Burglars Who Took On F.B.I. Abandon Shadows

formatting link
abandon-shadows.html Burglars Who Took On F.B.I. Abandon Shadows By MARK MAZZETTI Published: January 7, 2014 PHILADELPHIA ? The perfect crime is far easier to pull off when nobody is watching. So on a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludg eoned each other over 15 rounds in a televised title bout viewed by million s around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, makin g off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymous ly to newspaper reporters were the first trickle of what would become a flo od of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. The burglary in Media, Pa., on March 8, 1971, is a historical echo today, a s disclosures by the former National Security Agency contractor Edward J. S nowden have cast another unflattering light on government spying and opened a national debate about the proper limits of government surveillance. The burglars had, until now, maintained a vow of silence about their roles in t he operation. They were content in knowing that their actions had dealt the first significant blow to an institution that had amassed enormous power a nd prestige during J. Edgar Hoover?s lengthy tenure as director. ?When you talked to people outside the movement about what the F.B.I. was doing, nobody wanted to believe it,? said one of the burglars, Keith For syth, who is finally going public about his involvement. ?There was only one way to convince people that it was true, and that was to get it in thei r handwriting.? Mr. Forsyth, now 63, and other members of the group can no longer be prosec uted for what happened that night, and they agreed to be interviewed before the release this week of a book written by one of the first journalists to receive the stolen documents. The author, Betty Medsger, a former reporter for The Washington Post, spent years sifting through the F.B.I.?s volumi nous case file on the episode and persuaded five of the eight men and women who participated in the break-in to end their silence. Unlike Mr. Snowden, who downloaded hundreds of thousands of digital N.S.A. files onto computer hard drives, the Media burglars did their work the 20th

-century way: they cased the F.B.I. office for months, wore gloves as they packed the papers into suitcases, and loaded the suitcases into getaway car s. When the operation was over, they dispersed. Some remained committed to antiwar causes, while others, like John and Bonnie Raines, decided that the risky burglary would be their final act of protest against the Vietnam War and other government actions before they moved on with their lives. ?We didn?t need attention, because we had done what needed to be done, ? said Mr. Raines, 80, who had, with his wife, arranged for family member s to raise the couple?s three children if they were sent to prison. ?Th e ?60s were over. We didn?t have to hold on to what we did back then. ? A Meticulous Plan The burglary was the idea of William C. Davidon, a professor of physics at Haverford College and a fixture of antiwar protests in Philadelphia, a city that by the early 1970s had become a white-hot center of the peace movemen t. Mr. Davidon was frustrated that years of organized demonstrations seemed to have had little impact. In the summer of 1970, months after President Richard M. Nixon announced th e United States? invasion of Cambodia, Mr. Davidon began assembling a tea m from a group of activists whose commitment and discretion he had come to trust. The group ? originally nine, before one member dropped out ? concluded that it would be too risky to try to break into the F.B.I. office in downto wn Philadelphia, where security was tight. They soon settled on the bureau ?s satellite office in Media, in an apartment building across the street from the county courthouse. That decision carried its own risks: Nobody could be certain whether the sa tellite office would have any documents about the F.B.I.?s surveillance o f war protesters, or whether a security alarm would trip as soon as the bur glars opened the door. The group spent months casing the building, driving past it at all times of the night and memorizing the routines of its residents. ?We knew when people came home from work, when their lights went out, whe n they went to bed, when they woke up in the morning,? said Mr. Raines, w ho was a professor of religion at Temple University at the time. ?We were quite certain that we understood the nightly activities in and around that building.? But it wasn?t until Ms. Raines got inside the office that the group grew confident that it did not have a security system. Weeks before the burglary , she visited the office posing as a Swarthmore College student researching job opportunities for women at the F.B.I. The burglary itself went off largely without a hitch, except for when Mr. F orsyth, the designated lock-picker, had to break into a different entrance than planned when he discovered that the F.B.I. had installed a lock on the main door that he could not pick. He used a crowbar to break the second lo ck, a deadbolt above the doorknob. After packing the documents into suitcases, the burglars piled into getawa y cars and rendezvoused at a farmhouse to sort through what they had stolen . To their relief, they soon discovered that the bulk of it was hard eviden ce of the F.B.I.?s spying on political groups. Identifying themselves as the Citizens? Commission to Investigate the F.B.I., the burglars sent sel ect documents to several newspaper reporters. Two weeks after the burglary, Ms. Medsger wrote the first article based on the files, after the Nixon ad ministration tried unsuccessfully to get The Post to return the documents. Keith Forsyth, in the early 1970s, was the designated lock-picker among the eight burglars. When he found that he could not pick the lock on the front door of the F.B.I. office, he broke in through a side entrance. At The Washington Post, Betty Medsger was the first to report on the conten ts of the stolen F.B.I. files. Now, she has written a book about the episod e. Afterward, they fled to a farmhouse, near Pottstown, Pa., where they spent

10 days sorting through the documents. Readers? Comments Other news organizations that had received the documents, including The New York Times, followed with their own reports. Ms. Medsger?s article cited what was perhaps the most damning document fr om the cache, a 1970 memorandum that offered a glimpse into Hoover?s obse ssion with snuffing out dissent. The document urged agents to step up their interviews of antiwar activists and members of dissident student groups. ?It will enhance the paranoia endemic in these circles and will further s erve to get the point across there is an F.B.I. agent behind every mailbox, ? the message from F.B.I. headquarters said. Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student gr oups on college campuses. But the document that would have the biggest impact on reining in the F.B.I .?s domestic spying activities was an internal routing slip, dated 1968, bearing a mysterious word: Cointelpro. Neither the Media burglars nor the reporters who received the documents und erstood the meaning of the term, and it was not until several years later, when the NBC News reporter Carl Stern obtained more files from the F.B.I. u nder the Freedom of Information Act, that the contours of Cointelpro ? sh orthand for Counterintelligence Program ? were revealed. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civi l rights leaders, political organizers and suspected Communists, and had tr ied to sow distrust among protest groups. Among the grim litany of revelati ons was a blackmail letter F.B.I. agents had sent anonymously to the Rev. D r. Martin Luther King Jr., threatening to expose his extramarital affairs i f he did not commit suicide. ?It wasn?t just spying on Americans,? said Loch K. Johnson, a profess or of public and international affairs at the University of Georgia who was an aide to Senator Frank Church, Democrat of Idaho. ?The intent of Coint elpro was to destroy lives and ruin reputations.? Senator Church?s investigation in the mid-1970s revealed still more about the extent of decades of F.B.I. abuses, and led to greater congressional o versight of the F.B.I. and other American intelligence agencies. The Church Committee?s final report about the domestic surveillance was blunt. ?T oo many people have been spied upon by too many government agencies, and to o much information has been collected,? it read. By the time the committee released its report, Hoover was dead and the empi re he had built at the F.B.I. was being steadily dismantled. The roughly 20 0 agents he had assigned to investigate the Media burglary came back empty- handed, and the F.B.I. closed the case on March 11, 1976 ? three days aft er the statute of limitations for burglary charges had expired. Michael P. Kortan, a spokesman for the F.B.I., said that ?a number of eve nts during that era, including the Media burglary, contributed to changes t o how the F.B.I. identified and addressed domestic security threats, leadin g to reform of the F.B.I.?s intelligence policies and practices and the c reation of investigative guidelines by the Department of Justice.? According to Ms. Medsger?s book, ?The Burglary: The Discovery of J. Edg ar Hoover?s Secret F.B.I.,? only one of the burglars was on the F.B.I. ?s final list of possible suspects before the case was closed. A Retreat Into Silence The eight burglars rarely spoke to one another while the F.B.I. investigati on was proceeding and never again met as a group. Mr. Davidon died late last year from complications of Parkinson?s disease . He had planned to speak publicly about his role in the break-in, but thre e of the burglars have chosen to remain anonymous. Among those who have come forward ? Mr. Forsyth, the Raineses and a man n amed Bob Williamson ? there is some wariness of how their decision will b e viewed. The passage of years has worn some of the edges off the once radical politi cal views of John and Bonnie Raines. But they said they felt a kinship towa rd Mr. Snowden, whose revelations about N.S.A. spying they see as a bookend to their own disclosures so long ago. They know some people will criticize them for having taken part in somethin g that, if they had been caught and convicted, might have separated them fr om their children for years. But they insist they would never have joined t he team of burglars had they not been convinced they would get away with it . ?It looks like we?re terribly reckless people,? Mr. Raines said. ?B ut there was absolutely no one in Washington ? senators, congressmen, eve n the president ? who dared hold J. Edgar Hoover to accountability.? ?It became pretty obvious to us,? he said, ?that if we don?t do it, nobody will.? Cut and pasted under the FAIR USE exceptions to United States Copyright law, for discussion and not for profit.
Reply to
Greegor
Loading thread data ...

