Nixon White House may have bugged Pentagon leadership

Richard Nixon

Richard Nixon

By JOSEPH FITSANAKIS | intelNews.org |
Everyone familiar with American political history knows about the ‘White House Plumbers’, a covert special investigations unit established during the Presidency of Richard Nixon, and tasked with spying on his political opponents. The unit’s bungled attempt to burgle the Watergate offices of the Democratic National Committee, in 1972, eventually led to Nixon’s resignation. But the Watergate burglary was but one of many operations conducted by the ‘Plumbers’, who were one of several ‘dirty tricks’ units managed by the Nixon White House. Now, nearly 40 years after the Watergate scandal erupted, veteran intelligence correspondent Jeff Stein provides new information that suggests the Nixon White House may have bugged the Pentagon telephones of senior American military officials. Stein managed to track down Dave Mann, a former member of the Pentagon’s Counterintelligence Force, who in 1971 stumbled upon a classified report claiming that listening bug signals had been detected emanating from offices in the Joint Chiefs of Staff. The signals had been picked up by a technical surveillance countermeasures (TSCM) team during a routine sweep of the Pentagon, in search of unauthorized interception devices. Mann run some tests to verify the TCM team’s report, and discovered that the bug signals originated from the personal office telephone line of General William Westmoreland, who was then the US Army’s Chief of Staff. He also discovered that the telephone of his assistant had been compromised, as well as the telephone lines belonging to the US Army’s assistant secretary, its logistics director, and at least one general. Mann’s personal conclusion was that the phone lines were most likely bugged with the cooperation of the Chesapeake and Potomac Telephone Company, which was at that the time considered an operational wing of the FBI, under Director J. Edgar Hoover. Read more of this post

%d bloggers like this: