<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><item><title>Hillary Clinton Isn’t the First Government Official to Send Secret Messages</title><link>https://www.thenation.com/article/archive/about-those-e-mails/</link><author>Athan G. Theoharis</author><date>Sep 10, 2015</date><teaser><![CDATA[From Hoover’s FBI to George W. Bush’s White House, officials have been hiding their communications for decades.]]></teaser><description><![CDATA[<br/><p>Recent revelations that, during her tenure as secretary of state, ­Hillary Clinton maintained a private e-mail server separate from the State Department’s official one raise a question that transcends the current debate over whether she compromised national security: Was the former secretary’s decision exceptional, or did it reflect what had been (and conceivably remains) the practice of senior White House and intelligence-agency officials to preclude, or at least minimize, the exposure of controversial, even illegal policy decisions?</p>
<p>Clinton’s reliance on a private e-mail account ensured that, because her communications were not logged into the State Department’s records system, she alone could determine which of them would be destroyed and which would be saved. A further issue involves the inadvertent discovery of her actions—that is, as the by-product of Congress’s narrow inquiry into the Benghazi matter. This inadvertent revelation raises an additional query: Did other senior administration and intelligence officials, unwilling to rely solely on classification restrictions, devise special procedures to prevent the discovery of their actions? For, as we belatedly learned through the congressional investigations of the 1970s and ’80s and the release of records in response to Freedom of Information Act requests, senior intelligence officials involved in controversial and politically sensitive operations had purposely and covertly instituted a series of separate procedures to keep and destroy records.</p>
<p>Dating from the early 1940s, for example, FBI director J. Edgar Hoover maintained especially sensitive records in two secret office files that were separate from the FBI’s central records system. Those records documented the FBI’s illegal investigative techniques and the collection of derogatory information on prominent Americans. Hoover also instituted a series of special records and record-destruction policies (“Do Not File,” “June Mail,” and blue, pink, or informal memorandums), and he authorized senior FBI officials to regularly purge the contents of their own secret office files.</p>
<p>In 1973, responding to the creation of the Senate Watergate Committee, CIA director Richard Helms ordered the destruction of all the tapes and transcripts of his office and telephone conversations. CIA officials also authorized the use of “soft files” and “privacy channels” to send (and then destroy) sensitive communications—and specifically authorized the destruction of the agency’s records on its infamous drug program, MK-ULTRA; on Chile’s Manuel Contreras (head of the country’s murderous secret police under dictator Augusto Pinochet); and on the CIA-engineered 1953 coup that overthrew President Mohammad Mossadegh in Iran.</p>
<p>The National Security Agency similarly created special records and record-destruction policies involving two illegal programs: Project Minaret (running from 1967 to 1973, it intercepted the international communications of anti–Vietnam War and civil-rights activists) and Project Shamrock (running from 1947 to 1975, it intercepted telegraph messages in transit to and from the United States). And Oliver North, a National Security Council aide in the Reagan administration, created a “do not log” procedure to manage communications to his boss, John Poindexter—and then, when the Iran/Contra scandal broke, destroyed those records (although North’s ignorance that the NSC computer system maintained a backup memory allowed investigators to reconstruct some of those records).</p>
<p>At a time when the public and Congress are exploring how the George W. Bush administration, by classifying records on national-security grounds, was able to secretly authorize the NSA’s Terrorism Surveillance Program and the CIA’s rendition and torture programs, it is equally important to explore whether the secret procedures employed in the past continue. Bush White House officials created special e-mail accounts for their communications with the Republican National Committee—and it was subsequently revealed that many of those e-mails had been destroyed or were missing. More seriously, attorneys from the Office of Professional Responsibility found, in the course of their investigation into legal rulings by Justice Department attorneys John Yoo, Patrick Philbin, and Jay Bybee, that many of their e-mails were missing and that “most of” Yoo’s and Philbin’s e-mail records covering the period from July to August 2002 “had been deleted and were not recoverable.” In addition, forewarned of Congress’s intent to convene hearings on CIA interrogation practices, agency officials in 2005 destroyed 92 videotapes of the CIA’s brutal treatment of Al Qaeda detainees Abu Zubaydah and Abd al-Rahim al-Nashiri.</p>
