Events: (Note that this is not the preferable method of finding events because not all events have been assigned topics yet)
Page 1 of 53 (5263 events (use filters to narrow search))previous
Future president Theodore Roosevelt, writing about the use of waterboarding as an interrogation method during the Spanish-American War, defends the practice. “The enlisted men began to use the old Filipino method: the water cure” (see 1800 and After), he writes in a letter. “Nobody was seriously damaged.” During the war, a US soldier, Major Edwin Glenn, was suspended and fined by an Army court-martial for waterboarding a prisoner. The Army judge advocate wrote that the charges constituted a “resort to torture with a view to extort a confession.” He recommended disapproval because “the United States cannot afford to sanction the addition of torture.” [National Public Radio, 11/3/2007]
The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]
Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” [David R. Moran, 2005]
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. [Moran, 7/17/1943 ]
The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).
In what Albania considers another Anglo-American plot to prepare the way for intervention, about 450 counterrevolutionaries organized in three forces again assault the city of Shkodra in northwest Albania. The attack is defeated by the military within hours, killing 33 rebels. Eight leaders are tried in a military court and shot, and 200 others are tried, but some are later released. The government also links the attack to an anti-government group in the legislature. [Hoxha, 1975, pp. 83, 103]
In the aftermath of World War II, Japanese officer Yukio Asano is charged by a US war crimes tribunal for torturing a US civilian. Asano had used the technique of “waterboarding” on the prisoner (see 1800 and After). The civilian was strapped to a stretcher with his feet in the air and head towards the floor, and water was poured over his face, causing him to gasp for air until he agreed to talk. Asano is convicted and sentenced to 15 years of hard labor. Other Japanese officers and soldiers are also tried and convicted of war crimes that include waterboarding US prisoners. “All of these trials elicited compelling descriptions of water torture from its victims, and resulted in severe punishment for its perpetrators,” reporter Evan Wallach will later write. In 2006, Senator Edward Kennedy (D-MA), discussing allegations of US waterboarding of terror suspects, will say in regards to the Asano case, “We punished people with 15 years of hard labor when waterboarding was used against Americans in World War II.” [Washington Post, 10/5/2006; National Public Radio, 11/3/2007]
Japanese soldier Chinsaku Yuki is tried by the US for war crimes involving, among other offenses, waterboarding Filipino civilians. One of his victims is lawyer Ramon Navarro. During the trial, Navarro recalls being waterboarded by Yuki. “When Yuki could not get anything out of me, he wanted the interpreter to place me down below,” he tells the court. “And I was told by Yuki to take off all my clothes, so what I did was to take off my clothes as ordered. I was ordered to lay on a bench and Yuki tied my feet, hands, and neck to that bench, lying with my face upward. After I was tied to the bench, Yuki placed some cloth on my face. And then with water from the faucet, they poured on me until I became unconscious. He repeated that four or five times.” Asked if he could breathe, Navarro says: “No, I could not, and so I, for a time, lost consciousness. I found my consciousness came back again and found Yuki was sitting on my stomach. And then I vomited the water from my stomach, and the consciousness came back again for me. [The water came f]rom my mouth and all openings of my face… and then Yuki would repeat the same treatment and the same procedure to me until I became unconscious again.” Navarro recalls he was tortured like this “four or five times.” He says he lied to Yuki to end the torment: “When I was not able to endure his punishment which I received, I told a lie to Yuki.… I could not really show anything to Yuki, because I was really lying just to stop the torture.” He describes the waterboarding as “[n]ot so painful, but one becomes unconscious—like drowning in the water.… Drowning. You could hardly breathe.” Yuki is sentenced to life in prison for a variety of war crimes, including his torture of Navarro. [National Public Radio, 11/3/2007]
Yugoslavia’s envoy to Albania Savo Zlatic requests a meeting with Albanian Prime Minister Enver Hoxha and Interior Minister Koci Xoxe regarding the views of the Central Committee of the Communist Party of Yugoslavia (CPY) on relations between the two countries. According to Hoxha’s later account, Zlatic starts by saying, “A general decline in our relations is being observed, and especially in the economy our relations are quite sluggish.” The Yugoslavs say disputes in joint enterprises are constantly being taken to an arbitration commission, that there is an improper attitude towards the Yugoslav advisers, and that Albanians are accusing the Yugoslavs of not fulfilling their obligations while being lax about fulfilling their own commitments.
Plans for a Balkan Federation - Zlatic says Yugoslav relations with Hungary, Romania, and Bulgaria are advancing much more than relations with Albania. Further, Zlatic says Albania’s draft five-year plan is autarchic, in going beyond grain growing and light industry, when the Yugoslavs can provide the products of heavy industry. Hoxha will later say that the Albanian leadership never intended to make their economy “an appendage of the Yugoslav economy” in the way Zlatic is suggesting, although perhaps Albanian Economy Minister Nako Spiru did when he signed an Economic Convention in Belgrade (see November 27, 1946). Hoxha says Spiru kept silent about any concerns he had. Hoxha will also later claim that Xoxe knew of plans for union between Yugoslavia and Albania, but he did not. Zlatic says “The present-day Yugoslavia is its embryo, the nucleus of the federation [of Yugoslavia, Albania, and Bulgaria],” and “In practice the ‘economic union’ is the federation itself.” The Yugoslav plan is to form joint military, culture, and foreign policies later, and include additional countries. The leadership should only talk about economic unification for the time being, Zlatic says, but “this is the best way for the rapid development of the relations of our joint economies,” which is a necessity for Albania. Therefore, Zlatic says, this is not Yugoslav “pressure” to unify. Zlatic says Spiru “put his trust in the advice of the Soviets” regarding the five-year plan, creating a “wrong, unrealistic, anti-Yugoslav and anti-Albanian” plan. Hoxha will later recount saying that the Albanian leadership sent Spiru to consult the Soviets and backs the plan. Yugoslavia calls for a strengthened Co-ordination Commission, as “a kind of joint economic government,” but Zlatic cannot give Hoxha details. The Yugoslavs have not allocated funds for Albania’s five-year plan, so Zlatic says there should only be a one-year plan for 1948. Scholar Paulin Kola will later write that Zlatic says Albania receives more aid than a republic of Yugoslavia and that Zlatic repeats the Yugoslav demand that Albania not make economic agreements with other countries without Yugoslavia’s approval.
Yugoslavs Accuse Spiru of Treason - Zlatic blames all of the problems on Spiru and his allies, while Hoxha expresses doubt and says Spiru is not in control. Zlatic says Spiru lied about Yugoslavia promising 21 billion dinars to Albania. Hoxha will later say that the Vice-President of the State Planning Commission, Kico Ngjela, verifies that the Yugoslavs promised the funding. Spiru is allegedly an “agent of imperialism” sabotaging Yugoslavia’s relations with Albania and the USSR. Hoxha requests Zlatic’s statements in writing, and Zlatic is evasive. Hoxha will later say the Yugoslavs’ real attack was on him, and that the allegations were a signal to Xoxe to try to replace him. [PLA, 1971, pp. 312; Hoxha, 1974, pp. 750 -753; Hoxha, 1982, pp. 353-373; Kola, 2003, pp. 89-90]
In a letter dated January 26, 1948, and delivered by Yugoslav General Milan Kupresanin, Tito tells Albanian leader Enver Hoxha that Greece, aided by the British and Americans, is about to invade Albania, so Yugoslavia wants to quietly station a division and supporting soldiers in the Korca region. Academic Paulin Kola will later claim that Albania proposes that the Albanian and Yugoslav soldiers should be under a unified command, as a step towards military unification. In his memoir, The Titoites, Hoxha will say that he tells Kupresanin that the request has to be discussed by the leadership and that he personally is against it. Kristo Themelko and Chief of the Albanian General Staff Beqir Balluku, who replaced Hoxha ally Mehmet Shehu, previously met with Tito and said Albania would accept the military assistance. Kupresanin comes with a team to survey the area. Hoxha replies that Albania can defend itself, the Greek government forces are wrapped up in an offensive against the Greek Democratic Army, the plan should not be hidden from the Albanian public, and that hosting the division would destabilize the region. Hoxha says to Kupresanin that “the worst thing would be if, from such a precipitate action, enemies or friends were to accuse us that Albania has been occupied by the Yugoslav troops!” and says Kupresanin briefly blanched. Xoci Xoxe is also at the meeting and supports the Yugoslav request, and says action should be taken quickly. Kupresanin is insulted when Hoxha says Yugoslavia should reinforce its own border with Greece if war is so imminent. Privately, Hoxha believes that “the urgent dispatch of Yugoslav to our territory would serve as an open blackmail to ensure that matters in the [Eighth] Plenum would go in the way that suited the Yugoslavs.” In a report to the Tirana party organization on October 4, 1948, Hoxha will say Yugoslavia was seeking to create “a phobia of imminent war” and divide Albania from the Soviets by “the stationing of a Yugoslav division in Korca and the dispatch of other divisions.” Since he cannot stop the Plenum from being held in February, he tries to stop the division from being approved, by requesting advice from the Soviets. The Soviet government subsequently says it does not expect a Greek invasion and that it agrees with Hoxha. In With Stalin, Hoxha will say that Stalin will tell him in spring 1949 that the USSR was not aware of the situation, though Yugoslavia claimed to be acting with Soviet approval.
Yugoslav Accounts - Subsequent memoirs by Yugoslav leaders Milovan Djilas, Edvard Kardelj, and Vladimir Dedjier will say that Albania was already hosting a Yugoslav air force regiment, and that Yugoslavia wanted to station two army divisions, at Albania’s request. Dedjier says that Stalin wanted Hoxha to make the request, and Jon Holliday will later outline several interpretations, based on the various possibly inaccurate accounts.
