!! History Commons Alert, Exciting News

Context of 'January 27, 2003: 9/11 Commission Starts Off with Little Funding'

This is a scalable context timeline. It contains events related to the event January 27, 2003: 9/11 Commission Starts Off with Little Funding. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 2 of 3 (283 events)
previous | 1, 2, 3 | next


George Mitchell.
George Mitchell. [Source: Public domain]George Mitchell resigns as vice chairman of the recently-created 9/11 investigative commission. Lee Hamilton, an Indiana congressman for more than 30 years and chairman of the committee which investigated the Iran-Contra affair, is named as his replacement. [CNN, 12/11/2002] Mitchell cites time constraints as his reason for stepping down, but he also does not want to sever ties with his lawyer-lobbying firm, Piper Rudnick, or reveal his list of clients. Recent clients include the governments of Yemen and the United Arab Emirates. [Newsweek, 12/15/2002]

Entity Tags: Lee Hamilton, United Arab Emirates, Yemen, 9/11 Commission, George Mitchell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Henry Kissinger resigns as head of the new 9/11 Commission. [Associated Press, 12/13/2002; Associated Press, 12/13/2002] Two days earlier, the Bush administration argued that Kissinger was not required to disclose his private business clients. [New York Times, 12/12/2002] However, the Congressional Research Service insists that he does, and Kissinger resigns rather than reveal his clients. [MSNBC, 12/13/2002; Seattle Times, 12/14/2002]
Spilled Coffee - Kissinger had also been pressured to reveal his client list at a meeting with a group of victims’ relatives, in particular the “Jersey Girls.” One of the “Girls,” Lorie Van Auken, had even asked Kissinger whether he had “any clients named bin Laden?” Kissinger, who was pouring coffee at that moment, refused to answer, but spilled the coffee and fell off the sofa on which he was sitting. [Shenon, 2008, pp. 12-3]
Business Ties - It is reported that Kissinger is (or has been) a consultant for Unocal, the oil corporation, and was involved in plans to build pipelines through Afghanistan (see September-October 1995). [Washington Post, 10/5/1998; Salon, 12/3/2002] Kissinger claims he did no current work for any oil companies or Mideast clients, but several corporations with heavy investments in Saudi Arabia, such as ABB Group, a Swiss-Swedish engineering firm, and Boeing Corp., pay him consulting fees of at least $250,000 a year. A Boeing spokesman said its “long-standing” relationship with Kissinger involved advice on deals in East Asia, not Saudi Arabia. Boeing sold $7.2 billion worth of aircraft to Saudi Arabia in 1995. [Newsweek, 12/15/2002]
Not Vetted - In a surprising break from usual procedures regarding high-profile presidential appointments, White House lawyers never vetted Kissinger for conflicts of interest. [Newsweek, 12/15/2002] The Washington Post says that after the resignations of Kissinger and Mitchell, the commission “has lost time” and “is in disarray, which is no small trick given that it has yet to meet.” [Washington Post, 12/14/2002]

Entity Tags: Bush administration (43), Congressional Research Service, Lorie Van Auken, Henry A. Kissinger, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Following Henry Kissinger’s resignation as 9/11 Commission chairman the day before (see November 27, 2002), presidential aide Karl Rove calls Thomas Kean, a former Republican governor of New Jersey, to ask if he is willing to be considered as chairman of the Commission. Kean, who does not know Rove well and has been out of politics for some time, is surprised that he is being considered for the job. He is even more surprised that it is Rove making the call, especially given Rove’s reputation as the brain behind the rise of President George W. Bush. However, he says that he may do the job, if chosen. Kean will later speak to the president’s chief of staff Andy Card about the job, and formally accept it in a call from President Bush. Rove will later say that he thinks it was he who first suggested Kean as chairman, but will add that he regrets this, due to later battles with the White House. Card will also say he thinks he was the first to suggest Kean. [Shenon, 2008, pp. 16-7, 25]

Entity Tags: Thomas Kean, Karl C. Rove, 9/11 Commission

Timeline Tags: Complete 911 Timeline

Richard Ben-Veniste.Richard Ben-Veniste. [Source: C-SPAN]The 10 members of the new 9/11 Commission are appointed by this date, and are: Republicans Thomas Kean (chairman), Slade Gorton, James Thompson, Fred Fielding, and John Lehman, and Democrats Lee Hamilton (vice chairman), Max Cleland, Tim Roemer, Richard Ben-Veniste, and Jamie Gorelick. [Chicago Tribune, 12/12/2002; Associated Press, 12/16/2002; New York Times, 12/17/2002] Senators Richard Shelby (R-AL) and John McCain (R-AZ) had a say in the choice of one of the Republican positions. They and many 9/11 victims’ relatives wanted former Senator Warren Rudman (R-NH), who co-wrote an acclaimed report about terrorism before 9/11 (see January 31, 2001). But, possibly under pressure from the White House, Senate Republican leader Trent Lott (R-MS) blocked Rudman’s appointment and chose John Lehman instead. [St. Petersburg Times, 12/12/2002; Associated Press, 12/13/2002; Reuters, 12/16/2002; Shenon, 2008, pp. 55-56] It will slowly emerge over the next several months that at least six of the 10 commissioners have ties to the airline industry. [CBS News, 3/5/2003] Henry Kissinger (see December 13, 2002) and his replacement Thomas Kean (see December 16, 2002) both caused controversy when they were named. In addition, the other nine members of the Commission are later shown to all have potential conflicts of interest. Republican commissioners:
bullet Fred Fielding also works for a law firm lobbying for Spirit Airlines and United Airlines. [Associated Press, 2/14/2003; CBS News, 3/5/2003]
bullet Slade Gorton has close ties to Boeing, which built all the planes destroyed on 9/11, and his law firm represents several major airlines, including Delta Air Lines. [Associated Press, 12/12/2002; CBS News, 3/5/2003]
bullet John Lehman, former secretary of the Navy, has large investments in Ball Corp., which has many US military contracts. [Associated Press, 3/27/2003]
bullet James Thompson, former Illinois governor, is the head of a law firm that lobbies for American Airlines and has previously represented United Airlines. [Associated Press, 1/31/2003; CBS News, 3/5/2003] Democratic commissioners:
bullet Richard Ben-Veniste represents Boeing and United Airlines. [CBS News, 3/5/2003] He also has other curious connections, according to a 2001 book on CIA ties to drug running written by Daniel Hopsicker, which has an entire chapter called “Who is Richard Ben-Veniste?” Lawyer Ben-Veniste, Hopsicker says, “has made a career of defending political crooks, specializing in cases that involve drugs and politics.” He has been referred to in print as a “Mob lawyer,” and was a long-time lawyer for Barry Seal, one of the most famous drug dealers in US history who is also alleged to have had CIA connections. [Hopsicker, 2001, pp. 325-30]
bullet Max Cleland, former US senator, has received $300,000 from the airline industry. [CBS News, 3/5/2003]
bullet James Gorelick is a director of United Technologies, one of the Pentagon’s biggest defense contractors and a supplier of engines to airline manufacturers. [Associated Press, 3/27/2003]
bullet Lee Hamilton sits on many advisory boards, including those to the CIA, the president’s Homeland Security Advisory Council, and the US Army. [Associated Press, 3/27/2003]
bullet Tim Roemer represents Boeing and Lockheed Martin. [CBS News, 3/5/2003]