<p>These recent practices not only confirm that Hillary Clinton’s actions were <em>not</em> exceptional; they underscore the need for a broader examination of the US government’s practices for keeping records to ensure the effectiveness of congressional and judicial oversight.</p>
<br/><br/>]]></description><guid>https://www.thenation.com/article/archive/about-those-e-mails/</guid></item><item><title>The FISA File</title><link>https://www.thenation.com/article/archive/fisa-file/</link><author>Athan G. Theoharis,Athan G. Theoharis</author><date>Feb 16, 2006</date><teaser><![CDATA[Although his language is less blatant than Richard Nixon's, George
Bush is claiming the same imperial powers today that led Congress to
pass the Foreign Intelligence Security Act.]]></teaser><description><![CDATA[<br/>
<p> With a debate now raging over George W. Bush&#8217;s secret authorization of warrantless wiretaps by the National Security Agency in defiance of the 1978 Foreign Intelligence Surveillance Act, we must take another look at why Congress passed the act in the first place. The legislative history clearly shows that the intention was to deny the President the unchecked right to determine whether a proposed target met a legitimate &#8220;foreign intelligence&#8221; need. Instead, Congress ordained that all proposals to intercept such communications with foreigners must first be reviewed and approved by a special FISA court.  </p>
<p> Prodding Congress into action in 1978 were recent revelations of abuses by the NSA. One was Operation Shamrock, instituted in 1947 to intercept telegraph messages; another was Operation Minaret, created in 1967 to intercept the electronic communications of militant civil rights and anti-Vietnam War activists. NSA officials knew these programs were illegal and accordingly devised procedures to preclude discovery of their actions. Also important were revelations that President Nixon had co-opted the NSA and the FBI to advance his own political and policy agendas.  </p>
<p> Nixon&#8217;s abuses started after Congress passed the 1968 Omnibus Crime Control and Safe Streets Act. This law included a section allowing wiretapping that had been banned by the 1934 Communications Act and authorizing its use if a warrant had been obtained. But it also stated that the warrant requirement would not &#8220;limit the constitutional power of the President to take such measures as he deems necessary to protect the Nation against actual or potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information deemed essential to the security of the United States, or to protect national security information against foreign intelligence activities.&#8221; During the debate on this proposal, Senator Philip Hart asked Senators John McClellan and Spessard Holland, the floor leaders on the bill, whether this provision gave &#8220;the President a blank check to tap or bug without judicial supervision, when he finds, on his own motion, that an activity poses a &#8216;clear and present danger to the Government of the United States.'&#8221; McClellan and Holland denied that it would. They contended that the language was neutral and did not &#8220;affirmatively&#8221; grant any such powers to the President but merely stated that the President&#8217;s (undefined) constitutional powers were not restricted.  </p>
<p> As it turned out, Nixon was the first President to exploit this loophole. The occasion was a 1969 article in the <i>New York Times</i> by William Beecher revealing that the United States was bombing Cambodia. This disclosure squarely contradicted the claims the Administration had been making to the press and Congress. Angered, Nixon and his National Security Adviser Henry Kissinger ordered the FBI to investigate the source of the leak. In response, the bureau wiretapped Beecher and three other Washington-based reporters, plus thirteen Nixon Administration officials, including National Security Council (NSC) aides Morton Halperin and Anthony Lake. The objective of this request was to promote the President&#8217;s potentially controversial policies by stopping leaks of negative or contrary information to the press. The wiretaps, subsequently, promoted the President&#8217;s partisan interests as well: Halperin and Lake continued to be tapped after they left the NSC to join the presidential campaign staff of Senator Edmund Muskie, the 1972 Democratic frontrunner.  </p>
