Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Surreptitious Entries Black Bag Jobs — Part 4
Page 32
32 / 101
on
wh PE es,
Moree,
ype. 1
’.
Geli Snead hee ele ee
The Cuamman. I am told by the staff that this summary is accurate,
and the only other thing contained was that these women had affilia-
tions with an organization that had protested the war in Baltimore.
Mr. Apama. I think there were some other items.
The Cuatrman. That is the only other association that we have
been able to determine. Apparently the women’s liberation move-
ment is no longer under suspicion by the FBI and the case has been
closed. What happens when the case is closed? Are those women’s
names still left in the files? Are they forevermore contained?
Mr. Apama. Yes.
The Crrammman. In the system?
Mr. Apama. Yes.
The Cuauman. Pretty soon you will have us all in the system. If
there is no way, even after surveillance has been terminated, to elimi-
nate the references of individuals through the files of the system,
you will one day have us all, won't you! .
Mr. Apams. Well, I would say as part of a normal business record,
when we do make a judgment that an organization should be investi-
gated and we investigate it, and then we find activities but we make
@ conclusion that there is no additional problem here, this is a record
of our official action. Now, if we destroy it, at what point do we get
into a situation of being accused of doing things and then destroying
things to keep from showing what we do? The critical thing is whether
we are able, and we do set up safeguards, where information in our
files is not misused at a later date, and that is what these guideline
committees are allabout. —
The Cuamswan. Do you have any idea of how many names of
Americans you keep in your files all as a result of the cumulative
effect of all these surveillances in all of these cases?”
Mr. Apaus. No; I don’t.
The Cizinwan, It’s in the millions, isn’t it!
Mr. Apams. We have 614 million files.
The Cnatrwan. You have 614 million Blesf
Mr. Apams. Yes, sir.
The Cuamman. And there are surely names of more than one per-
son typically in a file, aren’t there?
Mr. Avaxe. But it is a rather large country.
_. The Cuatmman. That's a large number of files to start with, and
if you have multiple names in them, you are quickly up into 20, 30,
40 million.
Mr. Apamus. Right. But many of these files are applicant files. They
are not all subversive files. They are not al] criminal files. We have
a million crimes of violence each year. There is a million people.
The Cyaan. I wish you had more time to spend on those crimes
of violence.
Mr. Apame. T do, too.
The Crairsan, There we agree.
Mr. Apams. Right.
The Cuatruan. What I worry about is this. You say there’s no way
to know when to close a file. These were surveillance files, originally
opened to determine whether organizations might have subversive
connections. There are names in these files, so some demagorue comes
along and says that the name of some public figure is contained in a
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic