Part 2 of 2
Targeting for "Foreign Intelligence" Requirements General Allen's statement to the Church Committee alluded to the fact that NSA selects messages on the basis of "foreign intelligence" requirements supplied by its consumers in the U.S. intelligence community.84 What may constitute "foreign intelligence", however, is far from clear. As the Church Committee points out:
'"Foreign intelligence' is an ambiguous term. Its meaning changes, depending upon the prevailing needs and views of policymakers, and the current world situation. The internal politics of a nation can also play a role in setting requirements for foreign intelligence; the domestic economic situation, an upcoming political campaign, and internal unrest can all affect the kind of foreign intelligence that a political leader desires. Thus, the definition constantly expands and contracts to satisfy the changing needs of American policymakers for information." 85
Indeed, NSA's monitoring of the international communications of U.S. citizens involved in antiwar activities in the late 1960s was considered to have been part of the agency's "foreign intelligence” mission. 86 NSA claims that it no longer targets U.S. citizens by name for any purpose, 87 but it concedes that this limitation is a matter of self-restraint, rather than one of law 88 or practicality. 89
Apart from even this sort of blatantly improper intrusion, however, it is not difficult to see how a broad range of activity carried out with foreign entities by American citizens, especially activities of an economic and financial nature, could be of "foreign intelligence" interest, and, thus, be "fair game" for NSA.
It may be of "foreign intelligence” interest, for example, to know what is being said between U.S. banks and their large Middle Eastern depositors, whose actions could have a substantial inpact on the U.S. economy.90 It may be of "foreign intelligence" interest to know the details of oil transactions between U.S. importers and their foreign suppliers, of commodities sales with foreign governments, of negotiations regarding the purchase of equipment or services from American concerns, of the location and quantity of various raw materials, or the location of influential U.S. businessmen traveling in foreign countries, or of what is being said about or to members or employees of the U.S. government. 91
Thus, while an American citizen or company might not be targeted by name, by virtue of his international activities, his communications might be selected by NSA on the basis of its "foreign intelligence" criteria. NSA has not denied that it, in fact, "selects" U.S. messages of this nature; and, indeed, several uncorroborated reports have reached this Committee indicating that such monitoring is presently underway. 92 For a discussion of the restrictions which govern this activity, see page, infra.
Communications SecurityIn addition to its foreign intelligence mission, NSA is charged with the protection and security of U.S. government communications. 93 NSA carries out this function primarily by developing codes and encryption devices to ensure that governmental communications cannot be read by foreign intelligence-gathering agencies.
Recently, however, press reports have stated that NSA has carried out its communications security function by monitoring purely domestic communications links to determine what information, if any, is being gleaned from American complications by Soviet intercepts within the United States. 94
NSA has not publicly denied these reports, nor has it sought to explain them. 95 When asked about such reports, the current NSA Director, Vice Admiral Bobby R. Inman, only repeated NSA's claim that "no U.S. citizen is now targeted by the NSA in the United States or abroad".96 As heretofore noted, however, the fact that NSA does not target U.S. citizens by name. does not necessarily mean that NSA does not intercept and select the communications of U.S. citizens to carry out its work. If domestic communications are being systematically intercepted and perused by NSA with the idea of discovering what the Soviets are able to obtain from U.S. communications, NSA' s communications dragnet could conceivably be of mammoth proportions.
Uncommon Secrecy To understand NSA's reluctance to provide greater public explanation of the manner in which it intercepts and handles U.S. communications,. one must understand the uncommon secrecy which has traditionally enshrouded its existence and functions. The Agency was created by classified Executive order in 1952, and its functions were assigned by classified Executive directives thereafter. Prior to 1962, its existence was not acknowledged in the U.S. Government Manual. It was not until. 1975, twenty-three years after its creation, that any Director of the agency ever appeared before a congressional committee in public session.
NSA has furthermore refused to provide evidence in judicial proceedings on the grounds that such public disclosures could lead to a compromise of its "sources and methods". The Church Committee reported that at least one criminal prosecution was dropped by the Justice Department because of NSA's refusal to discuss such intercepts in a public forum.97 Attorney General Levi admitted to the Church Committee that even he was not 1 privileged to NSA's secrets:
"Attorney General Levi:... [A]t this time I would have to say that I do not know what [NSA's] procedures are. I do not know what the possibilities are. I do not know enough about the minimization procedures [for the interception and use of U.S. communications ]...
"Senator Church: Until you have that information, you really do not have the foggiest idea of whether what they [NSA] are doing is legal or illegal, constitutional or unconstitutional?
"Attorney General Levi: I would be glad to accept the protective shape of that proposed answer. I suppose I have a foggy idea." 98
It has finally been this Committee's experience during its independent investigation, of the SHAMROCK program, that even after the Church Committee had released its public report in April 1976, exposing in great detail the nature of the program, NSA steadfastly refused to declassify any of the documents regarding the program for requested purposes of this Committee's work.
RESTRICTIONS UPON NSA’S CURRENT OPERATIONS NSA contends that, since it is concerned solely with gathering "foreign intelligence", neither the restrictions contained in the wiretap statute (18 U.S.C. 2510, et seq.) or in section 605 of the Communications Act of 1934 affect its operations. 99 In short, NSA claims its activities are not subject to any statutory controls.
NSA does appear, however, to be subject to the general limitation contained in Executive order 11905, issued February 18, 1976, that as a "foreign intelligence agency", it may not engage in electronic surveillance of domestic communications for foreign intelligence purposes. Moreover, it appears that NSA is subject to classified restrictions imposed by the Attorney General. pursuant to section 5 of that order. 100
Although these restrictions have not been released, even in "sanitized" form, to the public, they have been alluded to in various public statements issued by agency officials. Former NSA Director Lew Allen, Jr., in testimony before the Church committee, referred to the Attorney General’s guidelines stating that under them "we may not accept any requirement based on the names of U.S. citizens unless (the Attorney General) has personally approved such a requirement, and no such approval has been given." 101 In response to a question about NSA's handling of U.S. communications which had been inadvertently intercepted, he added:
"The directives are that we do not do anything to those communications, and we reject it as early--reject such communications as early in the process as it is possible for us to do. For example, if by tuning the receiver, it is possible to reject them, that is what one does. If it turns out to be somewhat later in the process, one does it then. But the rules are clear, and that is that one rejects those messages as quickly in the selection process and as automatically as it is physically possible to do. "102
Allen further suggested that the directives prohibited NSA from monitoring purely domestic communications. 103
Allen's successor, Vice-Admiral Bobby R. Inman, elaborated further on the restrictions in remarks made to the Senate Intelligence Subcommittee on Intelligence and Human Rights, suggesting that, the guidelines required that information on U.S. citizens which had been collected accidentally "be destroyed and not used in any way".104
In addition to these public comments, a report made to the subcommittee by the General Accounting Office served to shed further light on the content of the classified restrictions imposed by the Attorney General. 105 In its report, GAO found that:
"It necessarily occurs that foreign communications may contain references to U.S. persons. The Agency [NSA] takes great pains to remove the identity of the U.S. person from any foreign intelligence report. That material which is not used in the reporting process is destroyed. "106[/quote]
GAO found, however, that although the names of U.S. persons, including U.S. corporations, were removed from intelligence reports, that it was sometimes possible to identify such persons from the content of the reports:
"Employing sampling techniques, we selected a random sample of reports from a large number. of report titles for a detailed review and verified that there had been no unauthorized use of the names of U.S. persons. We did find three instances in which the mention of equipment might identify the U.S. manufacturer to a knowledgeable person. "107
CONCLUSIONS At the outset, this 'Committee realizes that the newly-created intelligence oversight committees of the Congress have primary jurisdiction over the foreign intelligence activities of NSA. The Committee is equally aware that it may not have sufficient information in its possession regarding these activities to make informed judgments regarding the controls that should be placed upon NSA. Nevertheless, in the course of this Committee's investigation of the telegram interception program, in the work of the Church Committee, and in what has appeared elsewhere on the public record, it has become apparent that the activities of NSA have had, and probably continue to have, an adverse impact upon the rights and privacy of American citizens. This does concern the Committee.
Although NSA no longer sends its messengers to the offices of international telegraph carriers in the early hours of the morning, as it did while SHAMROCK was operational, it nevertheless intercepts international communications just as effectively and just as indiscriminately. In fact, the international communications of Americans are presumably being intercepted today in a significantly greater volume than was ever available under SHAMROCK. Moreover, the ability of NSA to sort such great volumes of material has undoubtedly improved with advances in computer technology.
NSA concedes that it must unavoidably acquire many communications of American citizens but it will not explain -- except in a general, piecemeal fashion -- what it does with those communications.
NSA further concedes that some of the communications of American citizens may be of "foreign intelligence" value but it will not say what it does with these communications. The General Accounting Office reports that while the names of U.S. citizens and corporations are deleted from NSA's reports, it is often still possible to identify the person or corporation involved.
NSA also says that it intercepts only communications which have one foreign terminal, but it does not explain, or deny press reports that it monitors domestic long-distance calls to determine what the Soviets obtain from U.S. domestic communications, even though such activity would seem to -violate Executive order 11905.
NSA says that it operates under strict guidelines established by the Attorney General but it refuses to reveal the guidelines, and refuses to allow a public assessment of their effectiveness.
All of this leaves the public to wonder if their communications are being silently intercepted and used by the government without, their knowledge. Apart from a fundamental concern for the privacy of one's communications, these practices unavoidably bring other possibilities to mind. Could the government be using information gleaned from such communications to influence or disrupt international business transactions? Could it provide NSA or Executive branch employees with "insider" information regarding investments or information which might otherwise give them a competitive advantage on some economic venture? Could such information be used to "blackmail" or threaten some individual or business? Could this information be turned over to a federal agency, such as the Securities and Exchange commission or Commerce Department, in pursuit of its administrative Would information which suggested that a crime had taken place or was about to take place be turned over to a law enforcement agency? Would information relating to a potential civil disturbance or forthcoming political rally be turned over? Would information regarding the future of certain legislation be passed on to the appropriate federal agency? Would information. which suggested some person may be a security risk be turned over to the appropriate federal agency? Could information under any circumstances be turned over to a private employer? Could such information ever be used to deny a federal benefit?
RECOMMENDATIONSIt is the opinion of the Committee that, notwithstanding the important and sensitive work undertaken by NSA, democratic government demands greater public accountability for an agency with the potential which NSA has to violate the rights of American citizens. At the very least, NSA should make public the Attorney General's guidelines which govern its acquisition and handling of the communications of U.S. citizens, and should open such restrictions to the invigorating effects of public debate. If the guidelines as they are now written cannot be disclosed because of the intelligence methods which they might reveal, the Committee encourages that they be released in a form which does not compromise such techniques.
Over the long term, the Committee concludes that Congress should adopt statutory controls to govern the activities of NSA, at least insofar as they impact upon the communications of Mexican citizens. At present, NSA contends that laws governing wiretapping and radio interceptions are not applicable to its operations. It has no statutory charter, nor is its director even subject to confirmation by the Senate. To this point at least, even the recently-created congressional oversight committees have provided' the public with no greater insight.
In view of the Agency's considerable potential for violations of the privacy of Americans, however, and the doubts already cast upon the legitimacy of its current practices, the Committee concludes that NSA's limited accountability does not serve the public's interest. Neither the Congress nor the public can carry out their constitutional responsibilities in a vacuum. Both need information. When the activities of an Executive agency come into apparent conflict with the rights and privacy of the individual, it is essential to good government that the public be informed of the nature and extent of that conflict. We should not be left to wonder whether we are abiding the activities of NSA at the expense of the- Constitution.
FOOTNOTES 1/ The suppressed Report of the House Select Committee on Intelligence "[hereafter cited as Pike Committee), which was published in private channels, noted that the total annual intelligence community budget was "more than $10 billion"'; that the NSA "has one of the largest budgets in the intelligence community"; that "roughly 20 percent of the National Security Agency's budget is not added into the intelligence budget"; that "the costs given Congress for military intelligence [much of which would be applicable to NSA's functions] do not include expenditures for tactical military intelligence, which would approximately double intelligence budgets for the three military services". (Pike Committee Report, Village Voice, February 16, 1976, p. 72.)
2/ David Kahn, author of The Codebreakers, a definitive work on cryptology, describes the NSA as "the largest and most secretive of all American intelligence organs', and estimates that on its own it "spends about $1 billion a year". But, he adds, "the agency also disposes of about 80,000 servicemen and civilians around the world, who serve in the' cryptologic agencies of the Army, Navy, and Air Force [that] stand under NSA control, and if these agencies and other collateral costs are included, the total spent could well amount to $15 billion". (Source: David Kahn "Big Ear of Big Brother", New York Times Magazine, May 16, 1976.)
3/ "Meet the Press" interview, August 17, 1975.
4/ See footnote 2.
5/ See Final. Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, U. S. Senate, 94th Cong., 2d Sess., 1976, Vol. Ill, pp. 736-737. (Hereinafter cited as the Church Committee Report.) See also, testimony of Lt. Gen. Lew Allen, Jr., Hearings before the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, U. S. Senate, 94th Cong., 2d Sess., 1976, Vol. 5, pp. 6-7. (Hereinafter cited as the Church Committee Hearings.)
6/ Ibid.
7/ Frank Van Riper, "Find U. S. Agents Spy on Embassies' Cables", New York Daily News, July 22, 1975, p. 2
8/ Hearings before a Subcommittee of the Committee on Government Operations, "Interception of Nonverbal Communications' by Federal Intelligence Agencies", 94th Cong., 2d Sess., 1976. (Hereinafter cited as Subcommittee Hearings.)
9/ Subcommittee Hearings, pp. 2-3.
10/ Id., p. 62.
11/ Church Committee Hearings, Vol., 5, pp. 5-46.
12/ Ibid., pp. 51-55.
13/ Church Committee Hearings, Vol. 5, pp. 57-60.
14/ Subsequently amended to 1945. See Church Committee Report, Vol. Ill, p. 768.
15/ Subcommittee Hearings, p. 56.
16/ Id., pp. 58-59.
17/ Id., p. 99.
18/ Although five contempt citations were voted by the subcommittee for the individuals who refused to testify or produce documents, the subcommittee, in light of the subsequent disclosure of documents it had requested, did not recommend to the full committee that such contempt citations be issued.
19/ Id., pp. 125-126
20/ Id., p. 240, et seq.
21/ Army Security Agency, Historical Background of the Signal Security Agency, Vol. III, p. 74; prepared under the Direction of the Assistant Chief or Staff, G-2, April 12, 1946.
22/ Id.
23/ David Kahn, The Codebreakers (New York, The Macmillan Company, 1967), p. 344.
24/ Herbert O. Yardley, The American Black Chamber (Indianapolis, The Bobbs-Merrill Company, 1931), p. 240.
25/ Army Security Agency, op. cit., p. 48: "In order to conceal the true nature of its activity, the office was called 'Code Compilation Company', a cover name for MI-8 but the real name of an incorporated business firm established by Yardley and Charles J. Mendelsohn, partners in this venture. This firm produced and sold in fairly large quantity, a code called the Universal Trade Code."
26/ Yardley, on cit., p. 370.
27/ Quoted in Kahn, 033. cit., p v 360n. (In this regard, Secretary Stimson also made his well-known declaration, "Gentlemen do not read each other's mail".)