Entity Tags: American Airlines, Fred F. Fielding, Jamie Gorelick, 9/11 Commission, James Thompson, John McCain, John Lehman, Trent Lott, Richard Shelby, Lee Hamilton, Richard Ben-Veniste, United Airlines, Warren Rudman, Slade Gorton, Tim Roemer, Max Cleland

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After experiencing some problems at its inception due to the resignation of its chair and vice-chair (see December 11, 2002 and December 13, 2002), the 9/11 Commission spends much of the next four months hiring staff, getting security clearances (see March 27, 2003), finding office space, and asking for a budget increase (see March 26, 2003). One of the first employees hired is executive director Philip Zelikow, but disputes within the Commission over who will be general council last until March, when Dan Marcus is hired. The Commission is unable to even have a telephone until February, when it finds an official security facility for its offices, and until then the cell phone of staffer Stephanie Kaplan is used as the commission’s initial operations center. However, most of the Commission’s staff cannot then enter their offices, because they do not have the relevant security clearances yet, even though there are no secret documents actually in the offices at this point. Author Philip Shenon will comment: “The commission’s early logistical problems were more than a little humiliating to men like [commission Chairman Tom] Kean and [Vice Chairman Lee] Hamilton, who had commanded vast staffs and virtually unlimited office space during their years in power in government. Now they were at the mercy of others if they wanted second-hand office furniture for the commission’s cramped offices in Washington.” [Kean and Hamilton, 2006, pp. 34-45; Shenon, 2008, pp. 92]

Entity Tags: Daniel Marcus, 9/11 Commission, Stephanie Kaplan, Philip Zelikow, Philip Shenon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA’s secret room in the AT&T switching center.The NSA’s secret room in the AT&T switching center. [Source: PBS]Veteran AT&T technician Mark Klein (see July 7, 2009) takes an informal tour of his company’s facility on San Francisco’s Folsom Street (see Late 2002), along with three other technicians from his Geary Street offices. The tour, Klein will later say, is to introduce the four technicians to the Folsom Street staff, “because they were obviously eventually planning to bring us over there.” Klein learns that the rumors of a “secret room” in the facility are true (see Fall 2002). The secret room is on the facility’s sixth floor and is being built to house some sort of equipment, but Klein is unsure exactly what that equipment might be. Klein and the others see the outer door of the secret room, and a workman working on the door “suddenly [began talking to Klein and his colleages in a] very low voice like he didn’t want to be overheard. He felt like this was something secret, you know, and he didn’t know much about it, and he was saying: ‘None of us can go in there. It’s all secret.’ This was not only an affront to the technicians; it was a violation of union rules, because they were obviously planning to install telecommunications equipment, which is supposed to be the jurisdiction of the union technicians. We had a contract. So the technicians were not only angry about this secret thing that they’re not let in on, but also the fact that there’s work there that they’re excluded from. And they were told nothing about it. So that was it.” Klein is further surprised to learn that only a single non-union technician (whom he only identifies as “Ski,” an AT&T “field support specialist” who has been granted a security clearance by the National Security Agency (NSA)), is allowed to work in the secure room. No union technicians are allowed in, even though the installation work being done is specifically contracted to the union workers. “The regular technician work force was not allowed in the room,” Klein will later state. Klein deduces that this secret room is the long-rumored NSA installation he has been hearing about. Moreover, he notes with some alarm that the room is next door to the 4ESS phone switch, “the traditional workhorse used for AT&T long-distance calls.” Klein will write, “Now my mental alarm bells were ringing, but for the moment there was nothing to do but take some mental notes, particularly since it was not clear exactly what they [the NSA and AT&T] were doing.” [Wired News, 4/7/2006; Democracy Now!, 5/12/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 26-28] Klein will explain that he chooses not to say anything about his concerns because he is “scared for several reasons, one being, well, this is obviously secret. This is obviously some federal government secret operation that they don’t want nosy people nosing around in, and if I started asking questions I could get into trouble. Furthermore, our jobs were in jeopardy anyway, because [we] were always getting wind that they were planning to close our previous office at Geary Street, and I didn’t need to give them an excuse to fire me. So I thought after thinking about it that the best thing to do is not to say anything and just watch it.” [PBS Frontline, 5/15/2007] He later learns that similar cabinets are being installed in AT&T centers in other cities, including Seattle, San Jose, Los Angeles, and San Diego (see Late 2003). [Wired News, 4/7/2006] The Folsom Street facility is apparently connected to a more central surveillance facility operated out of one of AT&T’s main command centers in Missouri (see Late 2002-Early 2003).

Entity Tags: Bush administration (43), AT&T, Electronic Frontier Foundation, Mark Klein, Terrorist Surveillance Program, “Ski” (AT&T field support specialist), National Security Agency

Timeline Tags: Civil Liberties

The 9/11 Commission, officially titled the National Commission on Terrorist Attacks Upon the United States, holds its first meeting in Washington. The commission has $3 million and only a year and a half to explore the causes of the attacks. By comparison, a 1996 federal commission to study legalized gambling was given two years and $5 million. [Associated Press, 1/27/2003] Two months later the Bush administration grudgingly increases the funding to $12 million total (see March 26, 2003). [Associated Press, 1/27/2003] A few days later, Vice Chairman Lee Hamilton says, “The focus of the commission will be on the future. We want to make recommendations that will make the American people more secure.… We’re not interested in trying to assess blame, we do not consider that part of the commission’s responsibility.” [United Press International, 2/6/2003]

Entity Tags: Philip Zelikow, 9/11 Commission, Bush administration (43), Lee Hamilton

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Following the 9/11 Commission’s first formal meeting, Democratic commissioner Max Cleland is unhappy with the state of the inquiry. Specifically, he dislikes the facts that the Commission will not issue subpoenas for the documents it wants (see January 27, 2003) and will have a single non-partisan staff headed by executive director Philip Zelikow, who is close to National Security Adviser Condoleezza Rice (see Shortly Before January 27, 2003). In addition, he is disappointed by the resignations of Henry Kissinger (see December 13, 2002) and George Mitchell (see December 11, 2002). Although Kissinger is a Republican, Cleland had believed that “with Kissinger… we were going to get somewhere,” because: “This is Henry Kissinger. He’s the big dog.” Kissinger’s replacement Tom Kean has no experience in Washington and Cleland thinks he is “not going to be the world’s greatest tiger in asking a difficult question.” Cleland respects Mitchell’s replacement Lee Hamilton, but knows that he has a reputation for a non-confrontational style of politics, the reason he was initially passed over for the position of vice chairman of the Commission (see Before November 27, 2002). [Shenon, 2008, pp. 71-72]

Entity Tags: 9/11 Commission, Max Cleland

Timeline Tags: Complete 911 Timeline

Steven Aftergood of the Federation of American Scientists says that he is not sure that Congress’s public termination of the Total Information Awareness (TIA) project (see January 23, 2003) was as real and outrage-driven as it seemed at the time. “The whole congressional action looks like a shell game,” Aftergood says. “There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” While Congress terminated TIA with visible indignation, it also quietly funded the “National Foreign Intelligence Program,” and never identified which intelligence agency would do the work—which was also kept from the public eye. Congress did say that none of the research would be used against US citizens. No one in Congress will discuss how many of Poindexter’s programs survived, but knowledgeable sources will confirm that some 18 data-mining programs known as Evidence Extraction and Link Discovery in Poindexter’s research were preserved after TIA’s termination. These programs may well include the sprawling data mining program known as Novel Intelligence from Massive Data (NIMD) (see After September 11, 2001), though this cannot be confirmed. Former TIA chief John Poindexter’s vision of the technology behind NIMD envisioned software that can quickly analyze “multiple petabytes” of data. A single petabyte would fill the Library of Congress space for 18 million books more than 50 times, or could hold 40 pages of text for each of the more than 6.2 billion humans on Earth. Poindexter and his colleagues envisioned the program as handling a petabyte or more of data a month. [Associated Press, 2/23/2004] Concerns about the privacy rights of US citizens being damaged by the program are rife. “If they were to stick to strictly military-related research and development, there is less of an issue, but these technologies have much broader social implications,” says Barbara Simons, a computer scientist who is past president of the Association of Computing Machinery, an organization that has expressed concerns about TIA. [New York Times, 5/21/2003] At least one Senator is uncomfortable with the apparent resurgence of TIA. Jay Rockefeller (D-WV) will write Vice President Dick Cheney in June 2003 after receiving a briefing on the various secret surveillance programs (see July 17, 2003). Rockefeller will write, “As I reflected on the meeting today, John Poindexter’s TIA project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance.” [National Journal, 1/20/2006]

Entity Tags: Steven Aftergood, Richard (“Dick”) Cheney, Total Information Awareness, Novel Intelligence from Massive Data, John D. Rockefeller, John Poindexter, Barbara Simons, Federation of American Scientists (FAS), Foreign Intelligence Surveillance Act, Association of Computing Machinery

Timeline Tags: Civil Liberties

Charles Lewis.
Charles Lewis. [Source: Center for Public Integrity]Charles Lewis of the Center for Public Integrity reveals the leaked text of a new anti-terrorism bill. Called the Domestic Security Enhancement Act of 2003, it becomes popularly known as the Patriot Act II. The text of the bill is dated January 9, 2003. [Congress, 1/9/2003; NOW with Bill Moyers, 2/7/2003; Center for Public Integrity, 2/7/2003] Before it was leaked, the bill was being prepared in complete secrecy from the public and Congress. Only House Speaker Dennis Hastert and Vice President Cheney were sent copies on January 10. [San Francisco Chronicle, 2/11/2003] A week earlier, Attorney General Ashcroft said the Justice Department was not working on any bill of this type, and when the text is released, they say it is just a rough draft. But the text “has all the appearance of a document that has been worked over and over.” [Village Voice, 2/28/2003; ABC News, 3/12/2003] Some, including a number of congresspeople, speculate that the government is waiting until a new terrorist act or war fever before formally introducing this bill. [NOW with Bill Moyers, 2/7/2003; Associated Press, 2/10/2003; United Press International, 3/10/2003; Village Voice, 3/26/2003] Here are some of its provisions:
bullet 1) The attorney general is given the power to deport any foreign national, even people who are legal permanent residents. No crime need be asserted, no proof offered, and the deportation can occur in complete secrecy. [St. Petersburg Times, 2/16/2003]
bullet 2) It would authorize secret arrests in terrorism investigations, which would overturn a court order requiring the release of names of their detainees. [St. Petersburg Times, 2/16/2003] Not even an attorney or family need be informed until the person is formally charged, if that ever happens. [ABC News, 3/12/2003]
bullet 3) The citizenship of any US citizen can be revoked if they are members of or have supported any group the attorney general designates as terrorist. [St. Petersburg Times, 2/16/2003] A person who gives money to a charity that only later turns out to have some terrorist connection could then lose his or her citizenship. [CNN, 3/6/2003]
bullet 4) “Whole sections… are devoted to removing judicial oversight.” Federal agents investigating terrorism could have access to credit reports, without judicial permission. [St. Petersburg Times, 2/16/2003]
bullet 5) Federal investigators can conduct wiretaps without a court order for 15 days whenever Congress authorizes force or in response to an attack on the United States. [United Press International, 3/10/2003]
bullet 6) It creates a DNA database of anyone the Justice Department determines to be a “suspect,” without court order. [Mercury News (San Jose), 2/20/2003]
bullet 7) It would be a crime for someone subpoenaed in connection with an investigation being carried out under the Patriot Act to alert Congress to any possible abuses committed by federal agents. [ABC News, 3/12/2003]
bullet 8) Businesses and their personnel who provide information to anti-terrorism investigators are granted immunity even if the information is fraudulent. [ABC News, 3/12/2003]
bullet 9) The government would be allowed to carry out electronic searches of virtually all information available about an individual without having to show probable cause and without informing the individual that the investigation was being carried out. Critics say this provision “would fundamentally change American society” because everyone would be under suspicion at all times. [ABC News, 3/12/2003]
bullet 10) Federal agents would be immune from prosecution when they engage in illegal surveillance acts. [United Press International, 3/10/2003]
bullet 11) Restrictions are eased on the use of secret evidence in the prosecution of terror cases. [United Press International, 3/10/2003]
bullet 12) Existing judicial consent decrees preventing local police departments from spying on civil rights groups and other organizations are canceled. [Salon, 3/24/2003]
bullet Initially the story generates little press coverage, but there is a slow stream of stories over the next weeks, all expressing criticism. Of all the major newspapers, only the Washington Post puts the story on the front page, and no television network has the story in prime time. [Associated Press, 2/8/2003; CBS News, 2/8/2003; Los Angeles Times, 2/8/2003; New York Times, 2/8/2003; Washington Post, 2/8/2003; Associated Press, 2/10/2003; San Francisco Chronicle, 2/11/2003; Los Angeles Times, 2/13/2003; St. Petersburg Times, 2/16/2003; Denver Post, 2/20/2003; Pittsburgh Post-Gazette, 2/20/2003; Mercury News (San Jose), 2/20/2003; Baltimore Sun, 2/21/2003; Star-Tribune (Minneapolis), 2/21/2003; Village Voice, 2/28/2003; Houston Chronicle, 3/1/2003; CNN, 3/6/2003; United Press International, 3/10/2003; ABC News, 3/12/2003; Herald Tribune (Sarasota), 3/19/2003; Salon, 3/24/2003; Village Voice, 3/26/2003; Tampa Tribune, 4/6/2003] Representative Jerrold Nadler (D-NY) says the bill amounts to “little more than the institution of a police state.” [San Francisco Chronicle, 2/11/2003]

Entity Tags: Center for Public Integrity, Dennis Hastert, Domestic Security Enhancement Act of 2003, Jerrold Nadler, John Ashcroft, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Lawyers Wilson Brown and Jeff Almeida file a request with the Supreme Court, asking it to reconsider its landmark 1953 case, US v Reynolds (see March 9, 1953). The lawyers are representing several family members who lost fathers (and, in one case, a husband) in the airplane crash that led to the original case (see October 6, 1948). The lawyers note that the government’s original claim that the accident reports could not be released due to the inclusion of “military secrets” (see July 26, 1950) is false, as the accident reports have been declassified and examined for such secrets (see February 2000). “Indeed,” the lawyers write, “they are no more than accounts of a flight that, due to the Air Force’s negligence, went tragically awry. In telling the Court otherwise, the Air Force lied. In reliance upon that lie, the Court deprived the widows [the three original plaintiffs] of their judgments. It is for this Court, through issuance of a writ of error coram nobis and in exercise of its inherent power to remedy fraud, to put things right… United States v. Reynolds stands as a classic ‘fraud on the court,’ one that is most remarkable because it succeeded in tainting a decision of our nation’s highest tribunal.” [Siegel, 2008, pp. 249-251] On July 26, 2002, one of the plaintiffs, Judy Palya Loether, wrote in an e-mail to Brown: ”US v Reynolds has come to be a landmark case that is used by the government when it claims that documents cannot be turned over to the courts because of national security. Yet this very case is now proven, in my mind, to be based on a lie that did injury to 3 widows and 5 little children (see February 2000)… It allowed the government an area of no checks and balances (see December 11, 1951). How many times has the government used this decision, not to protect national security, but for its own purposes?” [Siegel, 2008, pp. 237-238]

Entity Tags: Judy Palya Loether, Jeff Almeida, US Supreme Court, US Department of the Air Force, Wilson Brown

Timeline Tags: Civil Liberties

Wilson Brown, who has filed a petition with the Supreme Court asking that it reconsider its landmark 1953 US v Reynolds case (see March 9, 1953), receives an e-mail from Alison Massagli of the White House’s Foreign Intelligence Advisory Board. Massagli, who learned of the petition from an article in the Philadelphia Inquirer, wants a copy of Brown’s petition. Brown notices that Massagli sent a copy of the e-mail to Catherine Lotrionete of the National Security Council. Brown is pleased that the case has garnered some attention. He e-mails the plaintiffs he is representing, saying, “I thought you would find it interesting that at least one arm of the Executive Branch is interested in our case.” [Siegel, 2008, pp. 257]

Entity Tags: National Security Council, Alison Massagli, Issuetsdeah, US Supreme Court, Wilson Brown, Catherine Lotrionete

Timeline Tags: Civil Liberties

Time magazine reports that the 9/11 Commission has requested an additional $11 million to add to the $3 million for the commission, and the Bush administration has turned down the request. The request will not be added to a supplemental spending bill. A Republican member of the commission says the decision will make it “look like they have something to hide.” Another commissioner notes that the recent commission on the Columbia shuttle crash will have a $50 million budget. Stephen Push, a leader of the 9/11 victims’ families, says the decision “suggests to me that they see this as a convenient way for allowing the commission to fail. they’ve never wanted the commission and I feel the White House has always been looking for a way to kill it without having their finger on the murder weapon.” The administration has suggested it may grant the money later, but any delay will further slow down the commission’s work. Already, commission members are complaining that scant progress has been made in the four months since the commission started, and they are operating under a deadline. [Time, 3/26/2003] Three days later, it is reported that the Bush administration has agreed to extra funding, but only $9 million, not $11 million. The commission agrees to the reduced amount. [Washington Post, 3/29/2003] The New York Times criticizes such penny-pinching, saying, “Reasonable people might wonder if the White House, having failed in its initial attempt to have Henry Kissinger steer the investigation, may be resorting to budgetary starvation as a tactic to hobble any politically fearless inquiry.” [New York Times, 3/31/2003]

Entity Tags: 9/11 Commission, Stephen Push, Bush administration (43)

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

It is reported that “most members” of the 9/11 Commission still have not received security clearances. [Washington Post, 3/27/2003] For instance, Slade Gorton, picked in December 2002, is a former senator with a long background in intelligence issues. Fellow commissioner Lee Hamilton says, “It’s kind of astounding that someone like Senator Gorton can’t get immediate clearance. It’s a matter we are concerned about.” The commission is said to be at a “standstill” because of the security clearance issue, and cannot even read the classified findings of the previous 9/11 Congressional Inquiry. [Seattle Times, 3/12/2003]

Entity Tags: 9/11 Commission, Slade Gorton, Lee Hamilton, 9/11 Congressional Inquiry

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Solicitor General Theodore Olson submits a response to the request that the Supreme Court reopen the 1953 state secrets case US v Reynolds (see February 26, 2003). Olson argues that once a decision has been made, it should be respected—“the law favors finality,” he writes. More surprisingly to the plaintiffs and their lawyers, Olson argues that there was no fraud perpetuated in the original case, a position hard to defend in the face of the declassified accident reports that were the heart of that case (see February 2000 and February 26, 2003). The accident reports never contained military secrets or secret information of any kind, a claim that the Court’s 1953 decision hinged on, but Olson argues that because of the wording of the claims—releasing the reports to the original plaintiffs “might lead to disclosure” of classified information—then the old claims of protecting state secrets are still technically valid (see March 9, 1953). Olson echoes the author of the original Supreme Court opinion, Fred Vinson, by reminding the Court that “[t]he claim of privilege in this case was made in 1950, at a time in the nation’s history—during the twilight of World War II and the dawn of the Cold War—when the country, and especially the military, was uniquely sensitive to need for ‘vigorous preparation for national defense.‘… The allegations of fraud made by the petition in this case… must be viewed in that light.” The lawyer for the plaintiffs in the petition, Wilson Brown, is both angered and impressed by what he calls Olson’s “remarkable obfuscation.” By hiding behind the vague wording of the original claims of state secrets, Olson is implying that this case must turn on factual issues—and therefore should be heard in a lower court, not the Supreme Court. Brown, in his response co-written by colleague Jeff Almeida, calls Olson’s arguments “disingenuous” and insists that the plaintiffs’ original case “had been vitiated through fraud.” [Siegel, 2008, pp. 261-264]

Entity Tags: Fred Vinson, Bush administration (43), Jeff Almeida, US Supreme Court, Wilson Brown, Theodore (“Ted”) Olson

Timeline Tags: Civil Liberties

Constitutional lawyers and experts believe that the Supreme Court will not accept the petition to reopen the landmark US v Reynolds case (see February 26, 2003 and May 30, 2003). Kate Martin of the Center for National Security Studies says that the petition is essentially frivolous, and says of the claim that Reynolds was decided on the basis of a fraudulent government presentation: “That the facts of the original case are not true is irrelevant to the state secrets privilege (see March 9, 1953). The idea that it undercuts the privilege is ridiculous. Often in cases, after they’re decided, the facts are proven not to be true. That’s the nature of the legal system. Sometimes people lie. Sometimes there’s new information.” Law professor Jonathan Turley is more sympathetic to the petition, but agrees that the Supreme Court will probably not hear it: “For the Supreme Court to address the fact clearly that it had been lied to would open difficult issues.… The Court used the facts of Reynolds to say the government could be trusted.… Reynolds was based on trust, on willful blinders. There’s much danger in going back now, in recognizing that the government routinely lies. They’re not going to face that. They won’t reopen this. I think Reynolds is like discovering an unfaithful wife after fifty years of marriage. You’re hurt by the betrayal, but you can’t turn back half a century. You preserve the marriage for the children’s sake” (see December 1980, September 1982, November 1984, January 1990, June 13, 1991, and September 16, 1992). [Siegel, 2008, pp. 266-267]

Entity Tags: US Supreme Court, Jonathan Turley, Center for National Security Studies, Kate Martin

Timeline Tags: Civil Liberties

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), working near the National Security Agency (NSA)‘s “secret room” in the firm’s Folsom Street, San Francisco facility (see October 2003), receives two documents pertaining to the equipment in that secret room. (In a 2007 interview with PBS, Klein will cite a third document as well, that he found lying on top of a router.) The two documents are entitled “SIMS Splitter Cut-In and Test Procedure Issue 2, 01/12/03” and “SIMS Splitter Cut-In and Test Procedure OSWF Training Issue 2 January 24, 2002.” “OSWF” stands for “On-Site Work Force.” As for “SIMS,” all Klein knows is that it is an acronym associated with the secret room. Reading over the documents, Klein realizes that they indicate the secret room contains a “splitter cabinet,” installed in February 2003 (see February 2003), containing “optical splitters” that “cut in” to signals sent through 16 “Peering Links” between AT&T and 16 other major carriers and Internet exchange points. He later recalls: “I brought them back to my desk, and when I started looking at it, I looked at it more, and I looked at it more, and finally it dawned on me sort of all at once, and I almost fell out of my chair, because this showed, first of all, what they had done, that they had taken working circuits, which had nothing to do with a splitter cabinet, and they had taken in particular what are called peering links which connect AT&T’s network with the other networks. It’s how you get the Internet, right? One network connects with another. So they took 16 high-speed peering links which go to places like Qwest [Communications] and Palo Alto Internet Exchange and places like that.… These circuits were working at one point, and the documents indicated in February 2003 they had cut into these circuits so that they could insert the splitter so that they can get the data flow from these circuits to go to the secret room. So this data flow meant that they were getting not only AT&T customers’ data flow; they were getting everybody else’s data flow, whoever else might happen to be communicating into the AT&T network from other networks. So it was turning out to be like a large chunk of the network, of the Internet.” The documents, he later says, name “the circuit IDs… the companies they belong to… [and] the cut date. And they were all in February [2003], when they were cut into the splitter” (see February 2003). The 16 carriers include ConXion, Verio, XO, Genuity, Qwest, PAIX (Palo Alto Internet Exchange), Allegiance, Abovenet, Global Crossing, C&W, UUNET, Level 3, Sprint, Telia, PSINet, and MAE West (the Metropolitan Area Exchange for AT&T’s Western region). In plain English, the splitter in the NSA room is duplicating the electronic data being sent through AT&T’s equipment, and sending the duplicated signals somewhere else, presumably to NSA computers for later processing. Klein is given the documents by a veteran AT&T technician who is preparing to retire. Klein, in a casual conversation with the colleague who gave him the documents, remarks, “It seems obvious to me, given that the secret room is next to the 4ESS (see January 2003), that they’re listening to phone calls.” Klein’s colleague shakes his head and says: “No, Internet.… I’ll show you.” (In 2007 Klein will learn from a telecommunications expert that since AT&T was transferring its long-distance telephone traffic onto Internet fiber cables, the splitter was most likely picking up both telephone and Internet traffic.) Klein’s colleague shows him the cabinet containing the splitters. Klein later tells a reporter: “[T]here were optical splitters, which basically were connected by fiber-optic cable down to the secret room on the sixth floor.… The analogy I can give you, which most people are familiar with is, say you get cable TV in your living room and then want to watch all the channels you get in the living room, you want to get all those same channels in your bedroom. So they install on the cable what they call a splitter, which splits off all the signals, duplicates of the same signals which go to the bedroom.… What the splitter does is make a duplicate copy of all the signals going across the fiber-optic cables.… We’re talking about billions and billions of bits of data going across every second, right? And it’s going into the router, and it’s coming back from the routers in that office. So what they do with the splitter is they intercept that data stream and make copies of all the data, and those copies go down on the cable to the secret room.” Klein confirms from his colleague and from the documents that show the splitters are connected directly to the equipment in the secret room. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 34-35]

Entity Tags: Genuity, UUNET, XO, Allegiance, Abovenet, AT&T, ConXion, Sprint/Nextel, Telia, Palo Alto Internet Exchange, MAE West, Level 3, Global Crossing, Mark Klein, National Security Agency, C&W, PSINet, Qwest

Timeline Tags: Civil Liberties

A portion of the outer door of AT&T’s Folsom Street facility.A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

Jack Goldsmith succeeds Jay Bybee as the head of the Justice Department’s Office of Legal Counsel (OLC). The OLC essentially performs two functions: advising the executive branch on the legal limits of presidential power, and crafts legal justifications for the actions of the president and the executive branch. Goldsmith, who along with fellow Justice Department counsel and law professor John Yoo, is seen as one of the department’s newest and brightest conservative stars. But instead of aiding the Bush administration in expanding the power of the executive branch, Goldsmith will spend nine tumultuous months battling the White House on issues such as the NSA’s warrantless wiretapping program, the administration’s advocacy of torture in the interrogation of terrorism suspects, and the extralegal detention and military tribunals of “enemy combatants.” Goldsmith will find himself at odds with Yoo, the author of two controversial OLC memos that grant the US government wide latitude in torturing terror suspects (see January 9, 2002 and August 1, 2002), with White House counsel and future attorney general Alberto Gonzales, and with the chief aide to Vice President Dick Cheney, David Addington, who along with Cheney is one of the strongest advocates of the so-called “unitary executive” theory of governance, which says the president has virtually unlimited powers, especially in the areas of national security and foreign policy, and is not always subject to Congressional or judicial oversight. Within hours of Goldsmith’s swearing-in, Goldsmith receives a phone call from Gonzales asking if the Fourth Geneva Convention, which protects civilians in war zones such as Iraq, covers terrorists and insurgents as well. Goldsmith, after intensive review with other lawyers in and out of the Justice Department, concludes that the conventions do indeed apply. Ashcroft concurs. The White House does not. Goldsmith’s deputy, Patrick Philbin, says to Goldsmith as they drive to the White House to meet with Gonzales and Addington, “They’re going to be really mad. They’re not going to understand our decision. They’ve never been told no.” Philbin’s prediction is accurate; Addington is, Goldsmith recalls, “livid.” The physically and intellectually imposing Addington thunders, “The president has already decided that terrorists do not receive Geneva Convention protections. You cannot question his decision.” Addington refuses to accept Goldsmith’s explanations. Months later, an unmollified Addington will tell Goldsmith in an argument about another presidential decision, “If you rule that way, the blood of the hundred thousand people who die in the next attack will be on your hands.” These initial encounters set the tone for Goldsmith’s stormy tenure as head of the OLC. Goldsmith will lead a small group of administration lawyers in what New York Times Magazine reporter Jeffrey Rosen calls a “behind-the-scenes revolt against what [Goldsmith] considered the constitutional excesses of the legal policies embraced by his White House superiors in the war on terror,” Goldsmith will resign in June of 2004 (see June 17, 2004). [New York Times Magazine, 9/9/2007]

Entity Tags: Richard (“Dick”) Cheney, US Department of Justice, Office of Legal Counsel (DOJ), John C. Yoo, Jack Goldsmith, David S. Addington, Alberto R. Gonzales, National Security Agency, Jay S. Bybee, John Ashcroft, Jeffrey Rosen

Timeline Tags: Civil Liberties

Narus logo.Narus logo. [Source: Endace (.com)]Narus, a firm which manufactures telecommunications hardware, co-sponsors a technical conference in McLean, Virginia, titled “Intelligence Support Systems for Lawful Interception and Internet Surveillance.” As AT&T engineer Mark Klein (see July 7, 2009) will later write: “Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint, and Verizon. Narus founder Dr. Ori Cohen gave a keynote speech.” Also speaking at the conference is William Crowley, the former deputy director of the National Security Agency (NSA). Narus is providing some of the key hardware components used in the NSA’s domestic surveillance program (see January 16, 2004). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 39]

Entity Tags: Narus, AT&T, BellSouth, Mark Klein, Ori Cohen, Verizon Wireless, National Security Agency, MCI, Sprint/Nextel, William Crowley

Timeline Tags: Civil Liberties

The new head of the Justice Department’s Office of Legal Counsel (OLC), Jack Goldsmith, begins an internal review of the legality of the NSA’s warrantless wiretapping program (see December 15, 2005). The program is kept so secret that only four Justice officials even have access to information about its inner workings, a pattern of poor consultation he will call “the biggest legal mess I have ever encountered” when he testifies to the Senate about the program four years later (see October 2, 2007). Neither Attorney General John Ashcroft nor Justice’s top legal counsel know much about the program. When Goldsmith begins his legal review, the White House initially refuses to brief Deputy Attorney General James Comey about it. Goldsmith later testifies that he cannot find “a legal basis for some aspects of the program.” Upon completing the review, Goldsmith declares the program illegal, with the support of Ashcroft and Comey. However, White House officials are irate at Goldsmith’s findings. [Washington Post, 10/20/2007]

Entity Tags: Alberto R. Gonzales, Bush administration (43), Office of Legal Counsel (DOJ), US Department of Justice, John Ashcroft, James B. Comey Jr., Jack Goldsmith, National Security Agency

Timeline Tags: Civil Liberties

A three-judge panel of the Second US Circuit Court of Appeals in New York votes two to one that the military must either charge alleged al-Qaeda terrorist Jose Padilla with a crime, or release him within 30 days. “The government,” the court says, “can transfer Padilla to appropriate civilian authorities who can bring criminal charges against him.” Until now, no court in the US has ruled against the government’s contention that even American citizens arrested on US soil can be held indefinitely based on wartime government prerogatives. Neither the 2001 Authorization to Use Military Force (see September 14-18, 2001) nor the president’s “inherent power” as commander in chief is enough to hold Padilla without a trial, the court finds: “The president, acting alone, possesses no inherent constitutional authority to detain American citizens seized within the United States, away from a zone of combat, as enemy combatants.” The two judges in the majority are a 1998 Clinton appointee and a 2001 Bush appointee; the dissenter, who advocates granting the president new and sweeping powers, is a 2003 Bush appointee. “So far,” Office of Legal Counsel lawyer John Yoo comments, “the Second Circuit is the only court that has rejected the idea that the war on terrorism is, in fact, a war.” Because this ruling conflicts with the Fourth Circuit’s ruling in favor of the Bush administration, the Supreme Court will be forced to resolve the issue (see June 28, 2004); in light of the appeal, the court later agrees to suspend its 30-day ruling. [Knight Ridder, 12/29/2003; Savage, 2007, pp. 153]

