Featured Post

Homeland Security: The Sworn Duty of Public Officials

Homeland Security: The Sworn Duty of Public Officials     The United States has a unique position amongst the countries of the world;...

Thursday, March 31, 2016

Model Study and Potential Issues in Study



Part I

I will use the following study  as a model:

Morgan, S. A. (2014, March). Security vs. liberty: How to measure privacy costs in domestic surveillance programs (Thesis). Monterrey, California. Naval Postgraduate School. Retrieved October 17, 2014 from https://calhoun.nps.edu/handle/10945/41421

Part II

Potential Issues in Study   
         
          The covert nature of program.  A primary issue is due to this secret nature of the program.  Although some material has been made publicly available through the Freedom of Information Act, it is likely that there is material that needs to be uncovered to fully explore the nature of the program.  Theoharis contends that "FOIA requestors have oftentimes found released FBI documents to have been massively redacted and of limited research value" (1990, p. 222).
          Lost material due to time and destruction. There is an issue based on the passage of time.  The Archives note that the material on hand is from the national FBI offices, and that most of the operational notes were kept at the field offices.  It is likely that most of this material is now lost.  In addition, the FBI intentionally destroyed over 700,000 cubic feet of records between 1976 and 1978 (Steinwall, 1986, p. 56) , although this material has not been specified to include documentation on COINTELPRO operations.
          There may difficulty in assigning qualitative characteristics when comparing New Left operations against Leftist groups as a whole. SDS, for example, evolved from the Student League for Industrial Democracy (SLID), a socialist front group, approximately around 1962.
          Political bias.  Most discussion of the COINTELPRO program is based on the contention that it was somehow “immoral” to investigate and harass violent groups that had the goal of breaking American law; in addition, the vast majority of this discussion has been conducted by leftists that focused on leftist groups as “victims” of this program, and ignored completely COINTELPRO operations against the Klan (not to mention the violent nature of the crimes committed by these Leftist groups). The majority of the remainder often brushed off efforts against the Klan as an FBI front for public relations...in a secret program. There is also the question of my own personal bias.    
          Personal bias  While it would be nice that research was fundamentally unbiased, “Qualitative researchers contend that bias is inherent, yet can be described clearly enough to allow the reader to judge if bias has inappropriately influenced the research” (Sampson, 2012, p. 8).   In my own case, I will be upfront about my hostility towards Leftist ideals,  the reality in results from Leftist programs, the political methods that Leftists employ, the contempt of Leftists for liberty, and the lack of honesty in which Leftists engage in public discourse.   This bias also affected my initial assumptions regarding this study: my initial assumption for this study was that the FBI was allowed to attack the Klan, but then was prevented from conducting operations against the New Left.  Although there were differences in how operations were conducted based upon political factors, my assumption was incorrect.

Mitigating Research Efforts

          The main effort I will need to make is in identifying bias in interpretation, especially my own bias.  The loss of source records has a lesser impact on my research, as I am basing my study on secondary sources.



References

Sampson, J. (2012). A guide to quantitative and qualitative dissertation research. Florida State University: Educational Psychology and Learning Systems Faculty Publications.

Steinwall, S. (1986). Appraisal and the FBI Files Case: For Whom Do Archivists Retain Records? American Archivist, 49(1), 52–63.

Theoharis, A. G. (1990). Research note: The FBI and the politics of surveillance, 1908-1985. Criminal Justice Review (Georgia State University), 15(2).



…............................................................................................................................................

Yes, that is a potential barrier for domestic intelligence work in America, if not for my study. Brig. Gen Wilson described the fusion centers he has worked with as ineffective due to interorganizational conflict (2015).
There are several other hindrances to effective domestic security operations currently. Lesser issues include the "wikipedia-ization" of intelligence, as opposed to the effective "need to know" model; it is in this "wiki" environment that Manning and Snowden were able not only to access intel they had no need of and were able to publicize secrets. Another issue is the irresponsibility of government leaders that place unqualified people into positions of security responsibility, and then have no accountability when things go wrong. We can look to the recent hacking of our databases, in which Chinese government hacked the information about those holding security clearances (Nakashima, 2015, para. 1). The final "lesser" issue is the mass collection approach to intelligence, which is not only ineffective, but illegal. The NSA spying on citizens en masse, leads to the most important issue.