28/ Yardley, op. cit., p. 332. (This forty-five year old list is not dis-similar to one possessed by Western Union International which, when subpenaed by this Committee on February 4, 1976, prompted President Ford to attempt to extend the so-called "executive privilege" doctrine to a private corporation. See p. below.
29/ Id.
30/ Yardley, op. cit., pp. 240-41.
31/ Copy of letter in possession of subcommittee.
32/ Postal Telegraph, the holding company controlling Commercial Cable, merged with Western Union in 1943. (Of the three U. S. companies now dominating the international telegraph business in this country -- ITT World Communications, RCA Global Communications, and Western Union International, a subsidiary of Western Union — two were very small in the 1920's, and one did not exist.)
33/ Yardley, op. cit., p. 342.
34/ Army Security Agency, op. Cit., pp. 73-74.
35/ "An Act to regulate radio communication," August 13, 1912., 62nd Cong., 2d Sess., Ch. 287, Statutes at Large, Vol. 37, Part I, p. 307.
36/ "An Act for the regulation of radio communication," February 23, 1927.
53th Cong., 2d Sess., Ch. 189, Statutes at Large, Vol. 44, Part II, Sec. 27, p. 1172.
37/ Army Security Agency, on. cit., p. 77.
38/ New York Times, June 2, 1931; p. 18.
39/ New York Herald Tribune, June 9, 1931; p.
40/ New York Times, June 2, 1931; op cit.
41/ Army Security Agency, op. cit., p. 177.
42/ New York Times, February 21, 1933, p. 3.
43/ Primarily from Army Security Agency, 0 £. cit., pp. 176-80.
44 / ITT Communications is now ITT World Communications. RCA Communications is now RCA Global Communications. In 1963, Western Union's international operations were transferred to Western Union International, which was established as an independent company. Between 1971-1974, these three companies carried 94.9 percent of all international telegraph messages in and out of the U.S. (Source: FCC letter to subcommittee, January 28, 1976.)
45/ In March 1976, when representatives of the three major American telegraph companies engaged in international communications testified before the subcommittee, the subcommittee believed that the government had not commenced its post World War II interception of private messages until 1947. This belief was based on a report issued by the Church Committee on November 6, 1975, at which time Sen. Church stated:
At meetings with Secretary of Defense James Forrestal in 1947, representatives of the three companies were assured that if they cooperated with the Government in this program, they would suffer no criminal liability and no public exposure, at least as long as the current administration was in office. They were told that such participation was in the highest interests of national security.
Shortly after the subcommittee's March 1976 -hearings, a subcommittee staff inquiry led to records being uncovered in the Archives which indicated that the Army Security Agency had, in fact, taken steps to initiate the interception program as soon as the war ended. Prior to making these records available to the subcommittee. Archives sought Department of Defense permission; that permission was refused. The Department of Defense then advised the Church Committee of the existence of these documents, and allowed a staff member of that committee to inspect them. This transpired just prior to the issuance, in May 1976, of the Church Committee staff report

n "National Security Agency Surveillance Affecting Americans," which was amended accordingly.
46/ Letter from Intelligence Officer of Army Signal Security Agency to Commanding General, August 24, 1945, quoted in Church Committee Final Report, Book III, pp. 767-68.
47/ Id., p. 769.
48/ Subcommittee Hearings, p. 212.
49/ Ibid. Sparks testified that within RCA he was the sole authority for making all messages available to government agents, and that this arrangement began in 1947. The Committee has no reason to doubt the accuracy of Mr. Spark's testimony insofar as he was aware of the facts. The 1947 date, as he recalled it, was presumably a result of that being the program's generally accepted date of commencement, at the time of his testimony. His belief that he was responsible for. making the arrangements with the government apparently is based on initiatives made to him by Army Security Agency representatives, subsequent to arrangements unknown to him being made with his superiors. (See October 9, 1945 letter from RCA Vice-President W. H. Barsby to Brig. General W. Preston Corderman, in Subcommittee Hearings, p. 208). Mr. Sparks apparently never knew about the 1947 meeting with Secretary Forrestal; Spark's superior, Gen. Harry C. Ingles, then president of RCA Communications, represented the company.
