The Lawless State

Last updated
First p/b edition (publ. Penguin Books) The Lawless State.jpg
First p/b edition (publ. Penguin Books)

The Lawless State was written in 1976 jointly by Morton H. Halperin, Jerry J. Berman, Robert L. Borosage, and Christine M. Marwick. It recounts abuses of power by the U.S. Government throughout the Cold War, and is concerned mostly with surveillance methods and overstepped boundaries.

Topics mentioned include:


Related Research Articles

<span class="mw-page-title-main">COINTELPRO</span> Series of covert and illegal projects by the FBI

COINTELPRO was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting domestic American political organizations. FBI records show COINTELPRO resources targeted groups and individuals the FBI deemed subversive, including feminist organizations, the Communist Party USA, anti–Vietnam War organizers, activists of the civil rights and Black power movements, environmentalist and animal rights organizations, the American Indian Movement (AIM), Chicano and Mexican-American groups like the Brown Berets and the United Farm Workers, independence movements, a variety of organizations that were part of the broader New Left, and white supremacist groups such as the Ku Klux Klan and the far-right group National States' Rights Party.

<span class="mw-page-title-main">Espionage</span> Clandestine acquisition of confidential information

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

<span class="mw-page-title-main">Federal Bureau of Investigation</span> U.S. federal law enforcement agency

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. An agency of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counterterrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes.

<span class="mw-page-title-main">J. Edgar Hoover</span> American law-enforcement administrator (1895–1972)

John Edgar Hoover was an American law-enforcement administrator who served as the final Director of the Bureau of Investigation (BOI) and the first Director of the Federal Bureau of Investigation (FBI). President Calvin Coolidge first appointed Hoover as director of the BOI, the predecessor to the FBI, in 1924. After 11 years in the post, Hoover became instrumental in founding the FBI in June 1935, where he remained as director for an additional 37 years until his death in May 1972 – serving a total of 48 years leading both the BOI and the FBI and under eight Presidents.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

<span class="mw-page-title-main">Secret police</span> Intelligence agency which operates in secrecy

Secret police are police, intelligence, or security agencies that engage in covert operations against a government's political, religious, or social opponents and dissidents. Secret police organizations are characteristic of authoritarian and totalitarian regimes. They protect the political power of a dictator or regime and often operate outside the law to repress dissidents and weaken political opposition, frequently using violence. They may enjoy legal sanction to hold and charge suspects without ever identifying their organization.

<span class="mw-page-title-main">Espionage Act of 1917</span> United States federal law

The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code but is now found under Title 18. Specifically, it is 18 U.S.C. ch. 37

<span class="mw-page-title-main">Fugitive</span> Person fleeing from custody

A fugitive is a person who is fleeing from custody, whether it be from jail, a government arrest, government or non-government questioning, vigilante violence, or outraged private individuals. A fugitive from justice, also known as a wanted person, can be a person who is either convicted or accused of a crime and hiding from law enforcement in the state or taking refuge in a different country in order to avoid arrest.

<span class="mw-page-title-main">Omnibus Crime Control and Safe Streets Act of 1968</span>

The Omnibus Crime Control and Safe Streets Act of 1968 was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance Administration (LEAA). Title III of the Act set rules for obtaining wiretap orders in the United States. The act was a major accomplishment of Johnson's war on crime.

<span class="mw-page-title-main">Carnivore (software)</span> Electronic communication monitor used by the FBI

Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software.

Ex parte Quirin, 317 U.S. 1 (1942), was a case of the United States Supreme Court that during World War II upheld the jurisdiction of a United States military tribunal over the trial of eight German saboteurs, in the United States. Quirin has been cited as a precedent for the trial by military commission of unlawful combatants.

<i>Hunter</i> (Pierce novel) 1989 novel written by William Luther Pierce

Hunter is a 1989 novel written by William Luther Pierce, a Neo-Nazi and the founder and chairman of National Alliance, a white nationalist group, under the pseudonym Andrew Macdonald. Pierce also used this pseudonym to write the better-known The Turner Diaries, a 1978 novel with similar themes. Some consider Hunter a prequel to the Turner Diaries, detailing the rise of the racist paramilitary group termed 'The Organization', which would play a dominant role in the book.

Athan George Theoharis was an American historian, professor of history at Marquette University in Milwaukee, Wisconsin. As well as his extensive teaching career, he was noteworthy as an expert on the Federal Bureau of Investigation (FBI), J. Edgar Hoover, and U.S. intelligence agencies, having written and edited many books on these and related subjects.

<span class="mw-page-title-main">Sociology of peace, war, and social conflict</span>

The sociological study of peace, war, and social conflict uses sociological theory and methods to analyze group conflicts, especially collective violence and alternative constructive nonviolent forms of conflict transformation.

Interdiction is a military term for the act of delaying, disrupting, or destroying enemy forces or supplies en route to the battle area. A distinction is often made between strategic and tactical interdiction. The former refers to operations whose effects are broad and long-term; tactical operations are designed to affect events rapidly and in a localized area.

<span class="mw-page-title-main">War Powers Act of 1941</span> United States emergency law authorizing entry into WWII

The War Powers Act of 1941, also known as the First War Powers Act, was an American emergency law that increased Federal power during World War II. The act was signed by U.S. President Franklin D. Roosevelt and put into law on December 18, 1941, less than two weeks after the Japanese attack on Pearl Harbor. The act was similar to the Departmental Reorganization Act of 1917 as it was signed shortly before the U.S. engaged in a large war and increased the powers of the president's U.S. Executive Branch.

Informatized warfare of China is the implementation of information warfare (IW) within the People's Liberation Army (PLA) and other organizations affiliated or controlled by the Chinese Communist Party (CCP). Laid out in the Chinese Defence White Paper of 2008, informatized warfare includes the utilization of information-based weapons and forces, including battlefield management systems, precision-strike capabilities, and technology-assisted command and control (C4ISR). However, some media and analyst report also uses the term to describe the political and espionage effort from the Chinese state.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">Insider Threat Program</span>

The Insider Threat Program is the United States government's response to the massive data leaks of the early twenty-first century, notably the diplomatic cables leaked by Chelsea Manning but before the NSA leaks by Edward Snowden. The program was established under the mandate of Executive Order 13587 issued by Barack Obama.

<span class="mw-page-title-main">Apple–FBI encryption dispute</span> 2015-2016 public relations and legal dispute

The Apple–FBI encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access to strong encryption.