Professional Documents
Culture Documents
HAVEN SMITH - Preventing State Crimes Against Democracy
HAVEN SMITH - Preventing State Crimes Against Democracy
Volume 41 Number 5
September 2009 527-550
© 2009 SAGE Publications
Preventing State Crimes 10.1177/0095399709339014
http://aas.sagepub.com
Lance deHaven-Smith
Florida State University, Tallahassee
Matthew T. Witt
University of La Verne, California
527
528 Administration & Society
Examples of high-level SCADs that have been officially proven include the
Watergate break-ins and cover-up (Bernstein & Woodward, 1974), the secret
wars in Laos and Cambodia (Ellsberg, 2002), the illegal arms sales and covert
operations in Iran–Contra (Kornbluh & Byrne, 1993; Martin, 2001; Parry,
1999), and the effort to discredit Joseph Wilson by revealing his wife’s status
as an intelligence agent (Isikoff & Corn, 2006). There have been many other
political crimes in which involvement by high officials is suspected have
gone uninvestigated or unpunished. Examples of suspected SCADs in high
office include the fabricated attacks on U.S. ships in the Gulf of Tonkin
(Ellsberg, 2002, pp. 7-20), the “October Surprises” in the presidential elec-
tions of 1968 (Summers, 2000, pp. 298-308) and 1980 (Parry, 1993; Sick,
1991), the election breakdowns in 2000 and 2004 (deHaven-Smith, 2005;
Miller, 2005), and the misrepresentation of intelligence to justify the invasion
and occupation of Iraq (Isikoff & Corn, 2006; Rich, 2006).
Nefarious involvement by high-ranking public officials in these and
similar events cannot simply be dismissed as improbable, for the investiga-
tions of Watergate and Iran–Contra showed that officials at the highest
levels of American government can and sometimes do engage in conspira-
cies to manipulate elections, wiretap and smear critics, mislead Congress
and the public, and in other ways subvert popular sovereignty (Summers,
2000; Walsh, 1997). Corruption in high office is also predicted by a number
of theoretical traditions in public administration and policy that point to
sinister, antidemocratic tendencies in modern representative government.
Examples include Harold Lasswell’s garrison–state construct, C. Wright
Mills’ theory of the power elite, and Jürgen Habermas’s critical theory. Yet
another reason to be open to the possibility of political criminality in high
office is the rise since the 1930s of what economists and criminologists
refer to as “control frauds” (Black, 2005; Calavita, Pontell, & Tillman,
1999). Usually occurring in waves, these are large-scale frauds, such as the
looting of savings and loan companies in the 1980s, that are perpetrated by
corporate officers with the tacit approval, if not active support, of high-
ranking public officials whose support has been purchased by campaign
contributions and other rewards.
Despite the grave implications of political criminality among top lead-
ers, public officials tend to downplay the threat of crimes in high office. As
a practical matter, oversight committees and government investigators are
usually reluctant to pursue suspicions about top leaders unless evidence of
guilt is already in hand. Even then, calls for prosecution or removal from
office are likely to be tempered by partisan calculations and other strategic
considerations.
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 529
Table 1
Eras of Corruption and Reform in American History
Vehicle of Form of
Time Period Corruption Corruption Examples Reforms
spirit” that blurs the distinctions between legitimate political action, unprin-
cipled political tactics, and political criminality. This propensity became
apparent soon after the first national political party, the Federalists, was
organized and gained control of the legislative and executive branches in
the election of 1796. The Federalists enacted the Alien and Sedition Acts,
which ignored the Constitution’s guarantees of free speech and made it a
crime to criticize public officials.
Thomas Jefferson, who in 1796 had campaigned against the Federalists
and had been elected vice president, was so troubled by this development
that he left Washington and returned home for the duration of his term. The
remedy subsequently crafted by Jefferson and Madison to address the
Federalist Party was a counteralliance—the Democratic Republican
Party—which carried Jefferson to the presidency in 1800. During the next
several decades, the parties developed rules and procedures to regulate the
majority and protect the minority’s ability to be heard. Although partisan
competition did not restore the full vigor of checks and balances to the
constitutional system, it did prevent any majority, oppressive or otherwise,
from permanently evading electoral accountability.
