<> The role of the armed forces in the United States has been a contentious issue for more than a century.
The Posse Comitatus Act of 1878, which restricts military forces from performing domestic law enforcement duties, like policing, was enacted after the Civil War in response to the perceived misuse of federal troops who were policing in the South.
Over the years, the law has been amended to allow the military to lend equipment to federal, state and local authorities; assist federal agencies in drug interdiction; protect national parks; and execute quarantine and certain health laws.
About 5,000 federal troops supported civilian agencies at the Winter Olympics in Salt Lake City three years ago.
Since Sept. 11, however, military and law enforcement agencies have worked much more closely not only to help detect and defeat any possible attack, including from unconventional weapons, but also to assure the continuity of the federal government in case of cataclysmic disaster.
The commandos here this week were the same type of Special Operations forces who are hunting top insurgents in Iraq and Osama bin Laden in the mountainous wilds of Afghanistan and Pakistan.
But under the top-secret military plan, they are also conducting counterterrorism missions in support of civilian agencies in the United States. <>
January 23, 2005 Commandos Get Duty on U.S. Soil By ERIC SCHMITT
http://www.nytimes.com/2005/01/23/national/nationalspecial3/23code.html?th
WASHINGTON, Jan. 22 - Somewhere in the shadows of the White House and the Capitol this week, a small group of super-secret commandos stood ready with state-of-the-art weaponry to swing into action to protect the presidency, a task that has never been fully revealed before.
As part of the extraordinary army of 13,000 troops, police officers and federal agents marshaled to secure the inauguration, these elite forces were poised to act under a 1997 program that was updated and enhanced after the Sept. 11 attacks, but nonetheless departs from how the military has historically been used on American soil.
These commandos, operating under a secret counterterrorism program code-named Power Geyser, were mentioned publicly for the first time this week on a Web site for a new book, "Code Names: Deciphering U.S. Military Plans, Programs and Operation in the 9/11 World," (Steerforth Press). The book was written by William M. Arkin, a former intelligence analyst for the Army.
The precise number of these Special Operations forces in Washington this week is highly classified, but military officials say the number is very small. The special-missions units belong to the Joint Special Operations Command, a secretive command based at Fort Bragg, N.C., whose elements include the Army unit Delta Force.
In the past, the command has also provided support to domestic law enforcement agencies during high-risk events like the Olympics and political party conventions, according to the Web site of GlobalSecurity.org, a research organization in Alexandria, Va. <>
"They bring unique military and technical capabilities that often are centered around potential W.M.D. events," said a senior military official who has been briefed on the units' operations.
A civil liberties advocate who was told about the program by a reporter said that he had no objections to the program as described to him because its scope appeared to be limited to supporting the counterterrorism efforts of civilian authorities.
Mr. Arkin, in the online supplement to his book ( http://codenames.org/documents.html ), says the contingency plan, called JCS Conplan 0300-97, calls for "special-mission units in extra-legal missions to combat terrorism in the United States" based on top-secret orders that are managed by the military's Joint Staff and coordinated with the military's Special Operations Command and Northern Command, which is the lead military headquarters for domestic defense.
Mr. Arkin provided The New York Times with briefing slides prepared by the Northern Command, detailing the plan and outlining the military's preparations for the inauguration.
Three senior Defense Department and Bush administration officials confirmed the existence of the plan and mission, but disputed Mr. Arkin's characterization of the mission as "extra-legal." <>
In a telephone interview from his home in Vermont, Mr. Arkin said the military's reaction to the disclosure of the counterterrorism plan and its operating units reflected "the silliness of calling something that's obvious, classified."
"I'm not revealing what they're doing or the methods of their contingency planning," he said. "I don't compromise any sensitive intelligence operations by revealing sources and methods. I don't reveal ongoing operations in specific locales."
Mr. Arkin's book is a glossary of more than 3,000 code names of past and present operations, programs and weapons systems, with brief descriptions of each. Most involved secret activities, and details of many of the programs could not be immediately confirmed.
The book also describes American military operations and assistance programs in scores of countries, from Afghanistan to Zimbabwe.
The murky world of "special access programs" and other secret military and intelligence activities is covered in the book, too. Some code names describe highly classified research programs, like Thirsty Saber, a program that in the 1990's tried to develop a sensor to replace human reasoning.
Others describe military installations in foreign countries, like Poker Bluff I, an electronic-eavesdropping collection station in Honduras in the 1980's.
Many involve activities related to the survival of the president and constitutional government. The book, for instance, describes Site R, one of the undisclosed locations used by Vice President Dick Cheney since the Sept. 11 attacks.
Site R is a granite mountain shelter just north of Sabillasville, Md., near the Pennsylvania border. It was built in the early 1950's to withstand a Soviet nuclear attack.
The book also describes a program called Treetop, the presidential emergency successor support plan, which provides survivors of a nuclear strike or other attack with war plans, regulations and procedures to establish teams of military and civilian advisers to presidential successors.
A White House spokesman declined to comment on the continuity of government activities cited in the book. <>
-- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.302 / Virus Database: 265.7.3 - Release Date: 1/24/2005