Why does EVERYONE miss the main point of all this surveillance? Surveillance, per se, is not that bad, because for those doing nothing wrong it confirms they're doing nothing wrong and for those who might do wrong it may dissuade them from doing wrong. Where all this survellance gets off track is when the results start being used to modify behaviour towards an end goal, especially prevent dissent. Or, like during the present admiinistration, IRS being used as an arm to control dissent.

IMHO, THAT's what's wrong with all the surveillance - its abuse, not the fact that it exists.

Reply to
RobertMacy

Agreed! Although it probably only catches dumb criminals who use their phones to schedule criminal activity. ...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142   Skype: Contacts Only  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

No, you're missing it. The government isn't allowed to storm through your house or records just to see what you're up to. They need probable cause, an oath or affirmation from a witness, and a warrant from a judge.

There are very, very good reasons for that.

That ALWAYS happens. If they have the information, they abuse it ALWAYS.

The only safeguard is for them not to have it, unless on warrants issued on probable cause, upon oath or affirmation of a witness, and order of a judge.

IOW, the Fourth Amendment.

In a free society and a free people you're not allowed to spy on everyone, just to see what you think they might do.

The surveillance itself chills dissent, changes behavior. Like in East Germany, people don't text things freely, not without thinking first. People try to write in a way outsiders can't misinterpret, since they assume outsiders will be reading. They don't freely exchange technical or business ideas, same reason. Do you?

It's also useless--the Russians TOLD them the Boston bombers were hinky, and they STILL completely missed it--but that's a side issue.

Cheers, James Arthur

Reply to
dagmargoodboat

I agree 100%.

Both right and left parties seem united in their silence on all this, by the way. At least on this side of the pond.

--

John Devereux
Reply to
John Devereux

In the early 70's I worked with the founders of Creative Labs. You remember, Creative Labs had the 30:1 almost lossless video compression algorithm, which resulted in a video output at 1.54Mbs compatible with disk drive system speeds. The origins of that algorithm were based upon military satellite image compression. Even earlier than THAT time, satellites could read the headlines of a newspaper lying on the ground. If they could do that then, it seems reasonable those satellites could now probably count the pores on your face! Which leads me to England's extensive use of cameras AND facial recognition software. Now, add telephony like sound pickup, and you could pretty much track, and listen in on, ANY suspect's activities.

Sadly, more likely in today's scenario, 'prime' a deranged individual to do some absolutely pointless, stupid terrorist action in order to justify the surveillance and gain more funding.

Reply to
RobertMacy

It's even simpler than that. I've heard, but not verified, that you cellphone carrier can poll the GPS in your cellphone even when it's supposedly turned off. Maybe make a pocket protector from muMetal ?>:-} ...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142   Skype: Contacts Only  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

But the spooks get too powerful, just like third-world militaries. Hoover was just one guy with some file folders. The NSA has everything.

Remember Lord Acton.

Phil Hobbs

--
Dr Philip C D Hobbs 
Principal Consultant 
ElectroOptical Innovations LLC 
Optics, Electro-optics, Photonics, Analog Electronics 

160 North State Road #203 
Briarcliff Manor NY 10510 

hobbs at electrooptical dot net 
http://electrooptical.net
Reply to
Phil Hobbs

What do you mean "more likely"? Try "is being done". Google "Pioneer Courthouse Bombing" and read up. That kid isn't the only one that the FBI manufactured just to get a high-profile arrest.

--

Tim Wescott 
Wescott Design Services 
http://www.wescottdesign.com
Reply to
Tim Wescott

They don't have to. The tower pings record is more than enough to identify and track you.

formatting link

Or just don't carry a phone.

Cheers, James Arthur

Reply to
dagmargoodboat

When the phone is OFF?

...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142   Skype: Contacts Only  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

With smartphones, what does "off" mean?

Just because the display is dark, you can't assume nothing's going on inside...

You know, there's a killing to be made in the mumetal hat trade for the real wingnuts. ;>)

Mark L. Fergerson

Reply to
Percival

My phone turns itself on, unpredictably. It's not supposed to, but there it is. YMMV.

If your phone were truly off you wouldn't need the mu-metal shield you'd suggested.

Cheers, James Arthur

Reply to
dagmargoodboat

The American view dates back to before the spat of 1776. British troops could (and did) regularly storm into colonists' houses and search through all their stuff. Why? For no particular reason, just making sure you weren't up to anything.

The practice was called "General Warrants." We colonials didn't like it. Our Fourth Amendment stipulates that only particular warrants naming specific persons, and the property or items to be searched are legal.

NSA's collection of metadata--and the FISA warrants--amount to General Warrants, issued against people who are neither specified, nor suspected of anything wrong.

It's quite literally unAmerican.

Cheers, James Arthur

Reply to
dagmargoodboat

I haven't had that problem, but then I don't own a modern day "smart" phone... touch screens suck in the Arizona sunlight. I have an LG VN251 with real buttons. ...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142   Skype: Contacts Only  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

Human beings are opportunists by nature. Given access to a resource such as information -- they will tend to make use of it to their own advantage-as-they-perceive-it. This can be as serious as disclosing Top Secret documents for money or in order to satisfy one's conscience/ego, or as trivial as using a DMV database to check up on the guy your sister just started dating.

It's not a new problem. The phrase "Quis custodiet ipsos custodes?" has links back to the Roman poet Juvenal and Plato:

formatting link

And one of the best statements of the problem was written by one of our founding fathers:

"If men were angels, no government would be necessary. If angels were to govern men, neither external nor internal controls on government would be necessary. In framing a government which is to be administered by men over men, the great difficulty lies in this: you must first enable the government to control the governed; and in the next place oblige it to control itself. A dependence on the people is, no doubt, the primary control on the government; but experience has taught mankind the necessity of auxiliary precautions." -- James Madison / The Federalist Papers

The potential for abuse is always present. The trick seems to be coming up with a way of limiting the abuse -- and, this being a democratic republic, of convincing _others_ that those limits can and will be adhered to -- without exposing so much of the inner workings of police and security organizations that they cannot function. And, of course, "so much" and "cannot function" are vaguely-defined and context-dependent terms.

I wish I had a solution. Even a limited one. Still, I'm glad that the discussion continues.

Frank McKenney

--
  I'm not here to tell you whether there are things you should believe 
  with _absolute_ and _unequivocal_ certainty or not.  But perhaps we 
  should be more honest about declaiming these.  Absolutely nothing is 
  gained when one person who holds that there is a 0 percent 
  probability of something argues against another person who holds 
  that the probability is 100 percent.  Many wars -- like the 
  sectarian wars in Europe in the early days of the printing press -- 
  probably result from something like this premise. 

                    -- Nate Silver / The Signal and the Noise
Reply to
Frnak McKenney

Well said. A good democracy will only flourish if the information used to make decisions is true.

Reply to
RobertMacy

The TSA does the same BS regarding "test" "terrorist" activities.

Reply to
Robert Baer

Yes. For example, Obamacare aggregates and shares public and private information on every American on a scale unprecedented in history, such as your medical, employment and income records; tax returns; and more, for the purpose of determining eligibility, subsidies, compliance with the mandates, and studying quality of care.

Yet, the database has barely even existed, and it's already being made available for checking firearm purchases.

formatting link

The solution doesn't seem particularly obscure; the protections of the Fourth Amendment are as elegant as they are fundamental--the government isn't allowed to spy on you without probable cause. The government is barred from acting (generally) on what /it/ thinks you /might/ do until you do it, without some sort of high justification that you will.

But that's not what's happening today. Today our government is issuing General Warrants against the entire populace without cause, and on the scrutiny of secret magistrates. And dissembling about it. All of these are dreadfully wrong.

And, as an aside, ineffective and mostly pointless. I daresay the information gathered is being used far more often nefariously than righteously.

Cheers, James Arthur

Reply to
dagmargoodboat

  • What about the illegal searches by the TSA??

Reply to
Robert Baer

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.