JFK (44 page)

Read JFK Online

Authors: Oliver Stone,L. Fletcher Prouty

BOOK: JFK
5.05Mb size Format: txt, pdf, ePub

As this realization has permeated the various levels of world leadership, those in positions of genuine power face the chilling reality of this truth. Their game of nations, their house of cards, is already showing signs of falling apart. Principal among these fading truths is the very evident decay of national sovereignty. Without sovereignty there can be no nation-state, and without the state, what remains? A New World Order? Perhaps.

In the
New York Times
of July 16, 1986, James Reston wrote, “The Congress has returned from its July Fourth recess to a capital that is changing in subtle ways.” He noted that leaders of both parties have been forced to wonder how the United States could have lost its lead in the trade markets of the world. The United States is now the world’s leading debtor nation. Reston observed that officials in Washington were finding their pet theories being murdered by the brutal facts and were beginning to wonder what went wrong.

To the question that many were asking, “What went wrong?” he responded, “What we are seeing is just the beginning of a philosophical inquiry about the assumptions of the past—even the validity of the sovereign nation-state.”

Reston has not been the only one showing concern over this important subject. The fate of our own nation and of the family of nations hangs in the balance.

During an informal presentation at the National Press Club, a reporter asked the speaker, Richard Perle, then an assistant secretary of state under Reagan and a frequent voice of the Reagan administration on such matters, whether or not he thought the administration had been willfully disregarding national sovereignty. It was the only question Perle evaded and left unanswered during the meeting. He had no other choice. He could scarcely have honestly claimed that the administration did recognize and did honor the principle of national sovereignty. This is evidence of Reston’s “philosophical inquiry.” On a subject of such magnitude, a response is not easy.

On the other hand, Walter Wriston, formerly chief executive officer of Citicorp, the nation’s biggest banking organization at that time, raised similar questions in his book
Risk and Other Four-Letter Words.
3

People of all nations have long since adjusted to the grim reality that an intercontinental ballistic missile can travel from the Soviet Union to the United States, or a reverse path, in about thirty minutes, carrying enough explosives to render society unlivable. . . . We now have a less visible but perhaps equally profound challenge to the unlimited sovereign power of nation-states in the technical reality of global communications.

What we are witnessing and participating in is a true revolution, and like all revolutions it is creating political unease.

 

Wriston cites “communications” as a “challenge . . . to sovereign power” perhaps equal to that of ICBMs. Obviously, both serve to severely limit the undivided power of nation-states. Once that power has been divided, it is, by definition, no longer sovereign.

Things were not always this way. In fact, the concept of sovereignty itself is of rather recent origin. During the sixteenth century, the French political philosopher Jean Bodin defined sovereignty as the ultimate location of that power “which legally commands and is not commanded by others.” He wrote, “Sovereignty is what distinguishes the state from any other kind of human association.” It is neither size nor might, nor the lack thereof, that counts on the world plane: “A state remains a state as long as it is sovereign. . . . Sovereignty determines the structure of the state.” It is basically unitary and indivisible. The jurisdiction of the state cannot be divided, and the state is supreme within its own boundaries.
4

These have been reliable and respected definitions and ideas until rather recently. It may be that this international obligation to honor the concept of sovereignty “no matter the size and power of the state” has led to the utilization of deep secrecy to cover those small, secret operations carried out by one state within the borders of another. The operative state believes in sovereignty as a foundation of the intangible structure of the family of nations; it carries out a covert operation for reasons of presumed necessity, hoping that it will not be discovered and exposed. If exposed, the operative state hopes that it may be able to disclaim, quite plausibly, its sinister and unwelcome role in the affair. This has been the unwritten policy among nations for centuries.

It may be said, with few exceptions of any significance, that this was the policy of the Eisenhower administration and its predecessors. It may also be said that this was why the Eisenhower administration from time to time directed the CIA, rather than the uniformed military establishment, to plan for and carry out such operations, even though the military possessed the experience and the assets required for such activities and the CIA did not. Within the terms of such a policy, the requirement for secrecy outweighed other considerations. In other words, the administration took a gamble and placed its chips on the CIA.

By the last years of the Eisenhower era, the CIA had overleaped its bounds. Its vast operations in Indochina, Tibet, and Indonesia and its U-2 spy-plane flights over the Soviet Union had seriously compromised this policy because the operations could not be kept secret, if for no other reason than their size and duration.

The Kennedy administration inherited this situation, and the early exposure of this practice caused by the disaster on the beach at the Bay of Pigs in Cuba brought things to a head. Kennedy’s new policy signaled a direct turnabout of the assignment of responsibility for covert operations from the CIA to the military.

In June 1961, when this new policy was announced, Gen. Lyman L. Lemnitzer was the chairman of the Joint Chiefs. He and the service chiefs were traditionalists. (The chiefs at that time were Gen. George Decker for the army Adm. Arleigh A. Burke for the navy, and Gen. Thomas D. White for the air force. Lemnitzer’s good friend and confidant, Gen. David M. Shoup, commandant of the Marine Corps, also attended meetings of the Joint Chiefs.) These men all believed that warfare and the utilization of military forces was a formal affair and that the military services were not to be used in any other country large or small, in violation of that state’s sovereignty. They also believed that the utilization of military forces within the borders of the United States, save for accepted emergency situations, was also a violation of the state’s sovereignty, that is, its power to govern and command.

In this climate, General Lemnitzer and the service chiefs studied each of the NSAMs from the White House with considerable care.

Not long after NSAM #55, “Relations of the Joint Chiefs of Staff to the President in Cold War Operations,” had been signed by President Kennedy, it was delivered to the secretary of the Joint Staff. Discussion of NSAM #55, #56 and #57 was scheduled on the “Joint Chiefs’ agenda” for an early meeting.

The Joint Chiefs of Staff meet regularly in the Gold Room in the heart of the windowless JCS area of the Pentagon in the depths of that vast building. The agenda for each meeting is selected with care, running from routine unclassified items to those of the very highest classification. The military service and the Joint Staff briefing officers are notified well in advance that they are on the agenda for that date.

In the Gold Room, the chairman and the service chiefs sit at a large table with ranking staff associates from each service. Rows of special staff members are seated behind them. As a result of the security classification pecking order, these extra staff officials leave after the briefing on their special subject has been given and before the next-higher level of classification begins. As the morning proceeds, both tables thin out with the departure of these officials.

On that day in July 1961 when the Joint Chiefs met on these directives, the briefing began with the definition of “Cold War operations.” They are secret, clandestine operations sponsored by the highest authority of the U.S. government “in support of an existing government friendly to the United States, or in support of a rebel group seeking to overthrow a government hostile to us.” “Cold War Operations” are distinct from “Secret Intelligence Operations.”
5
Both of these types of operations are a violation of the sovereignty of some state, sometimes even of a friendly state that may unwittingly become involved in the action.

Although such operations had been carried out by the U.S. government, in one way or another, since 1948 (and of course during World War II), it was surprising to see how little the Joint Chiefs actually knew about them and how little close-in experience they had in this area of operations.

One of the prominent members of the U.S. Senate,
6
a member of that select group which is always informed of such CIA activities before they take place, told me one day when I had been sent to tell him about one of these operations, “Keep it short. What I don’t know about it won’t hurt me.” I had learned that by “short” he meant, “Don’t tell me anything.” That was Senate “oversight” in the 1950s. The JCS felt much the same way and had limited their participation in both the planning and operation of such activities as much as possible.

As the discussion of NSAM #55 broadened, General Lemnitzer and General Shoup—both of whom had commanded military units on Okinawa that had provided extensive support for the huge CIA activity that took place against the government of President Sukarno of Indonesia in 1958—admitted that they had not realized that that was what had been done with the planeloads of weapons and other war matériel they had furnished in response to a “classified” request made by a CIA agent in U.S. military uniform. It did not take long to see that these military men, all chiefs of their services, were not Cold Warriors and did not intend to be.

They listened intently to the President’s statement: “I regard the Joint Chiefs of Staff as my principal military adviser responsible both for initiating advice to me and for responding to requests for advice. I expect their advice to come to me direct and unfiltered.”

They had rarely been included in the special policy channel—which Allen Dulles had perfected over the past decade—that ran from the National Security Council (NSC) to the CIA for all clandestine operations. They did not want to be involved. Their services, of course, inevitably got involved whenever CIA operators approached the individual services for support, such as weapons from the army, airlift from the air force, or sealift from the navy. But despite this logistical support they rarely, if ever, participated in the overall operational planning with the CIA—even for such complex “secret” activities as the Bay of Pigs invasion of Cuba.

After the chiefs had been briefed on the key elements of the directives, copies were given to each of them personally for safekeeping. NSAM #56, “Evaluation of Paramilitary Requirements,” had been delivered to the secretary of defense by the White House. It required the compilation of an “inventory [of] the paramilitary assets we have in the United States armed forces.” This task had been assigned by Secretary McNamara to that longtime CIA operator Gen. Edward G. Lansdale.

The third presidential directive, NSAM #57, “Responsibility for Paramilitary Operations,” was a document of great potential. As written, the primary thrust was contained in an enclosure that proposed the establishment of a Strategic Resources Group for initial consideration of all paramilitary operations and for approval, as necessary, by the President.

Despite this quite specific language defining the role of this new group, the covering letter contained a recommendation that “the Special Group [5412 Committee] will perform the functions assigned in the recommendation to the Strategic Resources Group.”

For an important paper from the White House, the language of the covering letter came as quite a surprise. The message of the directive was carried in the enclosure, yet it was negated completely by the sentence cited above that assigned the responsibility for “paramilitary operations” back to the system used by the National Security Council and the CIA since 1954. The confused language that did this was a “recommendation” about a “recommendation.”

We know that the basic paper (the enclosure) was written by Gen. Maxwell Taylor. The letter that reversed the Taylor procedure was written and signed by McGeorge Bundy. In this connection, it is interesting to recall that it was McGeorge Bundy who had made the telephone call to Gen. Charles Cabell, the deputy director of the CIA, on the evening before the Bay of Pigs invasion, canceling the essential air strikes against the last of Castro’s combat aircraft, even though President Kennedy had approved those same air strikes that very afternoon. Later, Bundy, with his brief message, again reversed a decision of the President as affirmed in NSAMs #55 and #57: “I regard the Joint Chiefs of Staff as my principal military adviser responsible both for initiating advice to me and for responding to requests for advice.”

By concluding that the Special Group would “perform the functions” of the new Strategic Resources Group, NSAM #57 left the former Cold War operations system in place with one stroke of the McGeorge Bundy pen. This circumscribed the role of the Strategic Resources Group designed by General Taylor. (The supersecret 5412 Committee had been created early in the Eisenhower years and had become the compliant tool of the CIA.)

The JCS recognized this loophole immediately and slipped through it. They did not want the job of clandestine Cold War operations. With its toe firmly in the door as a result of the loophole in NSAM #57, the CIA began an argument that effectively neutralized that directive and the others. NSAM #57 said, “Where such an operation [clandestine] is to be wholly covert or disavowable, it may be assigned to CIA, provided that it is within the normal capability of the agency.”

Other books

RARE BEASTS by Ogden, Charles, Carton, Rick
Sunset Mantle by Reiss, Alter S.
Undead and Unappreciated by MaryJanice Davidson
When the Heavens Fall by Marc Turner
Medicine Men by Alice Adams
The Pineville Heist by Lee Chambers
Throwaways by Jenny Thomson