SCADs
The most recent corruption-related development in American govern-
ment has been the rise of political–economic complexes with the capacity
534 Administration & Society
to affect the political priorities of the political system as a whole. For the
first half of the 20th century, American government’s increasing fragmenta-
tion was seen by public administration scholars and practitioners as a posi-
tive development that allowed popular participation in policy making while
preventing majority tyranny (see, e.g., Dahl & Lindblom, 1946/1976). The
assumption was that oppressive factions could not exert control over the
government as a whole because power—although less well divided in
terms of function (legislation, execution, adjudication) than it had been
before independent commissions and grants in aid—was now splintered
among numerous substantive domains or topical areas. In theory, with each
policy arena dominated by different factions, no faction or combination of
factions would be able to control the government as a whole, and national
priorities would have to emerge incrementally from “partisan mutual
adjustment” among diverse power blocks (Dahl & Lindblom, 1946/1976).
By midcentury, however, public administration scholars and practitio-
ners began realizing that not all policy arenas and stakeholders are equal.
Among stakeholders, corporate business interests were predominant
because they were active and influential in virtually all policy areas, giving
U.S. public policy in general a decidedly pro-corporation cast relative to
labor, consumers, the environment, and other interests agglomerating a
“second face of power” inscrutable to popular inquiry and impervious to
challenge (Bachrach & Baratz, 1962). Congruently, policy making about
national defense and military action had risen in importance and now influ-
enced all other policy areas as well. As President Eisenhower warned in his
farewell address: military leaders and armament manufacturers had become
a “military–industrial complex” capable of influencing the entire direction
of American government.
Since Eisenhower’s day, the military–industrial complex has expanded
while other comparable and integrated complexes have formed. Energy,
finance, and pharmaceutical interests have grown in influence not simply
because of their vast economic assets but also because of their strategic
importance to the entire society. Complexes differ from iron triangles in
their command over resources that affect overall societal conditions, mass
perceptions, and political priorities. Falling energy prices can help save a
presidency, as they did in 2004. Military threats can rally support for the
party in power, as happened after 9-11. Fears of epidemics and biological
weapons can fuel militarism and restrictions on civil liberties, as they did
after the anthrax mailings in 2001.
This ramifying quality heralds a morphologically new form of threat to
American governing institutions. Unlike iron triangles, which typically
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 535
Impediments to SCAD
Detection and Prosecution
Compromised Investigations
A second reason why SCADs in high office are likely to go unpunished
is that the agencies assigned to investigate what may be high crimes often
bear some blame or have some connection to the events in question; hence,
personnel in these agencies are inevitably tempted to conceal evidence that
would implicate or embarrass the agencies or their top managers. In the
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 537
Mass Denial
A third factor impeding SCAD investigations and prosecutions is the
prevalence of powerful norms that discourage speculation about corruption
in high office. In the absence of such norms, top government officials
would come under widespread distrust whenever they received political
windfalls from assassinations, terrorist attacks, election breakdowns, and
similar incidents. But convention prohibits suspicions from being voiced
about top officials unless their guilt can be proven unambiguously by
demonstrable evidence. Without a “smoking gun,” even quite reasonable
suspicions about high crimes are dismissed as conspiracy theories. No
doubt, this characteristic of America’s civic culture is rooted in many tradi-
tions and attitudes—patriotism, respect for authority, the presumption of
538 Administration & Society
SCAD Vulnerabilities
Long-Recognized Vulnerabilities
Although they need to be strengthened and better enforced, policies for
preventing legislative, administrative, and special-interest corruption are
already in place. In recent years, the main threats from these forms of cor-
ruption have come from innovative schemes to circumvent existing con-
trols. A good example of such circumvention is how the savings and loan
540 Administration & Society
industry was looted in the 1980s. Corporate leaders who were engaged in
far-flung conspiracies to commit fraud finagled changes in regulatory poli-
cies and enforcement that allowed their frauds to go undetected until their
banks had been bled dry. This special-interest corruption in the finance and
banking industry was repeated little more than a decade later when Enron
used its tight connections with the Bush–Cheney Administration to evade
controls on energy pricing and asset accounting. The collapse of Enron and
other financial conglomerates led policy makers to strengthen regulations
for monitoring corporate accounting and holding corporate officers respon-
sible for their companies’ actions; regulations that were again weakened
under the George W. Bush administration.
Another example of a resurgent form of corruption is the new spoils
system that has developed around privatization and outsourcing. Much of
the waste and incompetence of military contractors in Iraq has been attrib-
uted to politicization of the contracting process. In many cases, companies
were selected solely on the basis of their ties to the Republican Party.
Similarly, in the system of influence peddling by members of Congress,
including Cunningham, Ney, and Delay, large government contracts and
specific legislation were traded for cash payments, campaign contributions,
jobs for relatives, and access to corporate planes. Although additional
reforms are needed, the procedures for government contracting, account-
ing, and earmarking were tightened after voters gave Democrats a majority
in both the House and Senate in 2006.
These examples suggest that once particular types of vulnerabilities
have been recognized, the system of checks and balances will eventually be
activated if schemes are devised to attack the same weak points in a new
way. It may be difficult to detect fraud in corporate accounting, cronyism
in government contracting, and influence peddling in legislative earmark-
ing, but no one doubts that such crimes are possible and that regulators,
investigators, and legislators need to guard against them.
Unacknowledged Corruption
In contrast, the political system’s vulnerability to the newest and gravest
type of corruption—conspiracies in high office to undermine popular sov-
ereignty, often by manipulating national circumstances or priorities—has
yet to be widely recognized, much less targeted for corrective action. When
suspicious incidents occur that alter the nation’s objectives, disrupt presi-
dential elections, provoke military action, or otherwise affect the national
agenda, Americans tend to accept the self-serving accounts of public officials,
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 541
seldom considering the possibility that such incidents might have been
initiated or facilitated by the officials themselves. This mass gullibility,
which itself invites SCADs, is unlikely to change until SCAD detection and
prosecution are improved.
Policies to facilitate SCAD detection and prosecution can be developed
by identifying vulnerabilities and devising statutory and constitutional
mechanisms to address them. Table 2 lists a variety of SCADs. The list is
not intended to be exhaustive, but rather to illustrate the kinds of high
crimes and tragedies that have affected the course of American history in
the post–World War II era and that are known or reasonably suspected to
have involved conspiracies among top leaders. Even though some doubt
surrounds a few of the examples in the table, the list is useful for highlight-
ing criminogenic circumstances and potential SCAD targets, perpetrators,
and tactics.
Certain circumstances and leadership configurations create crimino-
genic incentives. The political system is especially vulnerable to insider
manipulation during presidential elections and in times of heightened inter-
national tensions (deHaven-Smith, 2006). The officials who may be
tempted to participate in antidemocratic conspiracies include the president,
vice president, presidential candidates, top military commanders, top intel-
ligence officials, state election officials, national party operatives, and
government contractors.
Statutory Reforms
Protecting American democracy from these and similar vulnerabilities
will require both constitutional and statutory reforms. Table 3 lists potential
reforms to counter the various types of SCADs previously delineated.
Perhaps the most important line of statutory reform is to mandate proce-
dures for investigating assassinations, assassination attempts, terrorist
attacks, defense failures, and similar incidents. As it stands, events with
profound implications for the nation and the world are left to be investi-
gated on an ad hoc basis; procedures for controlling crime scenes, invento-
rying evidence, interviewing suspects, interpreting evidence, overseeing
the investigative process, and reporting findings are developed on the spot
in the aftermath of the tragedies, when the nation is in shock and the per-
petrators may be covering their trail. Public officials or their agents lost,
discarded, or destroyed critical evidence in the World Trade Center destruc-
tion (Griffin, 2004; Hufschmid, 2002); the anthrax mailings in October 2001
(Broad, Johnston, Miller, & Zielbauer, 2001); the disputed presidential
Table 2
SCAD Threat Matrix
542
SCADs and Suspected SCADs Target Likely Initiators Timing Other Participants
Treasonous agreements with National public opinion Nonincumbent Shortly before the general Partisan operatives and
foreign powers during elections presidential election intelligence assets
October Surprise of 1968 candidates
October Surprise of 1980
Political dirty tricks during the Party nomination Presidential Early in the nominating process Intelligence assets and, in
nominating process processes candidates and the case of presidential
Watergate and the operations incumbent incumbents, White
of Donald Segretti presidents House political
operatives
Provocations and false flag National perceptions of Incumbent When the president and/or top Top military and
operations threats from world presidents military commanders think intelligence officials
Gulf of Tonkin incident revolutionary Congress and the public are with support of
movements unwilling to support lengthy contractors
and large-scale military actions
Election tampering Election outcomes in the Presidential When presidential elections are National party operatives,
2000 presidential election Electoral College candidates expected to be very close, and top elected officials at
2004 presidential election the outcome hinges on a few the state level, and/or
closely divided states voting machine vendors
Fabricated or misrepresented National perceptions of Presidents, vice When the public has been Intelligence analysts and
intelligence security issues presidents, and/ frightened by a recent attack covert operatives
Iraq-gate or U.S. or threat of attack
McCarthyism senators
Illegal wars Weak foreign powers Presidents When the public or Congress Top military commanders
Laos connected to world opposes military action that is
Cambodia revolutionary capable of being implemented
Iran–Contra movements secretly
Treasonous Nonincumbents can promise Require candidates to report all contacts, Require all candidates for national office
agreements with future actions to foreign direct or indirect, with foreign powers to swear an “Oath of Candidacy” that
foreign powers powers Define extralegal contacts and agreements promises to uphold the Constitution
with foreign powers as treason
Political dirty tricks Inadequate policing of Increase campaign policing and security Define crimes against democracy as
during the campaigns Establish procedures for filing and impeachable offenses
nominating process investigating accusations of criminal
campaign activities
Provocations and false Ability of presidents to Establish procedures for immediate, Prohibit Congress from delegating its
flag operations classify relevant thorough, and independent investigations authority to declare war
information and block of any attacks on U.S. citizens or
inquiries military personnel outside of a war zone
Election tampering Partisan election Adopt state statutes that make election Require a uniform system of elections
administration in many administration nonpartisan nationwide and require that votes be
states and localities Require audits of all elections tabulated manually and publicly
Fabricated or Ability of presidents to Change the secrecy oath to prohibit Define all documents, e-mails, notes, diaries,
misrepresented politicize intelligence intelligence personnel from committing etc., of public officials as the property of
intelligence estimates, and to perjury or concealing crimes the people, to be permanently maintained
selectively declassify Make it clear that federal fraud statutes at public expense and to be open to public
apply to statements that are intended to inspection under conditions established by
mislead Congress and/or the people. Congress
Illegal wars The president has almost Make violations of the War Powers Act an Require presidential pardons to be
unrestricted authority as impeachable offense approved by two thirds of the Senate
commander in chief Change the oath for military officers to
include a provision against participating
in or concealing illegal wars
543
Note: SCAD = state crime against democracy.
544 Administration & Society
elections of 2000 and 2004 (Barstow & Van Natta, 2001; deHaven-Smith,
2005; Miller, 2005); the assassinations of John Kennedy, Robert Kennedy,
and Martin Luther King (Groden, 1993; Pease, 2003; D. Weldon, 2000);
and the attempted assassination of George Wallace (Hunt, 1974, p. 216;
Summers, 2000).
Another set of statutory reforms is needed for elections. Opportunities
for political crimes that affect national priorities often arise around elections
for the presidency. Hence special attention needs to be paid to protecting
candidates against assassination, monitoring contacts between campaigns
and foreign governments, holding election officials personally responsible
for bias in election administration, and overturning elections when, for
whatever reason, the results fail to reflect the voters’ intentions.
