Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Surreptitious Entries Black Bag Jobs — Part 3
Page 85
85 / 101
Mog,
,
’
Re: surreptitious Entries - Domestic Targets
¢
When a Special Agent in Charga (SAC) ofa field
-office considered surreptitious entry necessary to the
conduct of an investigation, he would make his request to
the appropriate Assistant Director at FBINOQ, justifying
the need for an entry and assuring it could be accon-
plished safely with full security. In accordance with
. instructions of Director J. Edgar Hoover, a memorandun
. * outlining the facts of the request was prepared for
. . approval of Mr. Hoover, or Iir. Toison, the Associate
Ad
Pad ’
amare bere rey ea
.
cd
}
Director. Subsequently, the memorandum was filed in
the Assistant Director's office under a “Do Not File"
procedure, and thereafter destroyed. In the field
office, the SAC maintained a record of approval as a
control device in his office safe. At the next yearly
field office insoection, a review of these records would
be made by the Inspector to insure that the SAC was not
acting without prior FBIHO approval in conducting
-+ | gurreptitious entries, Upon compiction of this revi
“"" « these records were destroyed.
Wy
There is no central index, file, or document
- - Misting surreptitious entries conducted against domestic
targets. To reconstruct these activities, it is necessary
to rely upon récollections of Special Agents who have
knowledge of such activities, and review of those files
identified by recollection as being targets of surreptitious
entries. Since policies and procedures followed in raporting
" o£ infornation resulting from a surreptitious entry were
‘@esigned to conceal the activity frem persons not having a
need to know, information contained in FBI files relating
to entries is in most instances incomplete and difficult
-, , to identify. ;
" Reconstruction of instances of surreptitious entry
through review of files and recollections of Special Agent
personnel at FHINO who have knoviedge of such activitics,
show the following targets and the approximate number of
entrics conducted against each:
Lad ae fF a a8 : =e . 5 . . ant . . "4 -
a foe, Sate tee Fae yt a rad fey. ata heel ye tape. thy ae et ie eee ae ial Laas
[a + . te . ate .
r
int jp a, Ag! ? fe go oy:
- mise is Fe Ae he Pay Frese ne Sethe, te Mey Sates + Sony Mal ops shite
PE ee ae a ott em te page y oot .
UIE a Fee yest nett Deng wt Lae eS
_° ‘ Pee . b .
+ . a
Sn oe or
SS eg ae CS a eels eg ene ay Set erp ame en ee TY” —
Eka Redd een Mesdetaitentoeratht Atcha Dedatateiatienenemmnnemadl
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic