate with governmental and other agen-
cies in the solution of problems affecting in-
vestors, the public, and [this business] ...;
(3) To adopt ... and enforce rules of fair
practice [in the Securities business] ... and
in general to promote just and equitable
principles of trade for the protection of in-
vestors; -
(4) TO promote self-discipline among mem-
bers, and to investigate and adjust griev-
ances between the public and members
CCH NASD MANUAL ff 1003.
With some slight change in terminology,
many of these statements might be substan-
tially adopted by the computer industry.
ANNOUNCEMENT OF HEARINGS ON
S. 6, EDUCATION FOR ALL HANDI-
CAPPED CHILDREN
Mr. RANDOLPH. Mr. President, as
chairman of the Senate Subcommittee
on the Handicapped, I announce that our
subcommittee will conduct hearings on
S. 6, a bill for the education of all handi-
capped children. The hearing will be held
on Monday, June 17, 1974, at 9 a.m. in
room 4232, Dirksen Senate Office Build-
ing. Persons wishing to present state-
ments should contact Mrs. Patria For-
sythe, professional staff member, or Miss
Anne Hocutt, research assistant, Sub-
committee on the Handicapped, at 202-
225-9075. -
NOTICE OF HEARING ON RURAL EN-
VIRONMENTAL ASSISTANCE PRO-
GRAM AND RURAL ENVIRONMEN-
TAL CONSERVATION PROGRAM
Mr. HUDDLESTON. Mr. President, the
Subcommittee on Agricultural Produc-
tion, Marketing, and Stabilization of
Prices of the Committee on Agriculture
and Forestry will hold a hearing Thurs-
day, June 20, on implementation of the
rural environmental assistance pro-
gram-REAP, and the rural environnien-
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6
CONGRESSIONAL RECORD - SENATE June 11, 1974
Nebraska (Mr. CURTIS) addressed a meet-
ing in Washington of the National Citi-
zens' Committee for Fairness to the
Presidency. -
In his customary forthright fashion,
Senator CURTIS gave his analysis of the
existing situation concerning charges
leveled at the President of the United
States by the major news media, various
committees of the Congress, and others.
Senator CURTIS calls for fairness, Mr.
President, and I think all Senators, re-
gardless of political affiliation, will be
interested in the eloquent remarks by
our distinguished colleague.
Therefore, Mr. President, I ask unani-
mous consent that the text of Senator
CURTIS' address be printed in the
RECORD.
There being no objection, the addr..ss
was ordered to be printed in the RECORD,
as follows:
SPEECH OF SENATOR CARL T. CURTIS
Mr. Chairman, distinguished guests: My
heart swells with gratitude for the dedicated
work of the Committee created to defend
the Presidency of the United States. I am
grateful for their work and the like work of
.all others. I believe that they are fighting the
cause not only of our country but of free
men everywhere. To you, Rabbi Korff, I say
thank you very much. Americans will always
be grateful for what you are doing.
We have a tough fight on our hands but
in my opinion, the "get Nixon crowd" in-
cluding those who continue to conduct a
trial by press are in for a big surprise. They
are losing their case. As I travel up and down
this country, I am convinced that the vast
majority of the people who do the work of
the country, who pay its taxes and who fight
its wars, are with the President of the United
States, Richard M. Nixon.
We are, however, in an all-out fight. We
are opposing a loud and determined group.
They are a powerful group and they have
at their command tremendous propaganda
weapons. We must take our message to the
people.
The American people need to be reminded
that they have a President who wants to get
on with the business of strengthening the
country. He wants to restore financial sanity
to the Federal Government. He wants to curb
inflation. And these things, I submit, are
vital to the very survival of our nation. We
will fail to do them at our peril.
The people of the entire free world look
upon President Nixon as their leader. They
do so with good cause. President Nixon is
the world's foremost and most successful
peacemaker.
I cannot forget that when Mr. Nixon was
sworn in as President our casualties in Viet-
nam were running as high as 300 a week.
They were gradually reduced and Anally
brought to zero. Our combat troops have
been removed from Vietnam, prisoners of
war have been brought home, and young
men are no longer drafted into the Army.
Neither can I forget the cruel criticism,
the unfounded charges, the shameful accu-
sations that were heaped on President Nixon
throughout the months that he was doing
so much for our country to end the war
which he didn't start. There were marches
upon Washington and his critics missed no
opportunity to hinder and thwart his ac-
tions.
Let us consider the Middle East. This is an
area of the world which has been torn. by
war and strife for a long time now. The feel-
ings and bitterness run very deep, yet it is all
changing now. The fighting has stopped.
There has been a withdrawal of troops. The
killing has ended. There has been all ex-
change of prisoners of war and the parties
are proceeding to negotiate a peace.
Oh, yes, we will forever be grateful for the
skill, the dedication and the tenacity of our
Secretary of State, Dr. Henry Kissinger. A
Secretary of State can only accomplish those
things which are in the plan of the President
who appoints him and directs him. The
power and the might of a country are es-
sential weapons in all diplomatic dealings.
In the United States there is only one person
who speaks in matters of foreign affairs and
who is Commander in Chief of our armed
forces. That man is the President of the
United States. Because we have a strong and
wise President, and a President who has
dedicated his life toward a generation of
peace, it has been possible for this country
of ours to benefit from the skill and talents
of a great Secretary of State.
Most of us know of the joy that has come
to the mothers, wives, fathers and children of
the American servicemen when wars have
ended for us. No doubt greater joy has come
to the peoples on all sides in the Middle East
now that they are experiencing peace and a
justified hope that it will become permanent.
I have served in Congress throughout
World War II, the Korean War, and the
Vietnam War, and I am not going to turn
my back on Richard Nixon, the peacemaker.
Few people can appreciate the burdens
on the President of the United States. Every
Congressman and every Senator must dele-
gate matters to his staff that he would like
to do himself. Our responsibilities and the
sLze of our constituencies are such a small
fraction of those of the President. There are
always tremendous burdens falling on the
President in reference to domestic matters.
1972 was a momentous year in President
Nixon's accomplishments in world affairs.
The Vietnam War was being wound down,
leading to its total halt. This called for
courageous and soul-searching decisions as
to bombing and other actions. The Presi-
dent's visits to Mainland China and to the
Soviet Union were handled by him with
great expertise.
His 1972 campaign had to be managed
by others. I am convinced that President
Nixon not only was not involved but never
condoned any wrongdoing and that the real
facts were withheld from him far too long.
Most citizens are aware that the President
of the United States has been ruthlessly sub-
jected to a trial by press, that the American
principle of presumption of innocence and
that testimony should be taken under oath
and subject to rigid cross-examination, have
not been followed. What about the principle
that an accused person must be found guilty
beyond a reasonable doubt?
Congressional committees have been used
to advance the publicity of aspiring politi-
cians. These committees have provided
forums for the spreading of hearsay and
unsubstantiated charges.
A grand jury in Washington has been at
work, the makeup of which can hardly be
described as-a cross-section of our country.
The very atmosphere in Washington is not
conducive to a fair trial.
A special prosecutor has worked with a
staff selected by his predecessor. I think I
am quite charitable when I say that Archi-
bald Cox is not noted for being non-partisan
:nor for being objective.
During the 1980 Presidential campaign. Mr.
Cox was described as the "informal dean of
the Kennedy Brain Trust." In 1973 he pro-
ededed to assemble a prosecutor's staff with-
out any political balance whatever. His Dep-
nty was Henry S. Ruth, who served under
Robert Kennedy when he was Attorney Gen-
eral. One of his ,assistants, James Vorenberg,
served on the McGovern staff when McGovern
was running for President. He was a frequent
critic of President Nixon's law and order pro-
nouncements and had served under Attorney
General Robert Kennedy.
Philip B. Heymann, who was on Cox's staff,
was an assistant to the solicitor general
during the Kennedy and Johnson Adminis-
tat conservation program-RECP, begin-
ning at 10 a.m. in room 324, Russell Office
Building. The subcommittee will review
the operations of the Soil Conservation
Service to determine the reasons for re-
ports of inadequate technical assistance
being given our farmers. Anyone wishing
to testify should contact the committee
clerk as soon as possible.
NOTICE OF HEARING ON
NOMINATIONS
Mr. ROBERT C. BYRD. Mr. President,
on behalf of the Committee on the Judi-
ciary, I desire to give notice that a public
hearing has been scheduled for Wednes-
day, June 19,,1974, at 9:30 a.m., in room
2228, Dirksen Senate Office Building, on
the following nominations:
William H. Orrick, Jr., of California, to be
U.S. district judge, northern district of Cali-
fornia, vice William T. Sweigert, retired
Henry F. Werker, of New York, to be U.S.
district judge, southern district of New York,
vice Sylvester J. Ryan, retired
At the indicated time and place per-
sons interested in the hearing may make
such representations as may be pertinent.
The subcommittee consists of the Sen-
ator from Mississippi (Mr. EASTLAND)
chairman; the Senator from Arkansas
(Mr. MCCLELLAN), and the Senator from
Nebraska (Mr. HRUSKA).
NOTICE OF HEARING ON PRESI-
DENT'S NOMINATION OF DR. JOHN
C. SAWHILL TO BE ADMINISTRA-
TOR OF FEA
Mr. JACKSON. Mr. President, a second
day of hearings on the President's nomi-
nation of Dr. John C. Sawhill to be the
Administrator of the Federal Energy Ad-
ministration has been scheduled for
Wednesday, June 12, at 2 p.m.
The purpose of this second day of hear-
ings on this important position is to per-
mit Members who were unable to be
present at the hearings on Friday, June
7, to appear and propound questions to
Mr. Sawhill. -
l urther information concerning the
location of the hearings will be available
tomorrow morning at the office of the
Senate Committee on Interior and In-
sular Affairs.
NOTICE OF HEARINGS ON RADIA-
TION HEALTH AND SAFETY ACT
OF 1973
VIr. KENNEDY. Mr. President, I want
of take this opportunity to announce
Senate Health Subcommittee hearings
on S. 667, the Radiation Health and
Safety Act of 1973, which will be chaired
by my good friend and colleague, Senator
JENNINGSRANDOLPH. These hearings will
be conducted on June 19, 1974, and will
begin at 10 a.m. Persons interested in
testifying should contact Mr. Richard
Grundy at 225-9894.
ADDITIONAL STATEMENTS
SENATOR CURTIS CALLS FOR FAIR-
NESS IN THE CONSIDERATION OF
CHARGES AGAINST PRESIDENT
Mr. HELMS. Mr. President, this past
Sunday the distinguished Senator from.
Approved For Release 2006/10/20: CIA-RDP76M00527R000700140093-6