Constitutional Reforms
Whereas statutory reforms can mandate detailed reporting requirements,
oversight procedures, and legal penalties, constitutional reforms need to
address SCAD vulnerabilities by better dividing the powers of government
and strengthening the system of checks and balances. Power has accumu-
lated in a number of political–economic complexes that can easily be drawn
into presidential politics. To defang these complexes and restore the
Constitution’s vigor will require fundamental structural reforms. Although
some targeted amendments can be devised to address specific problems,
neither they nor the statutory remedies discussed above are likely to be
effective in the long run unless the branches of government are rebalanced.
Political parties and political–economic complexes have become tools for
oppressive factions to take control of both the executive and legislative
branches, with the result that congressional checks on the president have
been drastically weakened (Byrd, 2004; Dean, 2007).
Consideration should be given to restoring the vice presidency to the
role originally envisioned for it by the framers. The latter expected the vice
president to counterpoise the power of the president; they did not intend for
vice presidential and presidential candidates to run as a single ticket. In
fact, the Constitution of 1789 did not provide for vice presidential candidates
at all; rather, the vice president was simply the runner-up in the presidential
election. If this framework had not been undermined by the formation of
political parties, the vice president would have been the nation’s second most
popular leader and presumably the president’s main rival. Serving as the
president of the Senate, such a rival would have been a powerful check on
the presidency. However, the constitutional provisions necessary for the
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 545
part this is why the role of Congress and the president became so muddled
during the Vietnam War. The failure of the War Powers Act to correct this
situation was demonstrated all too clearly after 2006 by the legislative–
executive conflict over the occupation of Iraq.
How to proceed on this issue depends on what is viewed as the appropriate
role for the United States internationally. The framers wanted the nation to be
capable of defending itself against foreign aggression and protecting its citi-
zens and their property against pirates and piratical governments. But they
expected this capability to be exercised sporadically, not for America to be
permanently militarized and mobilized. This is why the Constitution assumes
that military action will be preceded by a declaration of war, and why monies
to support the wartime military can be appropriated for no more than 2 years
at a time. The expectation implicit in the Constitution is that Congress would
declare war, the president would direct actions of the nation’s military forces,
and then at least every 2 years Congress could decide whether to continue to
fund the endeavor. The president could terminate wars by negotiating treaties,
but the latter had to be approved by two thirds of the Senate.
The question today is whether this founding vision needs to be restored
or if instead constitutional provisions need to be added to allow for military
actions of a limited nature. If the framers’ vision is to be restored, the
Constitution will need to be amended to prohibit the president from engag-
ing in military actions without a congressional declaration of war, and
Congress will have to be explicitly barred from delegating its war-making
authority to the executive. The resolutions authorizing both the Vietnam
War and the Iraq War delegated the decision about the use of military force
to the president, thus eviscerating the separation of powers and launching
the congressional–presidential role confusion that plagued policy making
in these wars from then on.
On the other hand, if limited military engagements short of total war are
to be allowed, then the roles of Congress and the executive in initiating,
directing, evaluating, and terminating such engagements need to be spelled
out. One possibility for doing so would be to exploit the language already
in the Constitution for “Letters of Marque and Reprisal,” which can be
issued by Congress to authorize private individuals to act on the nation’s
behalf in protecting Americans and their property from pirates and brig-
ands. A modern form might be developed for such letters to become, in
effect, contracts between the legislative and executive branches over the
terms of engagement, expected outcomes, and conditions for ending or
continuing the military action. To some extent, this is what Congress and
the president stumbled toward in policy making about Iraq after 2006.
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 547
Note
1. As thus defined, SCADs include not only election tampering, vote fraud, government
graft, and similar crimes when they are initiated by public officials but also more subtle viola-
tions of democratic processes and prerequisites. Any concerted effort by public officials to
mislead or distract the electorate, discourage citizen participation, or in other ways undermine
enlightened citizen choice constitutes an assault on democracy. The intent in defining SCADs
broadly as “actions” rather than narrowly as “illegal actions” is to ensure that efforts by public
officials to subvert popular control of government are covered even if they are not technically
in violation of established laws. Using the word crime in the name for these actions—state
crimes against democracy—may appear inconsistent with this intention, but it actually reflects
legal as well as popular usage when the term crime is applied to acts by public officials, as in
“high crimes and misdemeanors.” The U.S. Constitution refers to “high crimes” but leaves the
term undefined and therefore open to interpretation. Congress decided long ago that high
crimes are not limited to actions prohibited by law.