The major issue is the necessity that security agencies operate with the understanding that national security must be balanced with citizen liberty. Jim Sensenbrenner,the author of the PATRIOT Act , had this to say how the Act has been implemented, “I stand by the Patriot Act and support the specific targeting of terrorists by our government, but the proper balance has not been struck between civil rights and American security” (Kravets, 2013, para. 3).

This is an issue that confronts the security community at every level of responsibility (the intelligence community, law enforcement, the military).  Horwitz argues that the Constitution is a "meta-rule of construction" dedicated to "national self-preservation", he stresses the importance of the Presidential Oath as dedicated to preserve, protect, and defend the Constitution (2009, pp. 1069-1070). In America this oath is adhered to at the line level throughout the nation; DeShon contends that a “police officer's oath originates within the United States Constitution” (2000, p. 6) and Amerson et al reiterate this at the level of sheriff; “ a sheriff should always perform his or her duties in accordance with the Constitution of the United States” (n.d., p.2). They key to the oath is "national self-preservation". To protect the citizens of this country, security personnel must be aware of political interference, and be prepared to counter it. National security should not be allowed to be suborned by political pandering. Note that the oath is to the Constitution,  not to a grandstanding politician, not to any given law that is unconstitutional, and especially not to any law that threatens national security.


References
DeShon, R. W. (2000). Police officers oath of office and code of ethics a question of knowledge. Eastern Michigan University School of Police Staff and Command Retrieved May 12, 2015 from http://www.dejurerepublicformichigan.org/files/OATH_ETHICS.pdf

Horwitz, P. (2009). Honor’s constitutional moment: The oath and presidential transitions. Northwestern University Law Review, 103(2), 1067–1080. Retrieved May 12, 2015 from http://search.proquest.com.southuniversity.libproxy.edmc.edu/docview/233344356?pq-origsite=summon

Kravets, D. (2013, September 5). Patriot Act author says NSA is abusing spy law. Wired Magazine. Retrieved May 11, 2015 from http://www.wired.com/2013/09/nsa-abusing-patriot-act/

Nakashima, E. (2015, June 12).  Chinese hack of federal personnel files included security-clearance database.  The Washington Post.  Retrieved July 8, 2015 from
https://www.washingtonpost.com/world/national-security/chinese-hack-of-government-network-compromises-security-clearance-files/2015/06/12/9f91f146-1135-11e5-9726-49d6fa26a8c6_story.html

Wilson, C. (2015, March). Broadening focus on terrorism: The role of finance, economics, and organized crime. Panel discussion at the 2015 52nd Annual Meeting of the Academy of Criminal Justice Scientists.

…......................................................................................................................................................................




I added the IACP study to my library; thank  you for the link.  Unfortunately, the study of use of force can be subject to political pressures.  You may want to check out http://www.aele.org/ (Americans for Effective Law Enforcement) for more information regarding use of force and legal standards.  Look at their Monthly Law Journal archives.

As for time to research, I hope the following article can help you:
http://michaelnielsen.org/blog/principles-of-effective-research/




For the theoretical base of your study, the bureaucratic politics model, in which organizations (and the people within them) seek to protect the institution rather than the mission the institution is tasked with may apply,  The theory is a variation of, and also known as growth complex theory and/or Pournelle's Iron Law of Bureaucracy.

If there is one thing this degree plan has taught me, it's the spelling of bureaucracy.  I had been very content to spell it as "burro-cracy" previously.




Wednesday, March 30, 2016

Concept Development:Political Differences in COINTELPRO Operations





            The citizens of a Republic have an expectation that their right to free speech and political participation should not be interfered with by the State.  In addition, citizens expect that actions undertaken by the State be subject to public review.  The complication between theory and reality comes into play when anti-Republic forces use extra-legal means to achieve political goals.  States may choose to employ secrecy and extra-legal means to combat these subversive organizations.  This approach leads to conflict between the expectations of the society and the means to protect it.  In addition, in any state, representative or not, political influences affect operations of the state.  It is possible that these political influences can aligned with subversive organizations and interfere with national security operations.  In the case of the United States in the 1960's, the country was under attack from illegal and violent acts by  the racist organization, the Ku Klux Klan.  At the same time, Leftist terrorist groups that were part of the collective "New Left" movement were also committing violent attacks against America.  The FBI initiated operations against both groups. There are several reasons to determine if political influence was responsible for differences in operations between the two goups; first, to identify and remove any political influence from the government that aligns with and abets subversive organizations that commit illegal acts, to determine whether governemt agencies acted improperly, and to determine if government agencies violated the balance between citizen rights and national security.
            The following research questions must be answered to explore the basic question:
·       Is counter subversion a primary responsibility of the FBI?
·       What is subversion?
·       What is a legitimate domestic threat?
·       Was the Klu Klux Klan a legitimate domestic threat?
·       Was the New Left a legitimate domestic threat?
·       Were there demonstratable differences in how operations were conducted between the two groups?
·       Can politics be demonstrated to account for any of those differences, if such differences exist?
            The primary method that will be  used is comparative historical inquiry.  There will also be some use of phenomenological research,  as the viewpoints of Hoover assistants Sullivan and DeLoacha will be examined. There has been some academic work done in examining COINTELPRO operations, particularly in operations ahgainst the New Left.  Cunningham, as an example, examines operations against both groups.  Drabble specializes in COINTELPRO:WHITE HATE operations, which targeted the Klan. Powers, Gentry, Theoharis, and several others dig into the FBI's history, including the political factors that drove the development of that history.  There is what could be seen an endless fountain of government reports.  In the first type of government reports, actions of the Klan and the New Left are investigated as a threat to domestic security.  The second type of government reports focuses on how the FBI responded to that threat, with many reports focusing on the allged excesses of the program.  The third type of government report discusses the legal boundaries that domestic security agencies must act within;  this last type of discussion continues today as America faces continued domestic threats from Islam and the Left.
Selected References
Bendle, M. F. (2006). Terrorism and the New Left in the ’Sixties. National Observer, 71.

Berman, E. (2014). Regulating Domestic Intelligence Collection. Washington and Lee Law        Review, 71(1), 3–91.

Bjelopera, J. (2013). The Federal Bureau of Investigation and Terrorism Investigations.        Congressional Research Service.

Boraz, S. C., & Bruneau, T. C. (2006). Reforming Intelligence: Democracy and Effectiveness.           Journal of Democracy, Volume 17,  Number 3.

Bowornwathana, B., & Poocharoen, O. (2010). Bureaucratic politics and administrative     reform: Why politics matters. Public Organization Review, 10(4), 303–321.

Brister, P. D. (2011, September). Ku Klux Rising: Toward an understanding of American right       wing terrorist campaigns. (Dissertation). Naval Postgraduate School.

Collier, P. and Horowitz, D. (2006). Destructive generation: second thoughts about the sixties.      San Francisco: Encounter Books.

Cunningham, D., & Browning, B. (2004). The Emergence of worthy targets: Official frames          and deviance narratives within the FBI. Sociological Forum, 19(3), 347–369.

Cunningham, D. (2003). Understanding state responses to Left-versus Right-wing threats: The          FBI’s repression of the New Left and the Ku Klux Klan. Social Science History, 27(3),   327–370.

Cunningham, D. (2003). The Patterning of Repression: FBI Counterintelligence and the New       Left. Social Forces, 82(1), 209–240.

DeLoach, C. (1995). Hoover’s FBI: the inside story by Hoover’s trusted lieutenant. Washington,         D.C.: Lanham, MD: Regnery Pub

Drabble, J. (2004). To ensure domestic tranquility: The FBI, COINTELPRO-WHITE HATE          and political discourse, 1964–1971. Journal of American Studies, 38(2), 297–328.

Drabble, J. (2007). From white supremacy to white power: The FBI, COINTELPRO-WHITE             HATE, and the Nazification of the Ku Klux Klan in the 1970s. American Studies, 48(3),

Gill, P. (2012). Intelligence, threat, risk and the challenge of oversight. Intelligence & National     Security, 27(2), 206–222.

Powers, R. G. (1987). Secrecy and power: the life of J. Edgar Hoover. New York; London: Free      Press; Collier Macmillan.

Theoharis, A. G. (2004). The FBI & American democracy: a brief critical history. Lawrence: University Press of Kansas.