Entity Tags: Jose Padilla, John C. Yoo

Timeline Tags: Torture of US Captives, Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Police photo of Tom DeLay, after his 2005 indictment on election fraud charges.Police photo of Tom DeLay, after his 2005 indictment on election fraud charges. [Source: Mug Shot Alley]The co-founder and editor of the American Prospect, Robert Kuttner, subjects the 2002 House of Representatives to scrutiny, and concludes that under the rule of House Majority Leader Tom DeLay (R-TX), it is well on its way to becoming what he calls a “dictatorship.” Kuttner writes that such authoritarian rule in “the people’s chamber” of Congress puts the US “at risk of becoming an autocracy.” He explains: “First, Republican parliamentary gimmickry has emasculated legislative opposition in the House of Representatives (the Senate has other problems). [DeLay] has both intimidated moderate Republicans and reduced the minority party to window dressing.… Second, electoral rules have been rigged to make it increasingly difficult for the incumbent party to be ejected by the voters, absent a Depression-scale disaster, Watergate-class scandal, or Teddy Roosevelt-style ruling party split.… Third, the federal courts, which have slowed some executive branch efforts to destroy liberties, will be a complete rubber stamp if the right wins one more presidential election. Taken together, these several forces could well enable the Republicans to become the permanent party of autocratic government for at least a generation.” Kuttner elaborates on his rather sweeping warnings.
Legislative Dictatorship - The House, and to a lesser extent the Senate, used to have what was called a “de facto four-party system”: liberal Democrats; Southern “Dixiecrats” who, while maintaining their membership as Democrats largely due to lingering resentment of Republicans dating back to the Civil War, often vote with Republicans; conservative Republicans; and moderate-to-liberal “gypsy moth” Republicans, who might vote with either party. Rarely did one of the four elements gain long-term control of the House. Because of what Kuttner calls “shifting coalitions and weak party discipline,” the majority party was relatively respectful of the minority, with the minority free to call witnesses in hearings and offer amendments to legislation. In the House, that is no longer true. While the House leadership began centralizing under House Speaker Jim Wright (D-TX) between 1987 and 1989, the real coalescence of power began under Speaker Newt Gingrich (R-GA) between 1995 and 1999. The process, Kuttner asserts, has radically accelerated under DeLay and Speaker Dennis Hastert (R-IL).
Centralized Legislation - Under current practices, even most Republicans do not, as a rule, write legislation—that comes from DeLay and Hastert. Drastic revisions to bills are often rammed through late in the evening, with little or no debate. The Republican leadership has classified legislation as “emergency” measures 57 percent of the time, allowing them to be voted on with as little as 30 minutes of debate. Kuttner writes, “On several measures, members literally did not know what they were voting for.” Legislation written and proposed by Democrats rarely gets to the floor for debate. Amendments to legislation is also constrained, almost always coming from Hastert and DeLay. “[V]irtually all major bills now come to the floor with rules prohibiting amendments.” DeLay enforces rigid party loyalty, threatening Republican members who resist voting for the leadership’s bills with loss of committee assignments and critical campaign funds, and in some circumstances with DeLay’s sponsoring primary opponents to unseat the uncooperative member in the next election.
Democrats Shut out of Conferences - In the House, so-called “conference committees,” where members work to reconcile House and Senate versions of legislation, have become in essence one-party affairs. Only Democrats who might support the Republican version of the bill are allowed to attend. The conference committee then sends a non-amendable bill to the floor for a final vote.
No Hearings - The general assumption is that House members debate bills, sometimes to exhaustion, on the chamber floor. No more. Before DeLay, bills were almost never written in conference committees. Now, major legislation is often written in conference committee; House members often never see the legislation until it has been written in final, non-amendable form by DeLay and his chosen colleagues.
Abuse of Appropriations - Appropriations, or funding of events authorized by legislation, are ripe for use and misuse by the one-party leadership. Many appropriations bills must pass in order for Congress or other entities of the government to continue functioning. While “earmarks”—“pork-barrel” appropriations for individual members’ pet projects and such—are nothing new, under Gingrich and later Hastert/DeLay, the use of earmarks has skyrocketed. Huge earmarks are now routinely attached to mandatory appropriations bills. DeLay has perfected a technique known as “catch and release.” On close pending votes, the House Republican Whip Organization, made up of dozens of regional whips, will target the small but critical number of Republicans who might oppose the legislation. Head counts are taken; as members register (and change) their votes, some are forced to vote against their consciences (or their constituents) and others are allowed to vote no. Kuttner writes, “Basically, Republican moderates are allowed to take turns voting against bills they either oppose on principle or know to be unpopular in their districts.” This allows the member to save at least some face with their constituents. Under Wright, Republican members such as then-Representative Dick Cheney (R-WY) were outraged when Wright held a vote open for 15 minutes after voting was to end; Cheney called it “the most arrogant, heavy-handed abuse of power I’ve ever seen in the 10 years that I’ve been here.” It is not unusual for DeLay to hold votes open for up to three hours to get recalcitrant members in line. [American Prospect, 2/1/2004] In 2006, author John Dean will note that when the Republicans took control of the House in 1999, there were 1,439 earmarks in that year’s legislation. By the end of 2005, “there were a staggering 13,998 earmarked expenses, costing $27.3 billion.” Dean will write, “Needless to say, there is nothing conservative in those fiscal actions but there is much that is authoritarian about the wanton spending by those Republicans.” [Dean, 2006]
Lack of Opposition - Kuttner notes that Congressional Democrats have not mounted a systematic, organized denunciation of the DeLay operation. Kuttner believes that many Democrats believe voters are uninterested in what they call “process issues,” and that voters will dismiss complaints as “inside baseball,” of little relevance to their lives. Worse, such complaints “make… us look weak,” as one senior House staffer says. Kuttner writes that many Democrats believe such complaints sound “like losers whining.”
Permanent Republican Majority - If DeLay and his confreres in the White House have their way, there will be, in essence, a permanent Republican majority in the House and hopefully in the Senate as well. Bill Clinton routinely practiced what he called bipartisan “triangulation,” building ad hoc coalitions of Democrats and Republicans to pass his legislative initiatives, and in the process weakening the Democratic leadership. Kuttner writes, “Bush’s presidency, by contrast, has produced a near parliamentary government, based on intense party discipline both within Congress and between Congress and the White House.” Republicans have been busy reworking the district maps of various key states to ensure that Republicans keep their majorities, concentrating perceived Democratic voters to have overwhelming majorities in a few districts, and leaving the Republicans holding smaller majorities in the rest. Both parties have been guilty of such “gerrymandering” in the past, but with DeLay’s recent “super-gerrymandering” of his home state of Texas, the Republican makeup of the Texas House delegation is all but assured. DeLay and other House Republicans are working to redistrict other states in similar fashions. As of the 2004 midterm elections, of the 435 House seats, only around 25 are considered effectively contestable—over 90 percent of the House seats are “safe.” Democrats would have to win a disproportionate, and unlikely, number of those “swing” seats to take back control of the House. Kuttner writes: “The country may be narrowly divided, but precious few citizens can make their votes for Congress count. A slender majority, defying gravity (and democracy), is producing not moderation but a shift to the extremes.”
Control of Voting - Kuttner cites the advent of electronic voting machines and the Help America Vote Act (HAVA) as two reasons why Republicans will continue to have advantages at the voting booth. The three biggest manufacturers of electronic voting machines have deep financial ties to the Republican Party, and have joined with Republicans in opposing a so-called “verifiable paper trail” that could prove miscounts and possible fraudulent results. HAVA, written in response to the 2000 Florida debacle, requires that voters show government-issued IDs to be allowed to vote, a provision that Kuttner says is ripe for use in Republican voter-intimidation schemes. Republicans “have a long and sordid history of ‘ballot security’ programs intended to intimidate minority voters by threatening them with criminal prosecution if their papers are not technically in order,” he writes. “Many civil rights groups see the new federal ID provision of HAVA as an invitation to more such harassment.” The only recourse that voters have to such harassment is to file complaints with the Department of Justice, which, under the aegis of Attorney General John Ashcroft, has discouraged investigation of such claims.
Compliant Court System - Increasingly, federal courts with Republican-appointed judges on the bench have worked closely with Republicans in Congress and the White House to issue rulings favorable to the ruling party. Kuttner notes that if President Bush is re-elected: “a Republican president will have controlled judicial appointments for 20 of the 28 years from 1981 to 2008. And Bush, in contrast to both his father and Clinton, is appointing increasingly extremist judges. By the end of a second term, he would likely have appointed at least three more Supreme Court justices in the mold of Antonin Scalia and Clarence Thomas, and locked in militantly conservative majorities in every federal appellate circuit.” The Supreme Court is already close to becoming “a partisan rubber stamp for contested elections,” Kuttner writes; several more justices in the mold of Justices Antonin Scalia (see September 26, 1986) and Clarence Thomas (see October 13, 1991) would, Kuttner writes, “narrow rights and liberties, including the rights of criminal suspects, the right to vote, disability rights, and sexual privacy and reproductive choice. It would countenance an unprecedented expansion of police powers, and a reversal of the protection of the rights of women, gays, and racial, religious, and ethnic minorities. [It would] overturn countless protections of the environment, workers and consumers, as well as weaken guarantees of the separation of church and state, privacy, and the right of states or Congress to regulate in the public interest.” [American Prospect, 2/1/2004]

Entity Tags: George W. Bush, Democratic Party, Dennis Hastert, Clarence Thomas, Antonin Scalia, Tom DeLay, Robert Kuttner, William Jefferson (“Bill”) Clinton, Republican Party, John Ashcroft, Richard (“Dick”) Cheney, House Republican Whip Organization, James C. (‘Jim’) Wright, Jr., John Dean, Newt Gingrich, Help America Vote Act

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Chuck Rosenberg.Chuck Rosenberg. [Source: Associated Press / Charles Dharapak]Vice President Dick Cheney challenges objections to the White House’s secret, warrantless surveillance program (see Early 2002) by Justice Department officials. Cheney makes his objections during a meeting attended by high-level White House and Justice Department officials, but this does not come to light until a 2007 testimony by Deputy Attorney General James Comey (see May 15, 2007). [Washington Post, 6/7/2007] (Comey will step down from his post in mid-2005.) [Law.com, 4/21/2005] The White House meetings take place one day before White House officials journey to Attorney General John Ashcroft’s hospital room to try to force Ashcroft to give his approval for the NSA-managed surveillance program (see March 10-12, 2004). Ashcroft will refuse to give his approval. Cheney’s key role in leading what the Washington Post calls “a fierce internal battle over the legality of the warrantless surveillance program” is not known until Comey’s 2007 testimony. The White House meeting, held to discuss Justice Department objections to the NSA program, is attended by Cheney, White House counsel and future attorney general Alberto Gonzales, Cheney’s chief counsel David Addington, and others. Comey will testify that at the time, eight Justice Department officials are prepared to resign if the White House doesn’t back down on forcing the department to sign off on the program. Those officials include FBI director Robert Mueller, US attorney Chuck Rosenberg of the northern Virginia district, and Office of Legal Counsel head Jack Goldsmith. [Washington Post, 6/7/2007]

Entity Tags: Washington Post, US Department of Justice, Robert S. Mueller III, John Ashcroft, Alberto R. Gonzales, Chuck Rosenberg, David S. Addington, Richard (“Dick”) Cheney, James B. Comey Jr., Jack Goldsmith