The Yugoslav Reaction - According to Hoxha’s report to the Tirana party organization, after Albania rejects the division, the Yugoslav envoy, presumably Kupresanin, calls for reorganization of the Albanian military, new roads and bridges to accommodate Yugoslav tanks, stringing new telegraph wires, and the mobilization of 10,000 soldiers and mules for transport, over two to three months. The Yugoslav also says Albania should tell the Soviets that it wants the Yugoslav division and ask why the Soviets oppose it. He asserts that Albania would only be able to defend itself for 10 days, while it would take 15 days for Yugoslav forces to reach southern Albania, and the UN would get involved, preventing Yugoslav intervention, which would be Hoxha’s fault. Albania agrees to make improvements and mobilize the soldiers and mules, on Yugoslav credits. Hoxha says the Yugoslavs are working through Kristo Themelko, who two or three times tells the Political Bureau that Albania needs to unify with Yugoslavia to carry out these measures. After March 30, Yugoslavia will reduce its involvement with Albania after a critical letter from the Central Committee of the CPSU(B) to the Central Committee of the Communist Party of Yugoslavia. [Hoxha, 1974, pp. 763 - 767; Hoxha, 1979, pp. 92-93; Hoxha, 1982, pp. 439-446; Halliday and Hoxha, 1986, pp. 106-108; Kola, 2003, pp. 93]
Entity Tags: Milovan Djilas, Paulin Kola, Greece, Milan Kupresanin, Mehmet Shehu, League of Communists of Yugoslavia, Soviet Communist Party, Josip Broz Tito, Kristo Themelko, Union of Soviet Socialist Republics, United Kingdom, United Nations, Albania, Beqir Balluku, Eduard Kardelj, Enver Hoxha, Yugoslavia, Jon Halliday, United States of America, Vladimir Dedijer, Greek Democratic Army
Timeline Tags: Kosovar Albanian Struggle
The FBI, led by director J. Edgar Hoover, begins to “accumulate the names, identities, and activities” of American citizens who are regarded as suspect. The information is gathered in a “security index,” which rapidly expands. In a letter to the White House during the Truman administration, Hoover will state that in the event of certain emergency situations, suspect individuals would be held in detention camps overseen by “the National Military Establishment.” By 1960, a congressional investigation will later reveal, the FBI list of suspicious persons will include “professors, teachers, and educators; labor-union organizers and leaders; writers, lecturers, newsmen, and others in the mass-media field; lawyers, doctors, and scientists; other potentially influential persons on a local or national level; [and] individuals who could potentially furnish financial or material aid” to unnamed “subversive elements.” [Radar, 5/2008]
Time Magazine’s Man of the Year cover for 1951. [Source: Wikipedia]Iranian President Mohammad Mosaddeq moves to nationalize the Anglo-Iranian Oil Company in order to ensure that more oil profits remain in Iran. His efforts to democratize Iran had already earned him being named Time Magazine’s Man of the Year for 1951. After he nationalizes it, Mosaddeq realizes that Britain may want to overthrow his government, so he closes the British Embassy and sends all British civilians, including its intelligence operatives, out of the country. Britain finds itself with no way to stage the coup it desires, so it approaches the American intelligence community for help. Their first approach results in abject failure when Harry Truman throws the British representatives out of his office, stating that "We don’t overthrow governments; the United States has never done this before, and we’re not going to start now." After Eisenhower is elected in November 1952, the British have a much more receptive audience, and plans for overthrowing Mosaddeq are produced. The British intelligence operative who presents the idea to the Eisenhower administration later will write in his memoirs, "If I ask the Americans to overthrow Mosaddeq in order to rescue a British oil company, they are not going to respond. This is not an argument that’s going to cut much mustard in Washington. I’ve got to have a different argument.…I’m going to tell the Americans that Mosaddeq is leading Iran towards Communism." This argument wins over the Eisenhower administration, who promptly decides to organize a coup in Iran (see August 19, 1953). [Stephen Kinzer, 7/29/2003]
The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]
CIA coup planner Kermit Roosevelt. [Source: Find a Grave (,com)]The government of Iran is overthrown by Iranian rebels and the CIA in a coup codenamed Operation Ajax. The coup was planned by CIA operative Kermit Roosevelt after receiving the blessings of the US and British governments. Muhammad Mosaddeq is deposed and the CIA promptly reinstates Shah Mohammad Reza Pahlavi on the throne. The Shah’s secret police, SAVAK, trained by the CIA and Israel’s Mossad, are widely perceived as being as brutal and terrifying as the Nazi Gestapo in World War II. British oil interests in Iran, partially nationalized under previous governments, are returned to British control. American oil interests are retained by 8 private oil companies, who are awarded 40% of the Iranian oil industry. US General Norman Schwarzkopf, Sr. (father of the general with the same name in the 1991 Gulf War) helps the Shah develop the fearsome SAVAK secret police. [ZNet, 12/12/2001; Global Policy Forum, 2/28/2002] Author Stephen Kinzer will say in 2003, "The result of that coup was that the Shah was placed back on his throne. He ruled for 25 years in an increasingly brutal and repressive fashion. His tyranny resulted in an explosion of revolution in 1979 the event that we call the Islamic revolution. That brought to power a group of fanatically anti-Western clerics who turned Iran into a center for anti-Americanism and, in particular, anti-American terrorism. The Islamic regime in Iran also inspired religious fanatics in many other countries, including those who went on to form the Taliban in Afghanistan and give refuge to terrorists who went on to attack the United States. The anger against the United States that flooded out of Iran following the 1979 revolution has its roots in the American role in crushing Iranian democracy in 1953. Therefore, I think it’s not an exaggeration to say that you can draw a line from the American sponsorship of the 1953 coup in Iran, through the Shah’s repressive regime, to the Islamic revolution of 1979 and the spread of militant religious fundamentalism that produced waves of anti-Western terrorism." [Stephen Kinzer, 7/29/2003]
The United States helps the Salvadoran government organize a rural paramilitary force known as the Democratic Nationalist Organization (ORDEN) and the Salvadoran National Security Agency (ANSESAL) under the auspices of General Jose Alberto “Chele” Medrano, who is a senior officer in the National Guard and Armed Forces High Command of El Salvador. As early as 1963, the Green Berets send over ten counterinsurgency trainers to help Medreno. Both agencies are formed with the stated purpose of combating communism. ORDEN is tasked with “indoctrinat[ing] the peasants regarding the advantages of the democratic system and the disadvantages of the communist system,” but also operates as an intelligence network. Intelligence relating to “subversive” activities will regularly be relayed to ANSESAL and then to the office of the president, who will then take “appropriate action.” ORDEN in particular will be later blamed for numerous human rights abuses, with Amnesty International accusing it of being created with the intention of using “clandestine terror against government opponents.” One of the offshoots of ORDEN, the White Hand (Mano Blanco), is later called “nothing less that the birth of the death squads” by a former US ambassador to El Salvador. [The Progressive, 5/1984; Montgomery, 1995, pp. 55-56]
President Dwight D. Eisenhower and President-elect John F. Kennedy meet at the White House for a final briefing before Eisenhower leaves office. Eisenhower tells Kennedy that he must assume responsibility for the overthrow of Fidel Castro and his government in Cuba, and recommends the hastening of the proposed Cuban invasion. Eisenhower says, “[W]e cannot let the present government there go on.” [Gravel, 9/29/1967, pp. 635-637; National Security Archive, 3/23/2001]
The CIA’s KUBARK interrogation manual is straightforward about the unreliability of torture as a means to acquire useful intelligence. (KUBARK is a CIA cryptogram for the agency itself.) The “KUBARK Counterintelligence Interrogation” manual states: “Intense pain is quite likely to produce false confessions, concocted as a means of escaping from distress. A time-consuming delay results, while investigation is conducted and the admissions are proven untrue. During this respite the interrogatee can pull himself together. He may even use the time to think up new, more complex’ admissions’ that take still longer to disprove.” The KUBARK manual is the product of over 10 years of research and testing, based on the experiences of US soldiers captured and tortured by Chinese interrogators. Waterboarding, called a method of “touchless torture,” elicited false confessions from the captured soldiers that the US planned to use biological weapons against North Korea. [Washington Post, 10/5/2006; Vanity Fair, 12/16/2008]
In Washington, D.C., US ambassador to Ghana William P. Mahoney meets with CIA Director John A. McCone and the deputy chief of the CIA’s Africa division [name unknown] to discuss a “Coup d’etat Plot” in Ghana. According to a CIA document summarizing the meeting, Mahoney says that he is uncertain whether the coup, being planned by Acting Police Commissioner Harlley and Generals “Otu” and “Ankrah,” will ever come to pass. Notwithstanding, he adds that he is confident that President Kwame Nkrumah will not make it another year, given his waning popularity and Ghana’s deteriorating economy. “In the interests of further weakening Nkrumah,” Mahoney recommends that the US deny Nkrumah’s forthcoming request for financial assistance, according to the CIA memo. He adds that by refusing the request it would make a “desirable impression on other countries in Africa,” the memo also says. In the event of a coup, Mahoney says a military junta would likely come to power. [Central Intelligence Agency, 3/11/1965; SeeingBlack (.com), 6/7/2002]
Svetlana Stalin, daughter of deceased Soviet leader Josef Stalin, defects to the West. The defection is arranged by the CIA’s station chief in India, David Blee, after Svetlana asks for asylum at the US embassy in Delhi. While officials in Washington are undecided about what to do about her request, Blee puts her on a plane and spirits her out of India to the West. The New York Times will later call this episode “one of Mr. Blee’s biggest early triumphs.” [New York Times, 8/17/2000; Los Angeles Times, 8/18/2000; Guardian, 8/22/2000]
US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]
Mount Weather, a secret underground government installation located about 50 miles west of Washington, DC (see 1950-1962), maintains a “Civil Crisis Management” program aimed at monitoring and managing civil emergencies, such as resource shortages, labor strikes, and political uprisings. The installation is a key component of the highly classified Continuity of Government (COG) program, which is meant to ensure the survival of the federal government in times of national emergency. “We try to monitor situations and get them before they become emergencies,” says Daniel J. Cronin, assistant director of the Federal Preparedness Agency (FPA), which is responsible for managing parts of the facility and program. As part of the program, Mount Weather collects and stores data regarding military and government installations, communications, transportation, energy and power, food supplies, manufacturing, wholesale and retail services, manpower, medical and educational institutions, sanitary facilities, population, and stockpiles of essential resources. The Progressive reports in 1976, “At the heart of the Civil Crisis Management program are two complicated computer systems called the ‘Contingency Impact Analysis System’ (CIAS) and the ‘Resource Interruption Monitoring System’ (RIMS).” The complex systems apparently interpret crisis situations, predict future outcomes, and provide possible solutions for emergencies. According to a 1974 FPA report obtained by The Progressive, CIAS and RIMS are used in close cooperation with private US companies “to develop a range of standby options, alternative programs… to control the economy in a crisis situation.” The Civil Crisis Management program is put on standby during several national anti-war demonstrations and inner city riots in 1967 and 1968. The program is activated during a 1973 Penn Railroad strike and is put to use again in 1974 when a strike by independent truckers threatens food and fuel shipments. By March 1976, the Civil Crisis Management program is being used on a daily basis to monitor potential emergencies. Senator John Tunney (D-CA) will claim in 1975 that Mount Weather has collected and stored data on at least 100,000 US citizens (see September 9, 1975). [Progressive, 3/1976]
David Blee, previously head of the CIA’s station in India, is appointed chief of its Near East division. One of his major responsibilities is tracking the emergence of Palestinian guerrilla groups, in the hope of anticipating their actions against Western targets. [New York Times, 8/17/2000; Guardian, 8/22/2000]
The NSA launches the first of seven satellites, code-named “Canyon,” that can pick up various types of voice and data traffic from Earth orbit. Canyon will lead to a more sophisticated satellite intelligence system, code-named “Rhyolite” (later “Aquacade”—see Early 1970s). [Federation of American Scientists, 7/17/1997]
The Washington Post runs a front-page photo of a US soldier supervising the waterboarding of a captured North Vietnamese soldier. The caption says the technique induced “a flooding sense of suffocation and drowning, meant to make him talk.” Because of the photo, the US Army initiates an investigation, and the soldier is court-martialed and convicted of torturing a prisoner. [National Public Radio, 11/3/2007]
1972 Nixon campaign button. [Source: Terry Ashe / Getty Images]Ten days into his administration, Richard Nixon meets with his chief of staff, H. R. Haldeman, and two other aides, Frederick LaRue and John Sears. The topic of discussion is Nixon’s re-election in 1972. Nixon wants to have a campaign committee for his re-election set up outside the Republican National Committee, and with separate, independent financing. He also authorizes continuous, year-round polling. [Reeves, 2001, pp. 34]
Former New York Police Department detective Jack Caulfield begins his new job as a White House aide. Caulfield was added to the White House by Nixon aide John Ehrlichman after President Nixon’s decision to use private, secretly held funds for political intelligence operations (see January 30, 1969). Caulfield is to conduct various political intelligence operations without being noticed by the CIA, the FBI, or the Republican National Committee. Originally, the idea was to pay Caulfield out of unspent campaign funds from the 1968 elections (see November 5, 1968), but Caufield insisted on being given a White House position. [Reeves, 2001, pp. 67]
Henry Kissinger. [Source: Library of Congress]Secretary of State Henry Kissinger, determined to prove to President Nixon that news stories about the secret Cambodian bombings are not being leaked to the press by liberals in the National Security Council offices, urges FBI director J. Edgar Hoover to wiretap several of Nixon’s top aides, as well as a selection of reporters. Kissinger will later deny making the request. [Werth, 2006, pp. 169] In March 1973, W. Mark Felt, the deputy director of the FBI and Washington Post reporter Bob Woodward’s famous “Deep Throat” background source, will confirm the wiretappings, saying: “In 1969, the first targets of aggressive wiretapping were the reporters and those in the administration who were suspected of disloyalty. Then the emphasis was shifted to the radical political opposition during the [Vietnam] antiwar protests. When it got near election time , it was only natural to tap the Democrats (see Late June-July 1971 and May 27-28, 1972). The arrests in the Watergate (see 2:30 a.m.June 17, 1972) sent everybody off the edge because the break-in could uncover the whole program.” [Bernstein and Woodward, 1974, pp. 271] Felt will tell Woodward that two of the reporters placed under electronic surveillance are Neil Sheehan and Hedrick Smith. Pentagon Papers leaker Daniel Ellsberg will leak the Defense Department documents to Sheehan (see March 1971). Eventually, future FBI director William Ruckelshaus will reveal that at least 17 wiretaps are ordered between 1969 and 1971. The logs of those wiretaps are stored in a safe in White House aide John Ehrlichman’s office. In all, 13 government officials and four reporters are monitored. [Bernstein and Woodward, 1974, pp. 313] The FBI will send Kissinger 37 letters reporting on the results of the surveillance between May 16, 1969 and May 11, 1970. When the surveillance is revealed to the Senate Watergate Committee, it will be shown that among those monitored are Nixon speechwriter and later New York Times columnist William Safire; Anthony Lake, a top Kissinger aide who will later resign over the secret bombings of Cambodia; and the military assistant to Secretary of Defense Melvin Laird, whom Kissinger regards as a political enemy. [Woodward, 2005, pp. 21-22]