<p> The NSC wiretaps preceded another Nixonian initiative, this time to use the intelligence community to develop information linking the President&#8217;s radical critics with international communism. Dissatisfied with the FBI&#8217;s failure to quarry the desired information, Nixon in June 1970 directed a special interagency task force to review the capabilities of the intelligence community and recommend changes. The resulting report, forwarded to the President by Tom Charles Huston, White House representative on the task force, urged Nixon to authorize a series of &#8220;clearly illegal&#8221; activities, including wiretaps, bugs, break-ins, mail openings and interceptions of international communications. Nixon agreed, but to assure himself &#8220;deniability,&#8221; he had Huston sign the order authorizing these tactics. (The abuses were first revealed in the Watergate hearings and probed more fully by the Church committee.)  </p>
<p> Nixon was not the only President to deploy the intelligence agencies on behalf of his own agendas. Starting with Franklin Roosevelt, Presidents have made the FBI an intelligence arm of the White House. Lyndon Johnson frequently demanded &#8220;name check&#8221; requests&#8211;a search of FBI files for all derogatory information on an individual&#8211;on reporters who had written pieces critical of his policies. The revelation of this practice by the Church committee in 1975 led Pulitzer Prize-winning <i>Times</i> reporter Harrison Salisbury to file a Freedom of Information Act request for his FBI file.  </p>
<p> Salisbury&#8217;s suspicions proved correct. His file confirmed that he had been the subject of two name-check requests. The Eisenhower Administration had ordered one in 1954, when Salisbury returned home from Moscow, where he had been chief <i>Times</i> correspondent. More ominous, in 1966, when Salisbury traveled to Hanoi and sent back reports debunking the President&#8217;s claims that US &#8220;precision bombing&#8221; was hitting only North Vietnamese military targets, the Johnson Administration requested a name check.  </p>
<p> Salisbury&#8217;s FBI file also contained reports sent to the FBI by the NSA. Because these reports originated outside the bureau, FBI officials, in response to the FOIA request, forwarded them to the NSA for review and release. Claiming &#8220;national security&#8221; grounds, NSA officials refused to disclose them or any other reports it had on Salisbury. When the Times reporter brought suit demanding their release, the courts upheld the NSA claim.  </p>
<p> Because of this ruling, we do not now know whether the NSA deliberately targeted Salisbury as a reporter or had simply swept up his messages among the flow of communications from or to Communist areas (Moscow, Hanoi). And because the NSA reports remain classified, it is also impossible to discover how this information was used. What we do know is that even though Salisbury&#8217;s actions were those of a reporter and not a spy, NSA officials, at a minimum, had forwarded the intercepted information to the FBI.  </p>
<p> The Salisbury intercepts, NSC wiretaps and Huston Plan initiatives illustrate how Presidents used wiretaps under a cloak of secrecy not to further legitimate national security interests but to advance their own aims. This ability to conduct policy secretly also confirms the indifference of White House officials to the rule of law, exemplified in the Huston Plan&#8217;s stark recommendation of &#8220;clearly illegal&#8221; activities.  </p>
<p> In the course of the Church committee&#8217;s investigation into presidential abuse of the intelligence agencies, investigators questioned Nixon about the Huston Plan. Nixon, who by then had resigned the presidency to avoid impeachment, offered a rationale that strikingly resembles the royal prerogative: &#8220;It is quite obvious that there are certain inherently governmental actions which if undertaken by the sovereign&#8230;are lawful but which if undertaken by private persons are not&#8230;. But it is naive to attempt to characterize activities a President might authorize as &#8216;legal&#8217; or &#8216;illegal&#8217; without reference to the circumstances under which he concludes that the activity is necessary.&#8221;  </p>
<p> Although his language is less blatant, George Bush is claiming the same imperial powers today. As the above history shows, no President should be trusted to wiretap secretly and without any independent review to further a claimed public interest. </p>
<br/><br/>]]></description><guid>https://www.thenation.com/article/archive/fisa-file/</guid></item></channel></rss>