References
Bacevich, A. J. (2005). The new American militarism: How Americans are seduced by war.
Oxford, UK: Oxford University Press.
Bachrach, P., & Baratz, M. S. (1962). Two faces of power. The American Political Science
Review, 56(4), 947-952.
Parry, R. (1999). Lost history: Contras, cocaine, the press, and project truth. Arlington, VA:
The Media Consortium.
Barstow, D., & Van Natta, D., Jr. (2001, July 15). How Bush took Florida: Mining the over-
seas absentee vote. New York Times, p. A1.
Beard, C. A., & Beard, M. R. (1927). The rise of American civilization. New York: Macmillan.
Bernstein, C., & Woodward, B. (1974). All the president’s men. New York: Simon & Schuster.
Black, W. K. (2005). The best way to rob a bank is to own one. Austin: University of Texas
Press.
Broad, W. J., Johnston, D., Miller, J., & Zielbauer, P. (2001, November 9). Anthrax probe
hampered by FBI blunders. New York Times, p. A1.
Byrd, R. C. (2004). Losing America: Confronting a reckless and arrogant presidency. New
York: Norton.
Calavita, K., Pontell, H., & Tillman, R. (1999). Big money crime: Fraud and politics in the
savings and loan crisis. Berkeley: University of California Press.
Campbell, T. (2006). Deliver the vote: A history of election fraud, an American political tradi-
tion—1742-2004. New York: Basic Books.
Dahl, R., & Lindblom, C. E. (1976). Politics, economics, and welfare. New Haven, CT: Yale
University Press. (Original work published 1946)
Dean, J. W. (2007). Broken government: How Republican rule destroyed the legislative,
executive, and judicial branches. New York: Viking.
deHaven-Smith, L. (2005). The battle for Florida. Gainesville: University Press of Florida.
deHaven-Smith, L. (2006). When political crimes are inside jobs: Detecting state crimes
against democracy. Administrative Theory & Praxis, 28(3), 330-355.
deHaven-Smith, Witt / Preventing State Crimes Against Democracy 549
deHaven-Smith, L., & Van Horn, C. E. (1984). Subgovernment conflict in public policy.
Policy Studies Journal, 12(4), 627-642.
Diamond, M. (1987). The federalist. In L. Strauss & J. Cropsey (Eds.), History of political
philosophy (pp. 659-679). Chicago: University of Chicago Press.
Ellsberg, D. (2002). Secrets: A memoir of Vietnam and the Pentagon Papers. London:
Penguin.
Farmer, D. J. (2005). To kill the king: Post-traditional governance and bureaucracy. Armonk,
NY: M. E. Sharpe.
Goldsmith, J. (2007). The terror presidency: Law and judgment inside the Bush administra-
tion. New York: Norton.
Gray, L. P. (2008). In Nixon’s web: A year in the crosshairs of Watergate. New York: Henry
Holt.
Greenwald, G. (2007). A tragic legacy: How a good vs. evil mentality destroyed the Bush
presidency. New York: Crown.
Griffin, D. R. (2004). The new Pearl Harbor: Disturbing questions about the Bush adminis-
tration and 9/11. Northampton, MA: Olive Branch.
Griffin, D. R. (2005). The 9/11 Commission report: Omissions and distortions. Northampton,
MA: Olive Branch.
Griffin, R. P. (1950). Constitutional law: Corporations: Artificial “persons” and the Fourteenth
Amendment. Michigan Law Review, 48(7), 983-993.
Groden, R. J. (1993). The killing of a president: The complete photographic record of the JFK
assassination, the conspiracy, and the cover-up. New York: Penguin.
Hall, M. (2005, May 10). Ridge reveals clashes on alerts. USA Today, A3.
Horton, S. (2007, April 13). Political profiling: The smoking gun. Harpers. Available at http://
www.harpers.org/archive/2007/04/horton-political-profiling.
Hufschmid, E. (2002). Painful questions: An analysis of the September 11th attack. Goleta,
CA: Endpoint Software.
Hunt, E. H. (1974). Undercover: Memoirs of an American secret agent. New York: G. P.
Putnam.
Isikoff, M., & Corn, D. (2006). Hubris: The inside story of spin, scandal, and the selling of
the Iraq War. New York: Crown.
Kornbluh, P., & Byrne, M. (Eds.). (1993). The Iran-Contra scandal: The classified history.
New York: The New Press.
Kutler, S. I. (1990). The wars of Watergate: The last crisis of Richard Nixon. New York:
Norton.
Liddy, G. G. (1980). Will: The autobiography of G. Gordon Liddy. New York: St. Martin’s.
Lowi, T. (1969). The end of liberalism. New York: Norton.
Martin, A. (2001). The conspirators: Secrets of an Iran-Contra insider. Pray, MT: National
Liberty Press.
McCool, D. (1998). The subsystem family of concepts: A critique and a proposal. Political
Research Quarterly, 51(2), 551-570.
McCord, J. W., Jr. (1974). A piece of tape: The Watergate story, fact and fiction. Rockville,
MD: Washington Media Services.
Miller, A. (Ed.). (2005). What went wrong in Ohio: The Conyers’ report on the 2004 presiden-
tial election. Chicago: Academy Publishers.
Parry, R. (1993). Trick or treason: The October surprise mystery. New York: Sheridan Square
Press.
550 Administration & Society
Pease, L. (2003). The RFK plot: Parts I and II. In J. DiEugeio & L. Pease (Eds.), The assas-
sinations: Probe magazine on JFK, MLK, RFK, and Malcolm X (pp. 536-570). Los
Angeles: Feral House.
Rich, F. (2006). The greatest story ever sold. New York: Penguin.
Rich, F. (2007, July 1). When the Vice President does it, that means it’s not illegal. New York
Times, OP8.
Savage, C. (2007). Takeover: The return of the imperial presidency and the subversion of
American democracy. New York: Little, Brown.
Sick, G. (1991). October surprise: America’s hostages in Iran and the election of Ronald
Reagan. New York: Random House.
Summers, A. (2000). The arrogance of power: The secret world of Richard Nixon. New York:
Viking.
Suskind, R. (2006). The one percent doctrine: Deep inside America’s pursuit of its enemies
since 9/11. New York: Simon & Schuster.
Talbot, D. (2007). Brothers: The hidden history of the Kennedy years. New York: Free Press.
Thernstrom, A. M. (1989). Whose votes count? Affirmative action and minority voting rights.
Cambridge, MA: Harvard University Press.
Walsh, L. E. (1997). Firewall: The Iran-Contra conspiracy and cover-up. New York: Norton.
Wamsley, G. (1990). The agency perspective: Public Administrators as agential leaders. In
G. Wamsley (Ed.), Refounding public administration (pp. 114-162). Thousand Oaks, CA:
Sage.
Weldon, C. (2005). Countdown to terror. Washington, DC: Regnery.
Weldon, D. (2000). The Kennedy limousine: Dallas 1963. In J. H. Fetzer (Ed.), Murder in
Dealey Plaza: What we know now that we didn’t know then about the death of JFK
(pp. 129-158). Chicago: Catfeet.
Wise, D. (1976). The American police state: The government against the people. New York:
Vintage.
Wright, A., & Dixon, S. (2008). Dissent: Voices of conscience. Kihei, HI: Koa.
Lance deHaven-Smith is a Professor in the Reubin O’D. Askew School of Public Administration
and Policy at Florida State University. He was Director of the School from 1995 to 1999 and
was Associate Director of the Florida Institute of Government from 1993 to 2001. He is the
author of articles and books on a wide range of topics, including public policy, public admin-
istration, and political theory.