Entity Tags: Richard M. Nixon, J. Edgar Hoover, Henry A. Kissinger, Hedrick Smith, Anthony Lake, Melvin Laird, Neil Sheehan, William Safire, W. Mark Felt, National Security Council, William Ruckelshaus
Timeline Tags: Civil Liberties, Nixon and Watergate
The Army drops all charges against six Green Berets accused of murdering a South Vietnamese interpreter, Thai Khac Chuyen, accused of being a North Vietnamese collaborator. The Green Berets did indeed murder Chuyen and drop his body in the South China Sea. The CIA, irate at the murder, alerted senior military officials and the Army begins courts-martial proceedings against the six. However, the White House convinces CIA Director Richard Helms not to let any of his agents testify at the trials; without their testimony, the Secretary of the Army, Stanley Resor, decides that the trials cannot continue. White House press secretary Ron Ziegler solemnly informs reporters that “[t]he president had not involved himself either in the original decision to prosecute the men or in the decision to drop the charges against them.” The news horrifies RAND Corporation defense analyst Daniel Ellsberg. He is convinced that President Nixon and his aides were indeed involved in the decision to stop the CIA from testifying in the case. Ellsberg has long known of a secret document detailing the origins of the Vietnam War; one of only fifteen copies of that document resides in a RAND safe. Ellsberg calls his friend Anthony Russo and secures the use of a Xerox copying machine. The two begin secretly making their own copies of the document. When Ellsberg later leaks the document to the press, it becomes known as the “Pentagon Papers” (see March 1971). [Reeves, 2001, pp. 127-132]
Edward Petty, an officer in the CIA’s counterintelligence section, produces a report saying that his boss, the controversial James Angleton, is probably a Soviet mole. The report cites 25 examples of suspicious behavior by Angleton, arguing that his disastrous impact on the CIA’s Soviet division demonstrates that he is under Kremlin control. Petty shows the report to several CIA managers, including Near East chief David Blee, and a full investigation is ordered. Angleton is cleared, but the investigation draws attention to his strange conduct and he will soon be replaced. [Guardian, 8/22/2000]
The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]
President Nixon meets with FBI Director J. Edgar Hoover, CIA Director Richard Helms, and the heads of the NSA and DIA to discuss a proposed new domestic intelligence system. His presentation is prepared by young White House aide Tom Charles Huston (derisively called “Secret Agent X-5” behind his back by some White House officials). The plan is based on the assumption that, as Nixon says, “hundreds, perhaps thousands, of Americans—mostly under 30—are determined to destroy our society.” Nixon complains that the various US intelligence agencies spend as much time battling with one another over turf and influence as they do working to locate threats to national security both inside and outside of the country. The agencies need to prove the assumed connections between the antiwar demonstrators and Communists. The group in Nixon’s office will now be called the “Interagency Committee on Intelligence,” Nixon orders, with Hoover chairing the new ad hoc group, and demands an immediate “threat assessment” about domestic enemies to his administration. Huston will be the White House liaison. Historian Richard Reeves will later write: “The elevation of Huston, a fourth-level White House aide, into the company of Hoover and Helms was a calculated insult. Nixon was convinced that both the FBI and the CIA had failed to find the links he was sure bound domestic troubles and foreign communism. But bringing them to the White House was also part of a larger Nixon plan. He was determined to exert presidential control over the parts of the government he cared most about—the agencies dealing with foreign policy, military matters, intelligence, law, criminal justice, and general order.” [Reeves, 2001, pp. 229-230]
President Nixon approves the “Huston Plan” for greatly expanding domestic intelligence-gathering by the FBI, CIA and other agencies. Four days later he rescinds his approval. [Washington Post, 2008] Nixon aide Tom Charles Huston comes up with the plan, which involves authorizing the CIA, FBI, NSA, and military intelligence agencies to escalate their electronic surveillance of “domestic security threats” in the face of supposed threats from Communist-led youth agitators and antiwar groups (see June 5, 1970). The plan would also authorize the surreptitious reading of private mail, lift restrictions against surreptitious entries or break-ins to gather information, plant informants on college campuses, and create a new, White House-based “Interagency Group on Domestic Intelligence and Internal Security.” Huston’s Top Secret memo warns that parts of the plan are “clearly illegal.” Nixon approves the plan, but rejects one element—that he personally authorize any break-ins. Nixon orders that all information and operations to be undertaken under the new plan be channeled through his chief of staff, H. R. Haldeman, with Nixon deliberately being left out of the loop. The first operations to be undertaken are using the Internal Revenue Service to harass left-wing think tanks and charitable organizations such as the Brookings Institution and the Ford Foundation. Huston writes that “[m]aking sensitive political inquiries at the IRS is about as safe a procedure as trusting a whore,” since the administration has no “reliable political friends at IRS.” He adds, “We won’t be in control of the government and in a position of effective leverage until such time as we have complete and total control of the top three slots of the IRS.” Huston suggests breaking into the Brookings Institute to find “the classified material which they have stashed over there,” adding: “There are a number of ways we could handle this. There are risks in all of them, of course; but there are also risks in allowing a government-in-exile to grow increasingly arrogant and powerful as each day goes by.” [Reeves, 2001, pp. 235-236] In 2007, author James Reston Jr. will call the Huston plan “arguably the most anti-democratic document in American history… a blueprint to undermine the fundamental right of dissent and free speech in America.” [Reston, 2007, pp. 102]
Entity Tags: US Department of Defense, National Security Agency, Richard M. Nixon, Brookings Institution, Central Intelligence Agency, Federal Bureau of Investigation, Ford Foundation, Internal Revenue Service, Tom Charles Huston, James Reston, Jr
Timeline Tags: Civil Liberties, Nixon and Watergate
After Egyptian President Gamal Abddul Nasser dies in October 1970, he is succeded as president of Egypt by his former Vice President, Anwar Sadat. Sadat is also a former member of the Muslim Brotherhood, and he promptly reinstates the group as a legal organization and welcomes them back into Egypt. Sadat also has a very close relationship with the head of Saudi intelligence, Kamal Adham. Through Adham, Sadat also develops close working relationships not only with the Saudis, but with the CIA and Henry Kissinger. Sadat uses the power of the religious right, and the Muslim Brothers in particular to contain the Nasserites and their resistance to the radical changes he introduces. During Sadat’s tenure in the 1970’s Egypt becomes a hotbed of Islamic fundamentalism, and figures like Sheikh Omar Abdul-Rahman and Ayman al-Zawahiri gain great power in Egypt during this period. Ironically Sadat himself is assassinated in 1981 by Islamic Jihad, an offshoot of the Muslim Brotherhood, in 1981, because of his accomodation with Israel. [Dreyfuss, 2005, pp. 147-162, 165]
David Blee, a former Office of Strategic Services agent (see (1943-1944)) who joined the CIA in 1947 (see 1947), is appointed head of the agency’s Soviet Division. Thanks to his appointment, Blee replaces James Angleton as the biggest influence on Soviet policy. Angleton is an extremely controversial figure at the agency who has run counterintelligence for over two decades and views every Soviet defector as a plant. Therefore, the CIA has rebuffed many potential defectors and even imprisoned one defector under what the New York Times will call “brutal conditions.” Angleton’s theory of a “monster plot” by the Soviets against the US has also led to a witch hunt for Soviet moles at the agency, harming morale and effectiveness. For example, the agency was so blind that in 1968 it was unable to predict the Warsaw Pact’s invasion of Czechoslovakia. Blee rejects the “monster plot” theory and reverses Angleton’s policy. The CIA’s doors are thrown open to defectors and this greatly increases the number of spies the agency has in the Soviet bloc. This posting is the high point of Blee’s career and he will subsequently be regarded as one of the agency’s finest ever officers for it (see September 18, 1997). Former CIA officer Haviland Smith will comment, “He was the architect of the program that turned the clandestine service back on target against the Soviets after all the years of Angleton.” Former agency Deputy Director of Operations Clair George will add, “He had a greater intellectual command of overseas operational activity than any officer I ever knew.” [New York Times, 8/17/2000; Los Angeles Times, 8/18/2000; Guardian, 8/22/2000]
Book cover of the Pentagon Papers. [Source: Daniel Ellsberg]The New York Times receives a huge amount of secret Defense Department documents and memos that document the covert military and intelligence operations waged by previous administrations in Vietnam (see January 15, 1969). The documents are leaked by Daniel Ellsberg, a former Defense Department official who worked in counterintelligence and later for the RAND Corporation while remaining an active consultant to the government on Vietnam. Ellsberg, a former aide to Secretary of State and National Security Adviser Henry Kissinger and a member of the task force that produced the Defense Department documents, has, over his tenure as a senior government official, become increasingly disillusioned with the actions of the US in Vietnam. [Herda, 1994] The documents are given to Times reporter Neil Sheehan by Ellsberg (see May 1969). [Bernstein and Woodward, 1974, pp. 313]
Ellsberg Tried to Interest Senators - After he and his friend Anthony Russo had copied the documents (see September 29, 1969), Ellsberg had spent months attempting to persuade several antiwar senators, including William Fulbright (D-AR), Charles Mathias Jr (R-MD), George McGovern (D-SD), and Paul “Pete” McCloskey (R-CA), to enter the study into the public record, all to no avail. But McGovern suggested that Ellsberg provide copies of the documents either to the New York Times or the Washington Post. Ellsberg knew Sheehan in Vietnam, and decided that the Times reporter was his best chance for making the documents public. [Reeves, 2001, pp. 333; Moran, 2007] Ellsberg originally gave copies of the documents—later dubbed the “Pentagon Papers”—to Phil Geyelin of the Washington Post, but the Post’s Katherine Graham and Ben Bradlee decided not to publish any of the documents. Ellsberg then gave a copy to Sheehan.
Documents Prove White House Deceptions - The documents include information that showed former President Dwight D. Eisenhower had made a secret commitment to help the French defeat the insurgents in Vietnam. They also show that Eisenhower’s successor, John F. Kennedy, had used a secret “provocation strategy” to escalate the US’s presence into a full-blown war that eventually led to the infamous Gulf of Tonkin incident. The documents also show that Kennedy’s successor, Lyndon Johnson, had planned from the outset of his presidency to expand the war [Spartacus Schoolnet, 8/2007] , and show how Johnson secretly paved the way for combat troops to be sent to Vietnam, how he had refused to consult Congress before committing both ground and air forces to war, and how he had secretly, and illegally, shifted government funds from other areas to fund the war. Finally, the documents prove that all three presidents had broken Constitutional law in bypassing Congress and sending troops to wage war in Vietnam on their own authority. [Herda, 1994]
Times Publishes Against Legal Advice - The Times will begin publishing them in mid-June 1971 (see June 13, 1971) after putting Sheehan and several other reporters up in the New York Hilton to sift through the mountain of photocopies and the senior editors, publishers, and lawyers argued whether or not to publish such a highly classified set of documents. The management will decide, against the advice of its lawyers, to publish articles based on the documents as well as excerpts from the documents themselves. [Moran, 2007]
Entity Tags: Paul McCloskey, Washington Post, Phil Geyelin, RAND Corporation, New York Times, Johnson administration, Kennedy administration, Charles Mathias, Jr, Ben Bradlee, Anthony Russo, Neil Sheehan, Daniel Ellsberg, Henry A. Kissinger, George S. McGovern, Katharine Graham, J. William Fulbright, US Department of Defense
Timeline Tags: Nixon and Watergate
The New York Times publishes the first of the so-called “Pentagon Papers,” the Defense Department’s secret history of the Vietnam War during the Kennedy and Johnson administrations (see January 15, 1969 and March 1971). The Washington Post will begin publishing the papers days later. [Reeves, 2001, pp. 330; Moran, 2007] The first story is entitled “Vietnam Archive: Pentagon Study Traces Three Decades of Growing US Involvement,” and is labeled the first of a series. [Moran, 2007] The opening paragraph, by reporter Neil Sheehan, reads, “A massive study of how the United States went to war in Indochina, conducted by the Pentagon three years ago, demonstrates that four administrations [Eisenhower, Kennedy, Johnson, and Nixon] progressively developed a sense of commitment to a non-Communist Vietnam, a readiness to fight the North to protect the South, and an ultimate frustration with this effort—to a much greater extent than their public statements acknowledged at the time.” [Reeves, 2001, pp. 330]
Nixon Believes Publication May Discredit Predecessors, Not Him - President Nixon, who is not mentioned in the papers, at first is not overly worried about the papers being made public, and feels they may actually do him more good than harm. [Werth, 2006, pp. 84-87] In a tape-recorded conversation the same day as the first story is published, Nixon tells National Security Adviser Henry Kissinger that in some ways, the story helps him politically, serving to remind the voting public that the Vietnam War is more the product of his predecessors’ errors than his own. Nixon says that the publication just proves how important it is for his administration to “clean house” of disloyal members who might take part in such a “treasonable” act. [Moran, 2007] “This is really tough on Kennedy, [Robert] McNamara [Kennedy’s secretary of defense], and Johnson,” he says. “Make sure we call them the Kennedy-Johnson papers. But we need… to keep out of it.” [Reeves, 2001, pp. 331]
Kissinger Argues that Leak is a Threat to Nixon's Administration - However, Kissinger is furious, yelling to his staff: “This will destroy American credibility forever. We might as well just tell it all to the Soviets and get it over with.” Kissinger convinces Nixon to try to stop the Times from publishing the documents by in part appealing to his masculinity—Nixon would not want to appear as a “weakling” to his foreign adversaries, Kissinger argues. Kissinger himself fears that his former association with Ellsberg will damage his own standing in the White House. Kissinger says he knows that Ellsberg is a womanizer and a “known drug user” who “shot at peasants in Vietnam,” and that information can be used to damage Ellsberg’s credibility (see Late June-July 1971). [Reeves, 2001, pp. 334; Werth, 2006, pp. 84-87] One of the arguments Kissinger successfully uses to stoke Nixon’s ire is that the papers were leaked by one or more “radical left-wing[ers]” to damage the administration’s credibility. Nixon calls the leak a “conspiracy” against him and his administration. [Moran, 2007] Nixon soon attempts to stop further publications with a lawsuit against the Times (see June 15, 1971). The Post will also become involved in the lawsuit. [Herda, 1994] Nixon initially believes former Kissinger aide Leslie Gelb, now of the Brookings Institute, is responsible for leaking the documents. Although Nixon does not know this, he is quite wrong. Gelb has always worried that the documents would cause tremendous controversy if ever made public. Only 15 copies exist: five in Secretary of Defense Melvin Laird’s safe; copies under lock and key at the Kennedy and Johnson presidential libraries; several copies in the hands of former Johnson administration officials, including McNamara and his successor, Clark Clifford; and two at the RAND Corporation. Nixon widens his speculation over the leak, telling his chief of staff H. R. Haldeman that someone on Kissinger’s staff may have leaked the documents, or maybe some unknown group of “f_cking Jews.” Regardless of who it is, Nixon says, “Somebody’s got to go to jail for that.” It is Kissinger who quickly figures that Ellsberg was the leaker. [Reeves, 2001, pp. 331-334]
After the New York Times publishes excerpts from the “Pentagon Papers” (see June 13, 1971), Attorney General John Mitchell sends a telegram to the Times at the behest of President Nixon demanding that the paper stop further publication of the excerpts. Mitchell argues that disclosing the information would cause “irreparable injury to the defense interests of the United States,” and claims that the publication is in violation of laws against espionage. The Times “respectfully declines” to cease publication of articles based on the documents. [Herda, 1994]
The New York Times publishes its third installment of the “Pentagon Papers” (see June 13, 1971 and June 14, 1971). A furious President Nixon demands an immediate court injunction to keep the paper from printing more excerpts. He orders: “I want to know who is behind this and I want the most complete investigation that can be conducted.… I don’t want excuses. I want results. I want it done, whatever the cost.” Secretary of State Henry Kissinger informs Nixon that he believes Daniel Ellsberg, who leaked the documents to the Times, is a “fanatic” and a “drug abuser.” Attorney General John Mitchell says that Ellsberg must be part of a communist “conspiracy” and suggests he be tried for treason. Nixon calls together a group of loyal White House aides to investigate Ellsberg’s leak of classified documents. The group will become known as the “plumbers” for their task to “plug the leaks” (see Late June-July 1971). Other undercover operators, including CIA agent E. Howard Hunt and G. Gordon Liddy, are recruited by White House special counsel Charles Colson. [Herda, 1994]
Entity Tags: Richard M. Nixon, New York Times, John Mitchell, David Young, Daniel Ellsberg, Henry A. Kissinger, Charles Colson, E. Howard Hunt, G. Gordon Liddy, ’Plumbers’, Egil Krogh, Central Intelligence Agency
Timeline Tags: Nixon and Watergate
At the behest of President Nixon (see June 15, 1971), the Justice Department files a motion with the US District Court in New York requesting a temporary restraining order and an injunction against the New York Times to prevent further publication of articles stemming from the “Pentagon Papers” (see June 13, 1971). The landmark case of New York Times Company v. United States begins. The government’s argument is based on the assertion that the publication of the documents jeopardizes national security, makes it more difficult to prosecute the Vietnam War, and endangers US intelligence assets. The Times will base its defense on the principles embodied in the First Amendment, as well as the argument that just because the government claims that some materials are legitimately classified as top secret, this does not mean they have to be kept out of the public eye; the Times will argue that the government does not want to keep the papers secret to protect national security, but instead to protect itself from embarrassment and possible criminal charges. The court grants the temporary restraining order request, forcing the Times to temporarily stop publishing excerpts from the documents. [Herda, 1994; Moran, 2007]
American citizens and lawmakers are outraged by the information revealed in the publication of portions of the so-called Pentagon Papers (see June 13, 1971, June 14, 1971, and June 15, 1971). Senator George McGovern (D-SD), a sponsor of legislation to withdraw all US troops from Vietnam by the end of 1971, says the documents tell a story of “almost incredible deception” of Congress and the American people by the White House. McGovern says he cannot see how any senator can ever again permit the president to make any foreign policy decisions without first going through Congress. Senate Majority Leader Hugh Scott (R-PA) expresses concern over the leaking of the documents, but calls their contents “shocking.” Representative Paul McCloskey (R-CA) says the papers show “the issue of truthfulness in government is a problem as serious as ending the war itself.” McCloskey complains that, according to the documents, the briefings he and other Congressional members had received regarding the war had been “deceptive… misleading [and] incomplete,” often while Army officials who knew more of the truth stood silently by his side. “This deception is not a matter of protecting secret information from the enemy,” McCloskey says, “the intention is to conceal information from the people of the United States as if we were the enemy.” [Herda, 1994]
A federal court, issuing a ruling in the case of New York Times Company v. United States (see June 15, 1971), refuses to order the Times to turn over its copy of the Pentagon Papers for government inspection, saying that it will not authorize a government fishing expedition into the files of any newspaper. [Herda, 1994] The court’s decision is overruled the next day, but by this point it is, for all intents and purposes, too late. The Washington Post prints its second installment and releases the article to the 341 newspapers that subscribe to its national news service. Within hours, newspapers across the country are publishing the Post excerpts. Daniel Ellsberg, who originally leaked the documents to the Times (see March 1971), is secretly traveling around the country, making the documents available to other news outlets. (Ellsberg is so successful at staying hidden that he is interviewed by CBS news anchor Walter Cronkite for a June 23 news special without the FBI being able to find him. Ellsberg will eventually surrender himself to the police (see June 28, 1971).) [Reeves, 2001, pp. 335-336]
Hearings over the legality of publication of the “Pentagon Papers” (see June 15, 1971) begin in federal court. Although the main newspaper publishing the Papers is the New York Times, the legality of the publication of an article derived from the Papers in another newspaper, the Washington Post, is also challenged in the hearings. The Justice Department will file charges against the Post similar to those already filed against the New York Times. [Herda, 1994]
After a series of rulings and appeals that fail to remove the temporary restraining order against the New York Times in the case surrounding its publication of the “Pentagon Papers” (see June 18, 1971), the newspaper files a request to have its case against the government heard in the US Supreme Court. Fearing that the articles will soon begin appearing in newspapers all over the country, the government asks the Supreme Court to block publication of the Papers in the press, and the Court agrees. Other newspapers hold off publication of similar articles until the Court can rule. [Herda, 1994]
Opening arguments in the Pentagon Papers case of New York Times Company v. United States (see June 15, 1971 and June 24, 1971) begin in the Supreme Court. The government argues that the publication of articles based on the documents constitutes a “grave and immediate danger” to US interests, and that the “integrity of the institution of the presidency” must be protected. For the Times, the arguments are that, first, since it took days for the government to respond to the publication of the first articles, the documents must not be that sensitive; lower courts could not find a single sensitive document among the documents; the government had no right imposing restraints on a newspaper’s First Amendment rights to publish in this situation; and that many times in recent history the Times and other news outlets had published “leaked” information, often information that was deliberately leaked by government sources. [Herda, 1994]
The Supreme Court rules 6-3 not to permanently enjoin the New York Times and other press organs from publishing articles derived from the Pentagon Papers (see June 26, 1971). Three justices, William O. Douglas, Hugo Black, and Thurgood Marshall, insist that the government can never suppress the publication of information no matter what the threat to national security; the other three in the majority, Potter Stewart, Byron White, and William Brennan, use a more moderate “common sense” standard that says, though the government can suppress publication of sensitive information under circumstances of war or national emergency, this case did not meet the criteria for such suppression. Chief Justice Warren Burger is joined by Harry Blackmun and John Harlan in dissenting; they believe that the president has the unrestrained authority to prevent confidential materials affecting foreign policy from being published. The Times’s lawyer says that the ruling will help ensure that a federal court will not issue a restraining order against a news outlet simply because the government is unhappy with the publication of a particular article. [Herda, 1994]
Entity Tags: Thurgood Marshall, Harry Blackmun, Byron White, Hugo Black, John Harlan, New York Times, Potter Stewart, William O. Douglas, Warren Burger, William Brennan, US Supreme Court
Timeline Tags: Civil Liberties, Nixon and Watergate
National Archives logo. [Source: public domain]Nixon aide John Ehrlichman suggests breaking into the National Archives. The mission: photograph secret documents Ehrlichman believes were deposited by former Kissinger aides Morton Halperin and Leslie Gelb, as well as Cold War policy adviser Paul Nitze. Ehrlichman says the operation can be carried out with the help of Robert Kunzig, the administrator of the General Services Administration (GSA). Kunzig “can send the archivist out of town for a while and we can get in there and we will photograph and he’ll reseal them.” It is unclear whether the mission is actually carried out. [Reeves, 2001, pp. 369-370]
James W. McCord, Jr. [Source: Spartacus Educational]Former FBI and CIA agent James W. McCord joins the staff of the Committee to Re-elect the President (CREEP) as a part-time security consultant. He will become the committee’s full-time security coordinator for CREEP in January 1972, and will perform similar duties for the Republican National Committee. [O.T. Jacobson, 7/5/1974 ]
G. Gordon Liddy [Source: ViewImages.com]G. Gordon Liddy, a lawyer with the White House, leaves his position to join the Committee to Re-elect the President (CREEP). [O.T. Jacobson, 7/5/1974 ]
The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]
CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 ]
In 1973 Israeli military authorities in charge of the West Bank and Gaza allow Sheikh Ahmed Yassin to establish the Islamic Center, an Islamic fundamentalist organization. With Israel’s support, Yassin’s organization soon gains control of hundreds of mosques, charities, and schools which serve as recruiting centers for militant Islamic fundamentalism. In 1976 Yassin creates another organization called the Islamic Association that forms hundreds of branches in Gaza. In 1978 the Islamic Association is licensed by the government of Menachem Begin over the objections of moderate Palesinians including the Commissioner of the Muslim Waqf in the Gaza Strip, Rafat Abu Shaban. Yassin also recieves funding from business leaders in Saudi Arabia who are also hostile to the secular PLO for religious reasons. The Saudi government, however, steps in and attempts to halt the private funds going to Yassin, because they view him as a tool of Israel. [United Press International, 2/24/2001; CounterPunch, 1/18/2003; Dreyfuss, 2005, pp. 195 - 197] Yassin will go on to form Hamas in the 1980s, which is created with the help of Israeli intelligence (see 1987).
In 1973 Afghan Prince Muhammad Daoud ousts the Afghan king with help from the Soviet Union, and establishes an Afghan republic. The CIA in turn begins funding Islamist extremists, including Gulbuddin Hekmatyar, as a resistance movement opposing the Soviets. US allies Iran, with its intelligence agency SAVAK, and Pakistan, with its intelligence agency the ISI, play an important role in funneling weapons and other forms of assistance to the Afghan Islamist militants. After the pro-Soviet coup in April 1978, the Islamic militants with the support of the ISI carry out a massive campaign of terrorism, assassinating hundreds of teachers and civil servants. [Dreyfuss, 2005, pp. 260 - 263]
Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 ]
Cofer Black joins the CIA. He will go on to be the chief of the CIA’s Counterterrorist Center when the 9/11 attacks occur. [Boston Globe, 11/2/2007]
A group of conservative strategic thinkers and policymakers attends a dinner party in Santa Monica, California. It is at this dinner party that the notorious “Team B” intelligence analysis team will be formed (see Early 1976). The cohost of the gathering is Albert Wohlstetter (see 1965), the eminent neoconservative academic and policy analyst. The next day, the guests join fellow conservative ideologues at a Beverly Hills conference called “Arms Competition and Strategic Doctrine.” Wohlstetter uses selectively declassified intelligence data to accuse the Pentagon of systematically underestimating Soviet military might. Wohlstetter will soon publish his arguments in the Wall Street Journal, Foreign Policy magazine, and Strategic Review. In July, respected Cold War figure Paul Nitze will use Wohlstetter’s assertions in testimony before the House Armed Services Committee to accuse Secretary of State Henry Kissinger and the CIA of dangerously underestimating both the Soviet Union’s military strength and its intentions. Some old-line Cold Warriors—many of whom find themselves in sympathy with the upstart neoconservatives—begin attacking both the CIA’s intelligence reporting and the US-Soviet policy of detente. Author Craig Unger will write, “This was the beginning of a thirty-year fight against the national security apparatus in which the [neoconservatives] mastered the art of manipulating intelligence in order to implement hard-line, militaristic policies.” [Unger, 2007, pp. 48-49]
1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 ]
Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom
Timeline Tags: Civil Liberties, Nixon and Watergate
Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]
Testifying before the Rockefeller Commission on the CIA’s activities in the US, the CIA’s Assistant Deputy Director for Operations David Blee indicates the agency does not spy on Americans. “We have always said that we did not operate that way [spying on the US’s own citizens], but that we went about it much more inefficiently, which is by penetrating the foreign government or foreign subversive operation and finding if that led us to an American, rather than trying to see what Americans were doing, and seeing if they were in touch with those groups,” he tells the commission. “In this, we operate very differently from practically all of the other security and intelligence services, which typically watch their own citizens to see what they are doing.” [US Congress, 4/13/1976]
Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).
Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice
Timeline Tags: Civil Liberties
Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]
Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr
Timeline Tags: Civil Liberties
Senator John V. Tunney, chairman of the Subcommittee on Constitutional Rights, claims Mount Weather, a secret government facility located about 50 miles west of Washington, DC (see 1952-1958), has collected and stored data on at least 100,000 US citizens. During a Congressional hearing into reports of domestic surveillance, Tunney alleges, “computers—described as ‘the best in world’—can obtain millions of pieces of information on the personal lives of American citizens.” Mount Weather maintains a state-of-the-art surveillance system as part of the facility’s Civil Crisis Management program (see 1967-1976). General Robert T. Bray, who is called to testify at the hearing, refuses to answer repeated questions regarding the data collection programs. Bray says he is “not at liberty” to disclose “the role and the mission and the capability” at Mount Weather, “or any other precise location.” Mount Weather and nearly 100 other “Federal Relocation Centers” are considered a key aspect of the highly classified Continuity of Government (COG) program (see 1950-1962), which is designed to ensure the survival of the federal government in times of national emergency. Bray admits to committee members that Mount Weather stores data relating to “military installations, government facilities, communications, transportation, energy and power, agriculture, manufacturing, wholesale and retail services, manpower, financial, medical and educational institutions, sanitary facilities, population, housing shelter, and stockpiles.” Senator James Abourezk says, “the whole operation has eluded the supervision of either Congress or the courts.” Senator Tunney says Mount Weather is “out of control.” [Progressive, 3/1976]
The BVD, a Dutch intelligence service, begins investigating A. Q. Khan over suspicions he is passing on nuclear secrets from the uranium enrichment company Urenco, for which he works, to Pakistan. The investigation starts because of two incidents. In the first, the Pakistani embassy in Belgium uses a report that appears to have come from one of Urenco’s owners to order specialized wrapping foil for centrifuges from Metalimphy, a French company. Metalimphy checks with Urenco’s owner, which says that the report belongs to it, and should not be in the Pakistanis’ hands. The BVD then learns that Khan was asking suspicious questions at a trade fair in Switzerland about atomic weapons. [Armstrong and Trento, 2007, pp. 54]
Ruud Lubbers. [Source: ru(.nl)]After the BVD, a Dutch intelligence agency, informs the CIA that it intends to arrest A. Q. Khan over the passage of nuclear secrets to Pakistan (see Mid-October 1975), the CIA tells the Dutch to let Khan continue with his activities. Former Dutch Minister of Economc Affairs Ruud Lubbers will say, “The Americans wished to follow and watch Khan to get more information.” Lubbers questions this and the CIA tells him to block Khan’s access to the secrets, which the Dutch do by promoting him to a job where he no longer has access to sensitive data from the uranium enrichment company Urenco. Lubbers will later suggest that the real reason the US does not want Khan arrested is because of its interest in helping Pakistan, an enemy of Soviet-leaning India. Because Khan no longer has access to the sensitive data after his promotion, the CIA cannot find out anything by monitoring him. In addition, the promotion alerts Khan to the fact he may be under surveillance, and he flees to Pakistan in mid-December. Authors David Armstrong and Joe Trento will later comment: “What no one yet realized was that Khan had already absconded with the plans for almost every centrifuge on Urenco’s drawing board, including the all-important G-2 [centrifuge]. It would prove to be one of the greatest nuclear heists of all time.” [Armstrong and Trento, 2007, pp. 54]
In preparation for the upcoming “Halloween Massacre” (see November 4, 1975 and After), Chief of Staff Donald Rumsfeld, who has what he thinks are secret ambitions for the presidency (see September 21, 1974 and After), convinces President Ford to name George H. W. Bush as CIA director because of that position’s political liabilities. When Bush accepts the position, Rumsfeld says this will “sink the son of a b_tch for good.” During his Senate confirmation hearings, Bush will publicly be asked to promise that he won’t be Ford’s running mate in 1976. “Bush thought that was a total violation of his Constitutional rights,” Pete Seeley, who will become Bush’s press secretary in 1981, will recall. “He was not happy. But he was always a team player and he did as he was asked.” Bush always believes Rumsfeld planted this question. Bush will never forgive Rumsfeld for trying to sabotage his political aspirations. [Unger, 2007, pp. 52-53]
Agha Hasan Abedi. [Source: Terry Kirk / Financial Times]Investigative journalist Joseph Trento will later report that in 1976, the Safari Club, a newly formed secret cabal of intelligence agencies (see September 1, 1976-Early 1980s), decides it needs a network of banks to help finance its intelligence operations. Saudi Intelligence Minister Kamal Adham is given the task. “With the official blessing of George H. W. Bush as the head of the CIA, Adham transformed a small Pakistani merchant bank, the Bank of Credit and Commerce International (BCCI), into a world-wide money-laundering machine, buying banks around the world to create the biggest clandestine money network in history.” BCCI was founded in 1972 by a Pakistani named Agha Hasan Abedi, who was an associate of Adham’s. Bush himself has an account at BCCI established while still director of the CIA. French customs will later raid the Paris BCCI branch and discover the account in Bush’s name. [Trento, 2005, pp. 104] Bush, Adham, and other intelligence heads work with Abedi to contrive “a plan that seemed too good to be true. The bank would solicit the business of every major terrorist, rebel, and underground organization in the world. The intelligence thus gained would be shared with ‘friends’ of BCCI.” CIA operative Raymond Close works closely with Adham on this. BCCI taps “into the CIA’s stockpile of misfits and malcontents to help man a 1,500-strong group of assassins and enforcers.” [Trento, 2005, pp. 104] Soon, BCCI becomes the fastest growing bank in the world. Time magazine will later describe BCCI as not just a bank, but also “a global intelligence operation and a Mafia-like enforcement squad. Operating primarily out of the bank’s offices in Karachi, Pakistan, the 1,500-employee black network has used sophisticated spy equipment and techniques, along with bribery, extortion, kidnapping and even, by some accounts, murder. The black network—so named by its own members—stops at almost nothing to further the bank’s aims the world over.” [Time, 7/22/1991]
CPD logo. [Source: Committee on the Present Danger]A group of hardline Cold Warriors and neoconservatives revive the once-influential Committee on the Present Danger (CPD) in order to promote their anti-Soviet, pro-military agenda. The CPD is an outgrowth of the Coalition for a Democratic Majority (CDM), itself a loose amalgamation of neoconservatives and Democratic hawks.
Confederation of Establishment Conservatives, Neoconservatives, and Hawkish Democrats - The CPD is led by Eugene Rostow, the head of the CDM’s foreign policy task force. Others include CIA spymaster William Casey; iconic Cold War figure and “Team B” member Paul Nitze (see January 1976 and Late November, 1976); established neoconservatives such as Norman Podhoretz and Team B leader Richard Pipes (see Early 1976); rising neoconservative stars like Jeane Kirkpatrick, Midge Decter, Donald Brennan, and Richard Perle; conservative Democrats such as Nitze and former Secretary of State Dean Rusk; established Republicans such as House representative Claire Booth Luce (R-CT), David Packard, Nixon’s deputy secretary of defense, Andrew Goodpaster, Eisenhower’s National Security Adviser, millionaire Richard Mellon Scaife; and famed military officers such as Admiral Elmo Zumwalt. [Unger, 2007, pp. 58-59; Scoblic, 2008, pp. 99-100]
No 'Realists' - Author Craig Unger will write: “Ultimately, in the CPD, one could see the emerging fault lines in the Republican Party, the ideological divide that separated hardline neocons and Cold Warriors from the more moderate, pragmatic realists—i.e. practitioners of realpolitik such as Henry Kissinger, Brent Scowcroft, George H. W. Bush, and James Baker. All of the latter were conspicuously absent from the CPD roll call.” [Unger, 2007, pp. 58-59]
Advocates US First Strike against USSR - Like the CDM and Team B, the CPD believes that the entire concept of detente with the Soviet Union is an abject failure, and the only way to deal with the ravenously hegemonical USSR is through armed confrontation. Like Team B (see November 1976), the CPD insists, without proof, that the USSR has made far greater strides in increasing the size and striking power of its nuclear arsenal; and like Team B, no amount of debunking using factual information stops the CPD from making its assertions (see November 1976). The US must drastically increase its stockpile of nuclear and conventional weapons, it maintains, and also be prepared to launch a nuclear first strike in order to stop the USSR from doing the same. In April 1977, the CPD evokes the familiar neoconservative specter of appeasement by writing, “The Soviet military build-up of all its armed forces over the past quarter century is, in part, reminiscent of Nazi Germany’s rearmament in the 1930s.” Author J. Peter Scoblic will observe, “The CPD saw itself as a collection of [Winston] Churchills facing a country of [Neville] Chamberlains.” In 1978, the CPD predicts, “The early 1980s threaten to be a period of Soviet strategic nuclear superiority in which America’s second-strike capability will become vulnerable to a Soviet pre-emptive attack without further improvements in US weapons.” [Unger, 2007, pp. 58-59; Scoblic, 2008, pp. 99-100]
Spreading Propaganda - According to a 2004 BBC documentary, the CPD will produce documentaries, publications, and provide guests for national talk shows and news reports, all designed to spread fear and encourage increases in defense spending, especially, as author Thom Hartmann will write, “for sophisticated weapons systems offered by the defense contractors for whom neocons would later become lobbyists.” [Common Dreams (.org), 12/7/2004; BBC, 1/14/2005]
Entity Tags: Nixon administration, Jeane Kirkpatrick, Midge Decter, Paul Nitze, Richard Pipes, Richard Perle, William Casey, Thomas Hartmann, James A. Baker, Richard Mellon Scaife, Norman Podhoretz, Henry A. Kissinger, Eugene V. Rostow, Central Intelligence Agency, Brent Scowcroft, George Herbert Walker Bush, Claire Booth Luce, Committee on the Present Danger, Coalition for a Democratic Majority, David Dean Rusk, Elmo Zumwalt, Craig Unger, Eisenhower administration, David Packard, Donald Brennan, Andrew Goodpaster
Timeline Tags: US International Relations, Neoconservative Influence
CIA manager David Blee files a report warning others at the agency about the situation in Iran. Blee, who has some experience in Middle Eastern affairs (see (1967)), cautions that the US knows little about Iranian leader Shah Mohammed Reza Pahlavi, in particular his stockpiling of military equipment. [Los Angeles Times, 8/18/2000]
US intelligence discovers that Pakistan has begun a “crash program” to build a nuclear weapon. The weapon is to be a plutonium bomb made using fuel from a reprocessing plant that will be built in Pakistan by the French and financed by Libya. The Ford administration attempts to pressure Pakistan to give up these attempts, and in a meeting in August 1976 Secretary of State Henry Kissinger will offer Pakistan over a hundred fighter planes in return for its giving up the efforts. He will also threaten to “make a horrible example” of Pakistani Prime Minister Zulfikar Ali Bhutto. Pakistan will not respond to these threats, but will eventually abandon this program in favor of attempts to build a uranium bomb by Pakistani nuclear scientist A. Q. Khan. [Armstrong and Trento, 2007, pp. 62-63]
Richard Pipes. [Source: Mariusz Kubik]After George H. W. Bush becomes the head of the CIA (see November 4, 1975 and After), he decides to break with previous decisions and allow a coterie of neoconservative outsiders to pursue the allegations of Albert Wohlstetter that the CIA is seriously underestimating the threat the USSR poses to the US (see 1965), allegations pushed by hardliners on the President’s Foreign Intelligence Advisory Board.
Internal Opposition - Bush’s predecessor, William Colby, had steadfastly refused to countenance such a project, saying, “It is hard for me to envisage how an ad hoc ‘independent’ group of government and non-government analysts could prepare a more thorough, comprehensive assessment of Soviet strategic capabilities—even in two specific areas—than the intelligence community can prepare.” (Bush approves the experiment by notating on the authorization memo, “Let ‘er fly!”) The national intelligence officer in charge of the National Intelligence Estimate on the USSR, Howard Stoertz, will later recall: “Most of us were opposed to it because we saw it as an ideological, political foray, not an intelligence exercise. We knew the people who were pleading for it.” But Bush, on the advice of deputy national security adviser William Hyland, agrees to the exercise. Hyland says the CIA had been getting “too much flak for being too peacenik and detentish…. I encouraged [Bush] to undertake the experiment, largely because I thought a new director ought to be receptive to new views.” The neocon team of “analysts” becomes known as “Team B,” with “Team A” being the CIA’s own analytical team. It is unprecedented to allow outsiders to have so much access to highly classified CIA intelligence as Bush is granting the Team B neocons, so the entire project is conducted in secret. CIA analyst Melvin Goodman later says that President Ford’s chief of staff, Dick Cheney, is one of the driving forces behind Team B. The outside analysts “wanted to toughen up the agency’s estimates,” Goodman will say, but “Cheney wanted to drive [the CIA] so far to the right it would never say no to the generals.” [Dubose and Bernstein, 2006, pp. 208; Unger, 2007, pp. 53-55]
Political Pressure - Ford’s political fortunes help push forward the Team B experiment. Ford has been a strong proponent of detente with the Soviet Union, but his poll numbers are sagging and he is facing a strong presidential primary challenger in Governor Ronald Reagan (R-CA), an avowed hardliner. Reagan is making hay challenging Ford’s foreign policy, claiming that the so-called “Ford-Kissinger” policies have allowed the Soviet Union to leap ahead of the US both militarily and geopolitically. In response, Ford has lurched to the right, banning the word “detente” from speeches and statements by White House officials, and has been responsive to calls for action from the newly reforming Committee on the Present Danger (CPD—see 1976). In combination, these political concerns give Bush the justification he wants to push forward with the Team B experiment.
Three B Teams - According to Carter administration arms control official Anne Cahn, there are actually three “B” teams. One studies Soviet low-altitude air defense capabilities, one examines Soviet intercontinental ballistic missile (ICBM) accuracy, and the third, chaired by Harvard Sovietologist Richard Pipes, examines Soviet strategic policy and objectives. It is Pipes’s team that becomes publicly known as “Team B.” [Bulletin of Atomic Scientists, 4/1993]
Assembling the Team - Pipes fits in well with his small group of ideological hardliners. He believes that the USSR is determined to fight and win a nuclear war with the US, and he is bent on putting together an analysis that proves his contention. He asks Cold War icon Paul Nitze, the former Secretary of the Navy, to join the team. Richard Perle, a core member, has Pipes bring in Paul Wolfowitz, one of Wohlstetter’s most devout disciples. Wolfowitz immediately begins arguing for the need to deploy tactical nuclear weapons in Europe. The “incestuous closeness” of the members, as Cahn later calls it, ensures that the entire group is focused on the same goals as Wohlstetter and Pipes, with no dissension or counterarguments. Other key members include William von Cleave and Daniel Graham. The entire experiment, Cahn will write, “was concocted by conservative cold warriors determined to bury détente and the SALT process. Panel members were all hard-liners,” and many are members of the newly reconstituted “Committee on the Present Danger” (see 1976). The experiment is “leaked to the press in an unsuccessful attempt at an ‘October surprise’ [an attempt to damage the presidential hopes of Democrat Jimmy Carter—see Late November, 1976]. But most important, the Team B reports became the intellectual foundation of ‘the window of vulnerability’ and of the massive arms buildup that began toward the end of the Carter administration and accelerated under President Reagan.” Team B will formally debate its CIA adversaries, “Team A,” towards the end of the year (see November 1976). [Bulletin of Atomic Scientists, 4/1993; Quarterly Journal of Speech, 5/2006 ; Unger, 2007, pp. 53-55]
'Designed to be Prejudiced' - In 2008, author J. Peter Scoblic will note, “Team B was designed to be prejudiced.” Pipes, the Soviet experts, holds a corrosive hatred of the Soviet Union, in part stemming from his personal experiences as a young Jew in Nazi-occupied Warsaw, and his belief that the Soviet system is little different from the Nazis. When asked why his team is stacked with hardline opponents of arms negotiations and diplomacy of any kind with the USSR, Pipes replies, “There is no point in another, what you might call, optimistic view.” Scoblic will write, “Team B, in short, begged the question. Its members saw the Soviet threat not as an empirical problem but as a matter of faith.” He will add, “For three months, the members of Team B pored over the CIA’s raw intelligence data—and used them to reaffirm their beliefs.” [Scoblic, 2008, pp. 93-94]
Entity Tags: Richard Perle, Richard Pipes, William Hyland, Paul Nitze, William Colby, J. Peter Scoblic, Paul Wolfowitz, George Herbert Walker Bush, ’Team A’, ’Team B’, Anne Cahn, Albert Wohlstetter, Foreign Intelligence Advisory Board, Central Intelligence Agency, Howard Stoertz
Timeline Tags: US International Relations, Neoconservative Influence
The NSA maintains a watch list of high-tech companies based in Germany and Switzerland that are suspected of helping Pakistan with its nuclear weapons program. The companies’ telexes and faxes are “routinely intercepted and translated for signs of nuclear trafficking with Pakistan.” [New Yorker, 3/29/1993]
Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]
Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News
Timeline Tags: Civil Liberties
Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]
Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission
Timeline Tags: Civil Liberties
Frits Veerman. [Source: atoomspionage(.com)]Pakistani nuclear scientist A. Q. Khan asks a former European associate, Frits Veerman, to help him with Pakistan’s nuclear weapons program, but Veerman refuses and informs officials at his employer, Physical Dynamics Research Laboratory (FDO). The request is made in a letter hand-delivered by two Pakistani scientists on a business trip to the Netherlands and “very confidentially” asks Veerman to provide assistance “urgently” for a “research program.” Khan wants Veerman, who is already suspicious of Khan (see Mid-1975), to provide him with drawings of tiny steel ball bearings used in centrifuges, as well as some sample bearings, metal membranes, and steel springs used to dampen centrifuges. Realizing that this information is secret, Veerman refuses to provide it. He also alerts FDO, which in turn informs the Dutch authorities. The Dutch begin to harass Veerman as a result (see (August 1976)). [Armstrong and Trento, 2007, pp. 6]
After Frits Veerman, an employee at Physical Dynamics Research Laboratory (FDO), learns of an attempt by Pakistani nuclear scientist A. Q. Khan to steal more nuclear secrets from the Netherlands (see July 1976), he informs his supervisor at the company of the attempted theft. He also gives his supervisor a letter Khan had sent him detailing what secrets Khan wanted from Veerman, but the supervisor tells Veerman that if he does not destroy the letter he will be arrested. FDO informs the Dutch authorities of the case, and they arrest Veerman, accusing him of spying. In response, Veerman, who had repeatedly warned his superiors of Khan’s activities (see Mid-1975), then accuses the Dutch authorities of allowing the export of dangerous technology from the Netherlands. Veerman is released after two days and told, “You may not talk about this to anyone,” because “[i]t is dangerous for the Netherlands.” [Armstrong and Trento, 2007, pp. 66]
Alexandre de Marenches. [Source: Thierry Orban/ Corbis Sygma]Prince Turki al-Faisal, head of Saudi intelligence from 1979, will say in a 2002 speech in the US, “In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.” [Scott, 2007, pp. 62] An Egyptian reporter digging through Iranian government archives will later discover that the Safari Club was officially founded on September 1, 1976. Alexandre de Marenches, head of the French external intelligence service SDECE, was the chief instigator of the group. Millions are spent to create staff, offices, communications, and operational capability. Periodic secret conferences are held in Saudi Arabia, France, and Egypt. This group plays a secret role in political intrigues in many countries, mostly in Africa and the Middle East. For instance, a rebellion in Zaire is put down by Moroccan and Egyptian troops, using French air support. It also plays a role in the US-Egyptian-Israeli peace treaty of 1979. [Cooley, 2002, pp. 15-17] Author Joe Trento will later allege that the Safari Club, and especially the Saudi intelligence agency led by Kamal Adham and then his nephew Prince Turki from 1979 onwards, fund off-the-books covert operations for the CIA. But rather than working with the CIA as it is being reformed during the Carter administration, this group prefers to work with a private CIA made up of fired agents close to ex-CIA Director George Bush Sr. and Theodore Shackley, who Trento alleges is at the center of a “private, shadow spy organization within” the CIA until he is fired in 1979. The Safari Club and rogue CIA will play a major role in supporting the mujaheddin in Afghanistan. [Scott, 2007, pp. 63-64, 111] It is not clear when the Safari Club disbands, but it existence was exposed not long after the shah was deposed in Iran in 1979, and it seems to have disappeared by the time de Marenches stepped down from being head of French intelligence in 1982. [Cooley, 2002, pp. 15-17]
The neoconservatives of the “Team B” intelligence analysis team (see Early 1976) are unconcerned with the heavy criticism being leveled at their findings about the Soviet threat (see November 1976). Richard Pipes, the head of Team B, says that just because their facts are all wrong, their conclusions from those erroneous “facts” are still correct. Those errors are “just details,” he says. “The important thing was reading the Soviet mindset,” he asserts. “We were saying they don’t want war, but if they do have war, they will resort immediately to nuclear weapons.” Regardless of the errors, Defense Secretary Donald Rumsfeld will hail the findings (see Late November 1976). [Unger, 2007, pp. 57]
A team of young, mid-level CIA and DIA analysts, informally dubbed “Team A,” debates the neoconservative/hardline group of outside “analysts” known as “Team B” (see Early 1976) over the CIA’s estimates of Soviet military threats and intentions. The debate is a disaster for the CIA’s group. Team B uses its intellectual firepower and established reputations of members such as Richard Pipes and Paul Nitze to intimidate, overwhelm, and browbeat the younger, more inexperienced CIA analysts. “People like Nitze ate us for lunch,” recalls one member of Team A. “It was like putting Walt Whitman High versus the [NFL’s] Redskins. I watched poor GS-13s and GS-14s [middle-level analysts with modest experience and little real influence] subjected to ridicule by Pipes and Nitze. They were browbeating the poor analysts.” Howard Stoertz, the national intelligence officer who helped coordinate and guide Team A, will say in hindsight, “If I had appreciated the adversarial nature [of Team B], I would have wheeled up different guns.” Team A had prepared for a relatively congenial session of comparative analysis and lively discussion; Team B had prepared for war.
Ideology Trumps Facts - Neither Stoertz nor anyone else in the CIA appreciated how thoroughly Team B would let ideology and personalities override fact and real data. While CIA analysts are aware of how political considerations can influence the agency’s findings, the foundation of everything they do is factual—every conclusion they draw is based on whatever facts they can glean, and they are leery of extrapolating too much from a factual set. Team A is wholly unprepared for B’s assault on their reliance on facts, a line of attack the CIA analysts find incomprehensible. “In other words,” author Craig Unger will write in 2007, “facts didn’t matter.” Pipes, the leader of Team B, has argued for years that attempting to accurately assess Soviet military strength is irrelevant. Pipes says that because it is irrefutable that the USSR intends to obliterate the US, the US must immediately begin preparing for an all-out nuclear showdown, regardless of the intelligence or the diplomatic efforts of both sides. Team B is part of that preparation. [Bulletin of Atomic Scientists, 4/1993; Unger, 2007, pp. 53-57] Intelligence expert John Prados, who will examine the contesting reports, later says that while the CIA analysts believe in “an objective discoverable truth,” the Team B analysts engaged in an “exercise of reasoning from conclusions” that they justify, not in factual, but in “moral and ideological terms.” According to Prados’s analysis, Team B had no real interest in finding the truth. Instead, they employed what he calls an adversarial process similar to that used in courts of law, where two sides present their arguments and a supposedly impartial judge chooses one over the other. Team B’s intent was, in essence, to present the two opposing arguments to Washington policy makers and have them, in author J. Peter Scoblic’s words, “choose whichever truth they found most convenient.” [Scoblic, 2008, pp. 98]
Attacking the Intelligence Community - The first sentence of Team B’s report is a frontal assault on the US intelligence community. That community, the report says, had “substantially misperceived the motivations behind Soviet strategic programs, and thereby tended consistently to underestimate their intensity, scope, and implicit threat.” Team B writes that the intelligence community has failed to see—or deliberately refused to see—that the entire schema of detente and arms limitations negotiations are merely elements of the Soviet push for global domination.
Fighting and Winning a Nuclear War - Team B writes that the Soviets have already achieved measurable superiority in nuclear weaponry and other military benchmarks, and will use those advantages to cow and coerce the West into doing its bidding. The Soviets worship military power “to an extent inconceivable to the average Westerner,” the report asserts. The entire Soviet plan, the report goes on to say, hinges on its willingness to fight a nuclear war, and its absolute belief that it can win such a war. Within ten years, Team B states, “the Soviets may well expect to achieve a degree of military superiority which would permit a dramatically more aggressive pursuit of their hegemonial objectives.” [Scoblic, 2008, pp. 94-95]
Lack of Facts Merely Proof of Soviets' Success - One example that comes up during the debate is B’s assertion that the USSR has a top-secret nonacoustic antisubmarine system. While the CIA analysts struggle to point out that absolutely no evidence of this system exists, B members conclude that not only does the USSR have such a system, it has probably “deployed some operation nonacoustic systems and will deploy more in the next few years.” The absence of evidence merely proves how secretive the Soviets are, they argue. [Bulletin of Atomic Scientists, 4/1993; Unger, 2007, pp. 53-57] Anne Cahn, who will serve in the Arms Control and Disarmament Agency in the Carter administration, later says of this assertion, “They couldn’t say that the Soviets had acoustic means of picking up American submarines, because they couldn’t find it. So they said, well maybe they have a non-acoustic means of making our submarine fleet vulnerable. But there was no evidence that they had a non-acoustic system. They’re saying, ‘we can’t find evidence that they’re doing it the way that everyone thinks they’re doing it, so they must be doing it a different way. We don’t know what that different way is, but they must be doing it.‘… [The fact that the weapon doesn’t exist] doesn’t mean that it doesn’t exist. It just means that we haven’t found it yet.” Cahn will give another example: “I mean, they looked at radars out in Krasnoyarsk and said, ‘This is a laser beam weapon,’ when in fact it was nothing of the sort.… And if you go through most of Team B’s specific allegations about weapons systems, and you just examine them one by one, they were all wrong.… I don’t believe anything in Team B was really true.” [Bulletin of Atomic Scientists, 4/1993; Common Dreams (.org), 12/7/2004; BBC, 1/14/2005]
Soviet Strike Capabilities Grossly Exaggerated - Team B also hammers home warnings about how dangerous the Soviets’ Backfire bomber is. Later—too late for Team A—the Team B contentions about the Backfire’s range and refueling capability are proven to be grossly overestimated; it is later shown that the USSR has less than half the number of Backfires that B members loudly assert exist (500 in Team B’s estimation, 235 in reality). B’s assertions of how effectively the Soviets could strike at US missile silos are similarly exaggerated, and based on flawed assessment techniques long rejected by the CIA. The only hard evidence Team B produces to back their assertions is the official Soviet training manual, which claims that their air-defense system is fully integrated and functions flawlessly. The B analysts even assert, without evidence, that the Soviets have successfully tested laser and charged particle beam (CPB) weapons. [Bulletin of Atomic Scientists, 4/1993; Quarterly Journal of Speech, 5/2006 ] (The facility at Semipalatansk that is supposedly testing these laser weapons for deployment is in reality a test site for nuclear-powered rocket engines.) [Scoblic, 2008, pp. 96]
Fundamental Contradiction - One befuddling conclusion of Team B concerns the Soviets’ ability to continue building new and expensive weapons. While B acknowledges “that the Soviet Union is in severe decline,” paradoxically, its members argue that the threat from the USSR is imminent and will grow ever more so because it is a wealthy country with “a large and expanding Gross National Product.”