The ITT delegation to the 1947 Forrestal meeting was led by ITT Chairman and President, Sosthenes Behn. Joseph L. Egan, Western Union president, was invited but did not attend, and his company apparently was not represented.
50/ Army Signal Security Agency letter, August 24, 1945, op. cit., p. 772.
51/ For a detailed description of these procedures see Church Committee Final Report, Book III, pp. 765-776.
52/ Id., p. 773.
53/ Subcommittee Hearings, p. 107.
54/ Western Union International's executive vice-president' testified he had the machine removed in 1965. However, the Church Committee reported at Book III, p. 774: This recollection "was not borne out by documents furnished by NSA. The documents showed that on February 2, 1968, a company vice-president (not the one referred to above) had discovered the existence of NSA's Recordak (microfilm) machine in the Western Union transmission room. The machine was reported to the company president, who directed his employees to find out to whom the machine belonged.... It is clear that NSA continued to receive duplicates of all messages to the foreign country referred to above until 1972; when again as a result of 'discovery' by company officials, this procedure was halted.... In effect, Western Union International's participation in SHAMROCK ended by 1972."
On June 7, 1976, Mr. Greenish advised the subcommittee, through counsel "... that the practices discussed by him, copying foreign government traffic on the Recordak, terminated with the removal of the one and only Recordak 'about 1965'". (Subcommittee Hearings, p. 111.)
55/ Church Committee Final Report,. Book III, p. 737.
56/ Id., p. 777-778.
For a detailed discussion of NSA watchlist activities, see Church Committee Hearings, Vol. 5, pp. 1-55 and'145-163; also Church Committee Final Report, Book III, pp. 737-65.
57/ Id., p. 739.
58/ "Establishment of Sensitive SIGINT Operation Project Minaret", dated July 1, 1969, in Church Committee Hearings, Vol. 5, pp. 149-50.
59/ SIGINT recipients included the President's Foreign Intelligence Advisory Board (PFIAB), the Central Intelligence Agency (CIA), the Federal Bueau of Investigation (FBI), the Defense Intelligence Agency (DIA), the (Army) Assistant Chief of Staff for Intelligence (ACSI), the Office of Naval Intelligence (ONI), the Air Force Office of Special Investigations (AFOSI), the Energy Research and Development Agency (ERDA) and the Department of State's Office of Current Intelligence.
60/ Church Committee Hearings, Vol. 5, p. 150
61/ For a detailed discussion of NSA Office of Security files on American citizens, see Church Committee Final Report, Book III, pp. 777-78.
62/ For a detailed discussion of the CIA's Operation CHAOS, see the Church Committee Final Report, Vol. Ill, pp. 681-720.
63/ Church Committee Final Report, Vol. III., p. 778. It is noteworthy that the destruction of these files occurred when Defense Department inspectors found them being held in violation of departmental directives prohibiting the maintenance of files on "non-affiliated" civilians. See Church Committee Final Report, Vol. Ill, p. 827.
64/ Adams v. William 407 U. S. 143 (1972); Wyman v. James 500 U. S. 309 (1971); Terry v. Ohio 392 U. S. 1 (1968): Camara v. Municipal Court 387 U. S. 523 (1967).
65/ § 47 U. S. C. 605, as originally enacted, provided, in pertinent part: "No person receiving, assisting in receiving, transmitting or assisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, substance, purport, effect, or meaning thereof, except through authorized channels of transmission or reception... on demand of other lawful authority. No person not being authorized by the sender shall intercept any radio communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person..."
66/ In Newfield v. Ryan 91 F.2d 700 (3rd Cir. 1937), cert, den. 302 U. S. 729 (1937), the court held that SEC subpoenas to telegraph companies to produce telegrams relating to matters under investigation constituted "other lawful authority” for purposes of section 605.
67/ Indeed, in Nardone v. United States 302 U. S. 379 (1937), the Supreme Court expressly decided that the second clause of section 605 "comprehends federal agents" within its prohibition. 302 U. S. at page 381.
68/ See Sen. Rep. No. 781, 73rd Cong., 2d Sess. 1 (1934); H. Rep. No. 1850, 73rd Cong., 2d Sess. 3 (1934).
69/ See Memorandum of Richard W. Cutler, "Possible Liabilities Arising from surrender of RCA- Transmitted Messages to Government Officials", November 11, 1948, reprinted in Abzug Committee Hearings, at p. 255 ff.
70/ See letter from Thomas K. Latimer, Department of Defense, to Robert Fink, Staff Member of the House Government Operations Committee, May 10, 1976, reprinted in Abzug Committee Hearings, at p. 324.
71/ See Church Committee Final Report, Vol. Ill, p. 769.
71/ See Church Committee Final Report, Vol. Ill, p. 769.
72/ United States v. United States District Court for the Eastern District of Michigan, 407, U. S. 297 (1972).
73/ 18 U. S. C. 2511 (3).
74/ United States v. Butenko 494 F. 2d 593 (3rd Cir. 1974), cert, den, sub nom United States v. Ivanov 419 U. S. 881 (1974).
75/ Ibid.
76/ Presumably, this would apply to purely domestic intercepts as well as international intercepts.
77/ The Butenko court also suggests that Fourth Amendment issues, as identified by the Supreme Court in Keith, supra, footnote 72, would be raised by surveillance conducted for other than foreign intelligence purposes. 494 F. 2d at page 603.
78/ See Church Committee Hearings, pp. 20-23.
79/ See Church Committee Final Report', Vol. III., pp. 770-776.
80/ Ibid.
81/ Church Committee Hearings, Vol. 5, p. 19. Former CIA Director William E. Colby gave similar testimony before the Pike Committee on August 6, 1975, stating: "On some occasions, (the interception of U. S. citizens' communications ) cannot be separated from the traffic that is being monitored. It is technologically impossible to separate them." p. 241. (In fact, Mr. Colby's use of the expression "on some occasions" is probably misleading inasmuch as NSA routinely faces this problem in its search of international communications entering and leaving the United States.)
82/ Letter from Michael Senkowski, Legal Assistant to the Chairman, Federal Communications Commission to Robert Fink, Professional Staff Member, Subcommittee on Government Information and Individual Rights, dated January 28, 1976.
83/ Church Committee Hearings, Vol. 5, p. 20.
84/ Ibid., p. 9.
85/ Church Committee Report, Book III, pp. 736-37.
86/ General Allen stated that when the watch-list activity began, it was viewed as "an appropriate part of the foreign intelligence mission". See Church Committee Hearings, Vol. 5, p. 23.
87/ Testimony of General Lew Allen, Jr., Church Committee Hearings, Vol. 5, p. 16. See also the statement of NSA Director Bobby R. Inman before the Senate Subcommittee on Intelligence and Human Rights, as reported in the Washington Post, July 22, 1977. Inman reportedly stated: "Let there be no doubt, no U. S. citizen is now targeted by the NSA in the United States or abroad."
88/ Senator Schweiker, at the Church Committee hearings asked then NSA Director Lew Allen, Jr.: "Is there any law that you feel prohibits you from intercepting messages between American citizens if one is at a foreign terminal and the other is at a domestic terminal, or do you feel there is no law that covers this situation?
"General Allen: No, I do not believe there is a law that specifically does that." (Church Committee Hearings, Vol. 5, p. 31.) See also discussion between Senator Mondale and NSA General Counsel Roy Banner at pp. 45-46.
89/ Senator Schweiker at the Church Committee hearings, asked then NSA Director Lew Allen, Jr.: "Would it be possible--granted this is not your policy, and you state that you have not done so--would it be possible to use this... apparatus that you have to monitor domestic conversations within the United States if some person with mal- intent desired to do it?
"General Allen: I don't think I really know how to answer the question. I suppose that such a thing is technically feasible." (Church Committee hearings, Vol. 5, p. 31.)
90/ For a discussion of the impact of actions taken by banks and their foreign depositors on U. S. foreign and 'economic policy, see the staff report' entitled "International Debt, The Banks, and U. S. Foreign Policy", Subcommittee on Foreign Economic Policy, Committee of Foreign Relations, U. S. Senate, 95th Cong., 1st Sess., 1977.
91/ The final report of the Pike Committee noted that "preliminary investigation reveals at least one new area of non-political and non-military emphasis in international intercept--economic intelligence. Communications interception in this area has rapidly developed since 1972, partly in reaction to the Arab oil embargo and the failure to obtain- good information on Russian grain production and negotiations for the purchase with American corporations", p. 88.
92/ Three such cases have been reported to the subcommittee. In the first, a U. S. Businessman engaged in selling commercial building products to a Middle East oil sheikdom, reported that soon after his first international communication regarding such sale, he and his wife were visited by federal intelligence agents who were knowledgeable about the proposed sale. He further suspected that he was kept under surveillance thereafter until the sale was completed. He reported that every aspect of the transaction had been conducted using international communications.
In a second case, a member of a Washington law firm, which represented a client involved in international trade, reported that in litigation with the Justice Department, the government presented evidence which could only have been obtained through the interception of its clients international communications. The law firm did not feel it was in their client's best interest to pursue the matter, however.
In the third case, a senior official of a large multinational U. S. corporation told the committee that he knew that NSA was intercepting its international communications. He stated that the company encrypted such communications but government regulations prevented the level of encryption from being so sophisticated that NSA would be prevented from reading it. He further stated, however, that the company felt such monitoring by the government to be "legitimate".
93/ Church Committee Hearings, Vol. 5, pp. 16-17.
94/ See New York Times, "Administration Maps Secret Plan to Fight Telephone Intrusion", July 10, 1977, p. 1; Washington Post, "Carter Seeking Ways to Block Interception of Classified Calls", July 11, 1977, p. A-3.
95/ Theoretically, NSA could determine what the Soviets were obtaining U. S. domestic communications by monitoring Soviet transmissions leaving this country. There has been doubt expressed by some authorities, notably David Kahn, author of The Codebreakers, however, that NSA is able to break Soviet coded transmissions See David Kahn, "Embassy Burglaries? Old Hat...", New York Times, June12, 1973. If this is true, then it would seem that NSA may be forced to monitor domestic communications itself, if it hopes to determine what the Soviets are gaining from these intercepts.
96/ See footnote 8.
97/ Church Committee Report, Book III, p.758. Recently, however, the Justice Department, for the first time, revealed evidence in civil-suit specifically attributed to NSA interceptions. See Washington Post, "NSA Tapped Six Overseas Messages by Attorney for Sirhan, FBI Reveals", August 3, 1977.
98/ Church Committee Hearings, Vol. 5, p. 111.
99/ Church Committee Hearings, Vol. 5, p. 18.
100 / Attorney General Eliot Richardson had apparently imposed informal restrictions upon NSA's monitoring of U. S. communications in 1973. See Church Committee Hearings, Vol. 5, p. 16. After the issuance of EO 11905, however, these restrictions were revised and issued by Attorney General Edward Levi on May. 26, 1976, pursuant to such order.
101/ Church Committee Hearings, Vol. 5, p. 16. This statement apparently made reference to the restriction imposed by Attorney General Richardson.
102/ Ibid., p. 30.
103/ Ibid., p. 31.
104/ See footnote 8.
105/ Letter from Comptroller General of the United States, Elmer G. Staats to Chairwoman Bella S. Abzug, November 12, 1976.
106/ Ibid., p. 5.
107/ Ibid.