Allegations 'Complete Fiction' - Cahn will say of Team B’s arguments, “All of it was fantasy.… [I]f you go through most of Team B’s specific allegations about weapons systems, and you just examine them one by one, they were all wrong.” The CIA lambasts Team B’s report as “complete fiction.” CIA director George H. W. Bush says that B’s approach “lends itself to manipulation for purposes other than estimative accuracy.” His successor, Admiral Stansfield Turner, will come to the same conclusion, saying, “Team B was composed of outsiders with a right-wing ideological bent. The intention was to promote competition by polarizing the teams. It failed. The CIA teams, knowing that the outsiders on B would take extreme views, tended to do the same in self-defense. When B felt frustrated over its inability to prevail, one of its members leaked much of the secret material of the proceedings to the press” (see Late November, 1976). Former CIA deputy director Ray Cline says Team B had subverted the National Intelligence Estimate on the USSR by employing “a kangaroo court of outside critics all picked from one point of view.” Secretary of State Henry Kissinger says that B’s only purpose is to subvert detente and sabotage a new arms limitation treaty between the US and the Soviet Union. [Bulletin of Atomic Scientists, 4/1993; Common Dreams (.org), 12/7/2004; BBC, 1/14/2005; Quarterly Journal of Speech, 5/2006 ; Unger, 2007, pp. 53-57]
Costs of Rearmament - In 1993, after reviewing the original Team B documents, Cahn will reflect on the effect of the B exercise: “For more than a third of a century, assertions of Soviet superiority created calls for the United States to ‘rearm.’ In the 1980s, the call was heeded so thoroughly that the United States embarked on a trillion-dollar defense buildup. As a result, the country neglected its schools, cities, roads and bridges, and health care system. From the world’s greatest creditor nation, the United States became the world’s greatest debtor—in order to pay for arms to counter the threat of a nation that was collapsing.” [Bulletin of Atomic Scientists, 4/1993] Former Senator Gary Hart (D-CO) will agree: “The Pro-B Team leak and public attack on the conclusions of the NIE represent but one element in a series of leaks and other statements which have been aimed as fostering a ‘worst case’ view for the public of the Soviet threat. In turn, this view of the Soviet threat is used to justify new weapons systems.” [Quarterly Journal of Speech, 5/2006 ]
Entity Tags: Howard Stoertz, Henry A. Kissinger, Stansfield Turner, Richard Pipes, J. Peter Scoblic, Ray Cline, George Herbert Walker Bush, Craig Unger, Defense Intelligence Agency, ’Team A’, Gary Hart, Anne Cahn, ’Team B’, Carter administration, Arms Control and Disarmament Agency, Paul Nitze, Central Intelligence Agency
Timeline Tags: US International Relations, Neoconservative Influence
Donald Rumsfeld. [Source: US Defense Department]Defense Secretary Donald Rumsfeld wholeheartedly embraces the “Team B” intelligence analysis of the Soviet nuclear and military threat (see Early 1976), regardless of the fact that the team’s reports are riddled with errors (see November 1976 and November 1976). “No doubt exists about the capabilities of the Soviet armed forces,” he proclaims after reading the team’s final report. “The Soviet Union has been busy. They’ve been busy in terms of their level of effort; they’ve been busy in terms of the actual weapons they’re producing; they’ve been busy in terms of expanding production rates; they’ve been busy in terms of expanding their industrial capacity to produce additional weapons at additional rates.” [Unger, 2007, pp. 57]
Although the entire “Team B” intelligence analysis experiment (see Early 1976, November 1976, and November 1976) is supposed to be classified and secret, the team’s neoconservatives launch what author Craig Unger will call “a massive campaign to inflame fears of the red menace in both the general population and throughout the [foreign] policy community—thanks to strategically placed leaks to the Boston Globe and later to the New York Times.” Times reporter David Binder later says that Team B leader Richard Pipes is “jubilant” over “pok[ing] holes at the [CIA]‘s analysis” of the Soviet threat. Team B member John Vogt calls the exercise “an opportunity to even up some scores with the CIA.” [Unger, 2007, pp. 57] Team member George Keegan tells reporters, “I am unaware of a single important category in which the Soviets have not established a significant lead over the United States… [This] grave imbalance in favor of Soviet military capability had developed out of a failure over the last 15 years to adjust American strategic thinking to Soviet strategic thinking, and out of the failure of the leadership of the American intelligence community to ‘perceive the reality’ of the Soviet military buildup.” Keegan’s colleague William van Cleave agrees, saying that “overall strategic superiority exists today for the Soviet Union,” and adds, “I think it’s getting to the point that, if we can make a trade with the Soviet Union of defense establishments, I’d be heartily in favor of it.” [Scoblic, 2008, pp. 95]
Used to Escalate Defense Spending - The experiment is far more than a dry, intellectual exercise or a chance for academics to score points against the CIA. Melvin Goodman, who heads the CIA’s Office of Soviet Affairs, will observe in 2004: “[Defense Secretary Donald] Rumsfeld won that very intense, intense political battle that was waged in Washington in 1975 and 1976. Now, as part of that battle, Rumsfeld and others, people such as Paul Wolfowitz, wanted to get into the CIA. And their mission was to create a much more severe view of the Soviet Union, Soviet intentions, Soviet views about fighting and winning a nuclear war.” Even though Wolfowitz’s and Rumsfeld’s assertions of powerful new Soviet WMD programs are completely wrong, they use the charges to successfully push for huge escalations in military spending, a process that continues through the Ford and Reagan administrations (see 1976) [Common Dreams (.org), 12/7/2004; BBC, 1/14/2005] , and resurface in the two Bush administrations. “Finally,” Unger will write, “a band of Cold Warriors and neocon ideologues had successfully insinuated themselves in the nation’s multibillion-dollar intelligence apparatus and had managed to politicize intelligence in an effort to implement new foreign policy.” [Unger, 2007, pp. 57-58]
Kicking Over the Chessboard - Former senior CIA official Richard Lehman later says that Team B members “were leaking all over the place… putting together this inflammatory document.” Author and university professor Gordon R. Mitchell will write that B’s practice of “strategically leaking incendiary bits of intelligence to journalists, before final judgments were reached in the competitive intelligence exercise,” was another method for Team B members to promulgate their arguments without actually proving any of their points. Instead of participating in the debate, they abandoned the strictures of the exercise and leaked their unsubstantiated findings to the press to “win” the argument. [Quarterly Journal of Speech, 5/2006 ]
'One Long Air Raid Siren' - In 2002, defense policy reporter Fred Kaplan will sardonically label Team B the “Rumsfeld Intelligence Agency,” and write: “It was sold as an ‘exercise’ in intelligence analysis, an interesting competition—Team A (the CIA) and Team B (the critics). Yet once allowed the institutional footing, the Team B players presented their conclusions—and leaked them to friendly reporters—as the truth,” a truth, Team B alleges, the pro-detente Ford administration intends to conceal. Kaplan will continue, “The Team B report read like one long air-raid siren: The Soviets were spending practically all their GNP on the military; they were perfecting charged particle beams that could knock our warheads out of the sky; their express policy and practical goal was to fight and win a nuclear war.” Team B is flatly wrong across the board, but it still has a powerful impact on the foreign policy of the Ford administration, and gives the neoconservatives and hardliners who oppose arms control and detente a rallying point. Author Barry Werth will observe that Rumsfeld and his ideological and bureaucratic ally, White House chief of staff Dick Cheney “drove the SALT II negotiations into the sand at the Pentagon and the White House.” Ford’s primary opponent, Ronald Reagan, and the neocons’ public spokesman, Senator Henry Jackson, pillory Ford for being soft on Communism and the Soviet Union. Ford stops talking about detente with the Soviets, and breaks off discussions with the Soviets over limiting nuclear weapons. Through Team B, Rumsfeld and the neocons succeed in stalling the incipient thaw in US-Soviet relations and in weakening Ford as a presidential candidate. [Werth, 2006, pp. 341]
Entity Tags: Melvin A. Goodman, New York Times, Paul Wolfowitz, Reagan administration, Ronald Reagan, Richard Lehman, William van Cleave, John Vogt, Richard Pipes, Richard (“Dick”) Cheney, Henry (“Scoop”) Jackson, Gordon R. Mitchell, Bush administration (43), Boston Globe, Barry Werth, Gerald Rudolph Ford, Jr, Bush administration (41), Central Intelligence Agency, ’Team B’, David Binder, Fred Kaplan, Craig Unger, Ford administration, George Keegan, Donald Rumsfeld
Timeline Tags: US International Relations, Neoconservative Influence
After CIA Director George H. W. Bush meets with the New York Times’s David Binder, the Times publishes a front-page story about the “Team B” analysis experiment (see November 1976). Up till now, Bush has been foursquare against leaking information to the press, especially classified information such as the Team B affair. Dr. Anne Cahn, who will serve in President Carter’s Arms Control and Disarmament Agency, later writes that Bush’s sudden about-face may be sparked in part by President-elect Carter’s refusal to assure Bush that he would continue as CIA director in the new administration. Bush soon appears on NBC’s Meet the Press, and because of Bush’s media leaks and other Team B press revelations (see Late November, 1976), three separate Congressional committees announce their intention to hold hearings on the entire exercise. [Bulletin of Atomic Scientists, 4/1993]
The US Foreign Intelligence Advisory Board recommended in 1970 that “economic intelligence be considered a function of national security” equal to that of other intelligence. In 1977, the NSA, CIA, and Department of Commerce forms a joint “Office of Intelligence Liaison” (later renamed the “Office of Executive Support”) specifically authorized to handle “foreign intelligence” of interest to the Commerce Department, much of it provided by the NSA. The other countries using Echelon, the NSA’s satellite surveillance program, which include Britain, Canada, Australia, and New Zealand, all operate similar programs. President Bill Clinton will extend this operation in 1993. In 1993, the European company Panavia will be specifically targeted over aircraft sales to the Middle East. In 1994, US companies will be given NSA and CIA intelligence intercepts that help them win contracts in Indonesia. Other information that will be provided by US intelligence to US and allied corporations include information about the emission standards for Japanese automobiles, 1995 trade negotiations over the US importing of Japanese luxury cars, France’s participation in the GATT trade negotiations of 1993, and the 1997 Asian-Pacific Economic Conference. [Science and Technology Assessments Office, 8/15/2000]
Former President Richard Nixon, generally acknowledged as having bested his interviewer David Frost in the first rounds of a set of interviews (see April 6, 1977), now defends his support for the infamous Huston Plan, admitted by the plan’s author himself to be illegal in its breathtaking contempt for civil liberties and the rule of Constitutional law. Former Watergate prosecutor Philip Lacovara had told Frost’s aide James Reston Jr. that it was surprising Huston was not taken out and shot. Reston will later write acidly: “Not only was Tom Charles Huston not taken out and shot, the plan was calmly considered and signed by Nixon, and was in force for a week, until J. Edgar Hoover objected on territorial rather than philosophical grounds (see July 26-27, 1970). Only then was approval rescinded (although many felt it remained in effect under the code name COINTELPRO).” Reston will write that during this interview, Nixon paints a picture of an America engulfed in armed insurrection, a portrait so convincing that the Huston Plan actually seems a rational response. Frost fails to press the point that the antiwar protests were largely nonviolent and not a threat to national security. [Reston, 2007, pp. 102-105] Frost does ask that if this was indeed so vital to national security, why not ask Congress to make such acts legal? “In theory,” Nixon replies, “this would be perfect, but in practice, it won’t work.” It would merely alert the targeted dissenters and raise a public outcry. [Time, 5/30/1977] This part of the interview sessions will be aired on May 19, 1977. [Landmark Cases, 8/28/2007]
The CIA begins covert action against the Communist government in Afghanistan, which is closely tied to the Soviet Union. Some time this year, the CIA begins training militants in Pakistan and beaming radio propaganda into Afghanistan. By April 1979, US officials are meeting with opponents of the Afghan government to determine their needs. [Blum, 1995, pp. 344] Robert Gates, who will become CIA Director in the early 1990s, will later recall that in a meeting on March 30, 1979, Under Secretary of Defense Walter Slocumbe wonders aloud whether there is “value in keeping the Afghan insurgency going, ‘sucking the Soviets into a Vietnamese quagmire.’” [Gates, 1996, pp. 145] In March 1979, there is a major revolt in Herat province, and in June and August there are large scale army mutinies. [Cooley, 2002, pp. 5] President Carter will formally approve covert aid to opponents of the government in July (see July 3, 1979), which will result in a Russian invasion in December (see December 8, 1979).
Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]
Osama Bin Laden visits the US, Britain or both around this time. Author Peter Bergen will later say, “Undoubtedly, bin Laden took his son for medical treatment to a western country and it’s either the United States or the [Britain]. There’s some kind of controversy about that.” Khaled Batarfi, a close childhood friend to bin Laden, will later recall more specifically, “In Washington airport, Dulles Airport, people were surprised at the way he dressed, his wife dressed. Some of them were even taking photos and he was kind of joking about it. We were like in a zoo.” [New Yorker, 12/5/2005; CNN, 8/23/2006] According to author Lawrence Wright, bin Laden visits London to seek medical advice for his young son, Abdul Rahman. Abdul Rahman was born with hydrocephalus and bin Laden considers the condition so bad that he goes abroad to seek medical advice. However, he does not like what he hears in London and returns home with his son to Saudi Arabia without letting the doctors operate. Bin Laden then treats Abdul Rahman with folk remedy, but the child becomes mildly retarded and requires special attention. [Wright, 2006, pp. 81] Bin Laden is also said to visit London later (see Early 1990s-Late 1996).
Paul Wolfowitz, a young neoconservative with the Arms Control and Disarmament Agency (ACDA—see 1973), is investigated for giving classified documents on the proposed sale of US weapons to an Arab government to an Israeli government official, through the auspices of an official with the American Israel Public Affairs Committee (AIPAC). An inquiry is launched but later dropped, and Wolfowitz will continue with ACDA through 1980. [CounterPunch, 2/28/2004]
Two retired Pakistani Army officers travel to Britain for the Pakistan Atomic Energy Commission. They are Major Mohammed Sadiq Malik, a procurement officer, and Captain Fida Hussein Shah, an assistant administrative officer. When interviewed by British officials, they say that Pakistani nuclear scientist A. Q. Khan is their project director. Khan is currently leading an effort to build a uranium bomb. They also say they will visit a company called SR International, which is a front for Khan’s technology procurement efforts linked to two of his associates, Abdus Salam and Peter Griffin (see Summer 1976). [Armstrong and Trento, 2007, pp. 101]
Kamal Adham. [Source: Adham Center]Beginning in 1978, a group of foreign investors attempt to buy First American Bankshares, the biggest bank in the Washington, D.C., area. This group is fronted by Kamal Adham, the longtime Saudi intelligence minister until 1979. In 1981, the Federal Reserve asks the CIA for information about the investors, but the CIA holds back everything they know, including the obvious fact that Adham was intelligence minister. As a result, the sale goes through in 1982. It turns outs that Adham and his group were secretly acting on behalf of the criminal Bank of Credit and Commerce International (BCCI), and BCCI takes over the bank. [Washington Post, 7/30/1991; US Congress, Senate, Committee on Foreign Relations, 12/1992] Time magazine will later report that “the CIA kept some accounts in First American Bank, BCCI’s Washington arm.” But additionally, “Government investigators now have proof that First American had long been the CIA’s principal banker. Some of the more than 50 agency accounts uncovered at the bank date back to the 1950s. BCCI owned the CIA’s bank for a decade.” [Time, 3/9/1992] The CIA soon learns that BCCI secretly controls the bank, if the CIA didn’t already know this from the very beginning. By 1985, the CIA will secretly inform the Treasury Department on the bank’s control by BCCI, which would be illegal. But no action is taken then or later, until BCCI is shut down. Sen. John Kerry’s BCCI investigation will later conclude, “even when the CIA knew that BCCI was as an institution a fundamentally corrupt criminal enterprise, it used both BCCI and First American, BCCI’s secretly held US subsidiary, for CIA operations. In the latter case, some First American officials actually knew of this use.” [US Congress, Senate, Committee on Foreign Relations, 12/1992]
President Jimmy Carter. [Source: The Sietch.org]President Jimmy Carter issues Executive Order 12036, in effect banning domestic surveillance by the CIA and other US intelligence agencies. Carter writes, “No agency within the Intelligence Community shall engage in any electronic surveillance directed against a United States person abroad or designed to intercept a communication sent from, or intended for receipt within, the United States except as permitted by the procedures established pursuant to section 2-201.” That exception allows for the surveillance of US citizens in the case of acquiring “[i]nformation about the capabilities, intentions and
activities of foreign powers, organizations, or persons and their agents…. The measures employed to acquire such information should be responsive to legitimate governmental needs and must be conducted in a manner that preserves and respects established concepts of privacy and civil liberties.” The order also flatly prohibits any assassinations by government officials, saying, “No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination.… No agency of the Intelligence Community shall request or otherwise encourage, directly or indirectly,
any person, organization, or government agency to undertake activities forbidden by this order or by applicable law.” [White House, 1/24/1978]
During breakfast at Washington’s Madison Hotel, Stephen Bryen, a Senate Foreign Relations Committee staffer and a close associate of Richard Perle, is overheard offering to pass classified material to Zvi Rafiah, the Congressional liaison officer for the Israeli embassy and a suspected senior Mossad officer (see October 1973). [Washington Report on Middle East Affairs, 7/4/1986] “I have the Pentagon document on the bases, which you are welcome to see,” Bryen reportedly says. [Nation, 6/29/1985] The eavesdropper is Michael Saba, a businessman and former executive director of the National Association of Arab Americans. Saba, who recognizes Bryen as a staff member of the Senate Committee, promptly reports the incident to the Justice Department, which quickly launches an FBI investigation. The investigation will find that Bryen has illegally obtained classified documents of military and scientific importance and that he has been seeking material that “could prove to be a major embarrassment to the US government.” [Washington Report on Middle East Affairs, 7/4/1986] The investigation also learns that he has been meeting with Zvi Rafiah “two or three times a week.” [Washington Report on Middle East Affairs, 7/4/1986] The FBI ultimately assembles “a good circumstantial case” that Rafiah “routinely issued orders to Bryen” and will recommend that the case be brought before an investigative grand jury for espionage. Instead, the case will be closed (see April 1979). [Nation, 6/29/1985; Washington Report on Middle East Affairs, 7/4/1986]
David Blee, head of counterintelligence at the CIA, asks the NSA, FBI, and allied representatives to form a committee to evaluate the potential for a signals intelligence project codenamed VENONA and directed against the Soviet Union over the next two years. Howard W. Kulp and Mildred Hayes, who will go on to head the VENONA unit in later years, represent the NSA on the committee. [Center for Cryptologic History, 1/1/2001 ]
Albert Wohlstetter, the ideological father of neoconservatism (see 1965), arranges a meeting in Istanbul bringing together 13 Americans, 13 Turks, and 13 Europeans. Wohlstetter’s protege, Richard Perle, is possibly present. The policies discussed at the meeting later become the basis of the Turgut Ozal administration’s pro-American policies in Turkey (see September 1980)
(see December 1983). [American Enterprise Institute, 11/22/2003] Wohlstetter, a professor at the University of Chicago, is a mentor to Perle and Paul Wolfowitz. [Think Tank, 11/14/2002] He sees Turkey as “a US staging post for Middle East contingencies and as a strategic ally of Israel.” [Evriviades, 1999]
The US embassy in Delhi, India, sends a cable to Secretary of State Cyrus Vance about Pakistan’s nuclear weapons program. The cable states that Pakistan will be able to explode a bomb within “two or three years”—most likely by 1981. However, Pakistan’s progress will not be that fast and it will not actually manage to produce even a small amount of weapons-grade uranium until the spring of 1981 (see (March-April 1981)). [Levy and Scott-Clark, 2007, pp. 86] The cable will be intercepted by India’s Research and Analysis Wing and shared with Israeli intelligence (see 1979).
Israel considers attacking a key part of Pakistan’s nuclear weapons program. The idea is sparked when the Indian intelligence service Research and Analysis Wing intercepts a US cable saying that Pakistan will be able to explode a bomb within two or three years (see 1979). The Israelis knew that Pakistan was working on a nuclear weapons project, but thought it was not close to making such progress. Shocked by the Pakistani advances, they begin to plan a pre-emptive strike against one of the Pakistani facilities, the laboratory of scientist A. Q. Khan in Kahuta. However, the US learns of the plan and pressures the Israelis to put it on ice, which they do. [Levy and Scott-Clark, 2007, pp. 86]
Neoconservatives Albert Wohlstetter and his protege, Richard Perle, work within the US and Israeli defense establishments to promote Turkey as a key US and Israeli strategic ally (see 1979). This effort is in part motivated by concerns raised by the Soviet invasion of Afghanistan. Perle and other officials in the Reagan administration play a key role in promoting an alliance between Israel and Turkey. [Evriviades, 1999; Foreign Policy Research Institute, 9/1999; Nation, 8/23/2002] This alliance is also strongly supported by “conservative Jewish-American groups working with the Turkish legation in Washington and a number of prominent Turkish-American businessmen with business and blood connections with Turkish Jews in Istanbul and those who had settled in Israel.” [Evriviades, 1999]
According to a 1992 Congressional investigation led by Congressman Charles Schumer (D-NY), between 1979 and 1991, federal law enforcement agencies receive more than 700 tips about BCCI’s criminal activities. The criminal BCCI bank will finally be shut down in 1991 (see July 5, 1991). The tips include BCCI involvement in:
Promoting political unrest in Pakistan.
Smuggling arms to various countries, including Syria, Libya, and Iran.
Financing terrorist groups.
Links to organized crime in the US and Italy.
Time magazine reporters Jonathan Beaty and S.C. Gwynne will later comment in a book: “Too many people knew too much about BCCI, and they knew it long before the bank spun itself into bankruptcy and scandal.… That [CIA Deputy Director] Robert Gates could jokingly refer to it in a conversation with Customs chief William von Raab as the “bank of crooks and criminals” three years before the scandal broke merely reflects the run of knowledge around Washington. Indeed, it would probably have been difficult to find very many people with real power who did not know about the bank, based on the wide distribution of CIA reports.” Schumer will later conclude: “At the very least, there was nobody putting together all the pieces.… You could make a credible case that somebody told them not to do anything about BCCI.” [Beaty and Gwynne, 1993, pp. 346]
A young Fauzi Hasbi. [Source: SBS Dateline]Fauzi Hasbi, the son of a separatist leader in the Indonesian province of Aceh, is captured by an Indonesian military special forces unit in 1979 and soon becomes a mole for the Indonesian government. Hasbi becomes a leader in the separatist Free Aceh Movement (GAM), and he also plays a long-time role in Jemaah Islamiyah, an al-Qaeda affiliate. For many years, he literally lives next door to Jemaah Islamiyah leaders Abu Bakar Bashir and Hambali (see April 1991-Late 2000). In 2005, the Australian television program SBS Dateline will present documents that it claims “prove beyond doubt that Fauzi Hasbi had a long association with the [Indonesian] military.” For instance, military documents dating from 1990 and 1995 give him specific spying tasks. [SBS Dateline, 10/12/2005] In February 2001, the Indonesian magazine Tempo documents some of Hasbi’s links to the Indonesian military, after he has been linked to a major role the Christmas bombings in Indonesia two months earlier (see December 24-30, 2000 and February 20, 2001). He admits to having some ties to certain high-ranking military figures and says he has had a falling out with GAM, but denies being a traitor to any militant group. [Tempo, 2/20/2001; Tempo, 2/27/2001] Yet even after this partial exposure, he continues to pose as an Islamist militant for the military. A 2002 document shows that he is even assigned the job of special agent for BIN, Indonesia’s intelligence agency. [SBS Dateline, 10/12/2005] A December 2002 report by a US think tank, the International Crisis Group, details his role as a government mole. He and two of his associates are abducted and killed in mysterious circumstances in the Indonesian city of Ambon on February 22, 2003. Seven suspects, including an Indonesian policeman, later admit to the killings but their motive for doing so remains murky. [Agence France-Presse, 5/22/2003]
A shipment of equipment for Pakistan’s nuclear program is seized in Britain by Customs and Excise. Details of the order are not known, although there has been controversy in Britain over nuclear purchases by Pakistanis for some months. The shipment was apparently prepared by long-time Khan collaborator Peter Griffin of Weargate Ltd. [Armstrong and Trento, 2007, pp. 100]
Page 1 of 53 (5263 events (use filters to narrow search))previous
Receive weekly email updates summarizing what contributors have added to the History Commons database
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.