Timeline Tags: Civil Liberties

Attorney General John Ashcroft is visited by a squad of top White House and Justice Department officials just hours after Ashcroft underwent emergency surgery for severe, acute pancreatis, and is still recuperating in intensive care. The White House officials attempt to persuade the barely lucid Ashcroft to give his formal approval for the secret National Security Agency warrantless wiretapping surveillance program (see Early 2002), which requires the Justice Department to periodically review and approve it. [National Public Radio, 5/15/2007; Washington Post, 5/16/2007; Washington Post, 6/7/2007; Associated Press, 6/7/2007]
Comey, Goldsmith Rush to Head Off Aides - Deputy Attorney General James Comey testifies to the incident before the Senate Judiciary Committee over three years later (see May 15, 2007). Comey will recall that he and Ashcroft had decided not to recertify the surveillance program due to their concerns over its legality and its lack of oversight. On March 9, Ashcroft was rushed to the hospital with severe pancreatis. As per Justice Department procedures, Comey became acting attorney general for the duration of Ashcroft’s incapacity. The next night, just hours after Ashcroft underwent emergency surgery for the removal of his gallbladder, Comey receives an urgent phone call from Ashcroft’s aide, David Ayres, who himself has just spoken with Ashcroft’s wife Janet. Ayres tells Comey that White House counsel Alberto Gonzales and White House chief of staff Andrew Card are en route to Ashcroft’s hospital room to pressure Ashcroft to sign off on the program recertification. A furious Comey telephones FBI director Robert Mueller, and the two, accompanied by aides, race separately through the Washington, DC streets with sirens wailing to reach Ashcroft’s hospital room; they beat Gonzales and Card to the room by a matter of minutes. “I was concerned that, given how ill I knew the attorney general was, that there might be an effort to ask him to overrule me when he was in no condition to do that,” Comey will testify, and will add that to him, Ashcroft appears “pretty bad off.” En route, Mueller instructs the security detail protecting Ashcroft not to allow Card or Gonzales to eject Comey from the hospital room. Card and Gonzales enter just minutes later. [Washington Post, 5/16/2007; PBS, 5/16/2007] “And it was only a matter of minutes that the door opened and in walked Mr. Gonzales, carrying an envelope, and Mr. Card,” Comey will testify. “They came over and stood by the bed, greeted the attorney general very briefly, and then Mr. Gonzales began to discuss why they were there—to seek his approval for a matter.” [National Public Radio, 5/15/2007] Gonzales is holding an envelope containing an executive order from Bush. He tells Ashcroft that he needs to sign off on the order, thereby giving the wiretapping program Justice Department authorization to continue unabated. Comey will testify that Ashcroft “lifted his head off the pillow and in very strong terms expressed his view of the matter, rich in both substance and fact, which stunned me. [Ashcroft then adds] ‘But that doesn’t matter, because I’m not the attorney general. There is the attorney general,’” pointing at Comey. Gonzales and Card leave the room without ever acknowledging Comey’s presence. “I was angry,” Comey will recall. “I thought I just witnessed an effort to take advantage of a very sick man, who did not have the powers of the attorney general because they had been transferred to me.” [Washington Post, 5/16/2007; Washington Post, 6/7/2007] “That night was probably the most difficult night of my professional life, so it’s not something I forget,” Comey will testify. [PBS, 5/16/2007] Goldsmith is also in the room; like Comey, Goldsmith receives a phone call alerting him to Gonzales’s and Card’s visit, and like Comey, Goldsmith races through the Washington streets to arrive at Ashcroft’s room minutes before Gonzales and Card arrive. He, too, is astonished at the brazen, callous approach taken by the two White House officials against Ashcroft, who he describes as laying in his darkened hospital room, with a bright light shining on him and tubes and wires protruding from his body. “Ashcroft, who looked like he was near death, sort of puffed up his chest,” Goldsmith later recalls. “All of a sudden, energy and color came into his face, and he said that he didn’t appreciate them coming to visit him under those circumstances, that he had concerns about the matter they were asking about and that, in any event, he wasn’t the attorney general at the moment; Jim Comey was. He actually gave a two-minute speech, and I was sure at the end of it he was going to die. It was the most amazing scene I’ve ever witnessed.” As Gonzales and Card leave the room, Goldsmith will recall, “Mrs. Ashcroft, who obviously couldn’t believe what she saw happening to her sick husband, looked at Gonzales and Card as they walked out of the room and stuck her tongue out at them. She had no idea what we were discussing, but this sweet-looking woman sticking out her tongue was the ultimate expression of disapproval. It captured the feeling in the room perfectly.” [New York Times Magazine, 9/9/2007] After Gonzales and Card leave the room, Comey asks Mueller to instruct the security detail not to let any more visitors into the room, except for family, without Mueller’s approval, apparently in order to keep Gonzales and Card from attempting to return. [US Department of Justice, 8/14/2007]
Cheney or Bush Behind Visit? - The hospital visit is sparked by at least two events: a meeting of White House officials a day earlier, where Vice President Dick Cheney attempted to push reluctant Justice Department officials to approve the surveillance program (see March 9, 2004), and Comey’s own refusal to certify the legality of the surveillance, as noted above. [Washington Post, 6/7/2007] Some believe that the timing of the incident shows that Cheney is the one who ordered Gonzales and Card to go to Ashcroft’s hospital room; Comey personally informed Cheney of his decision not to give his approval to the program. Speculation about Cheney’s ordering of the visit cannot be confirmed, [National Journal, 7/7/2007; National Journal, 8/16/2007] though the New York Times states flatly in an op-ed that “Vice President Dick Cheney sent Mr. Gonzales and [Card] to Mr. Ashcroft’s hospital room to get him to approve the wiretapping.” [New York Times, 7/29/2007] Three years later, Goldsmith will tell Congress that he believes Bush himself authorized the visit (see October 2, 2007).
Meeting in the White House - Minutes after the incident in Ashcroft’s hospital room, Card orders Comey to appear at a late-night meeting at the White House; Comey refuses to go alone, and pulls Solicitor General Theodore Olson from a dinner party to act as a witness to the meeting. “Mr. Card was very upset and demanded that I come to the White House immediately. After the conduct I had just witnessed, I would not meet with him without a witness present,” Comey will testify. “[Card] replied, ‘What conduct? We were just there to wish him well.’ And I said again, ‘After what I just witnessed, I will not meet with you without a witness. And I intend that witness to be the solicitor general of the United States.’” On March 11, after an al-Qaeda bombing in Madrid kills over 200 people (see 7:37-7:42 a.m., March 11, 2004, Bush recertifies the program without the approval of the Justice Department. Comey responds by drafting a letter of resignation, effective March 12. “I couldn’t stay if the administration was going to engage in conduct that the Department of Justice had said had no legal basis,” he will testify. “I just simply couldn’t stay.” Comey is not the only one threatening to resign; he is joined by Ashcroft, Mueller, Ayres, Goldsmith, Justice Department official Patrick Philbin, and others, who all intend to resign en masse if Bush signs off on the surveillance program without Justice Department support. But Ayres persuades Comey to delay his resignation; in Comey’s words, Ayres “asked me something that meant a great deal to him, and that is that I not resign until Mr. Ashcroft was well enough to resign with me.” Instead of resigning on March 12, Bush meets separately with Comey and Mueller, and promises to make changes in the program (see March 12-Mid-2004). Those changes have never been disclosed, though some changes are later found to be the creation of a secret review court to oversee the surveillance court, and the clarification of what exactly constitutes “probable cause” for surveillance. Comey will testify,…“Director Mueller came to me and said that, ‘The president told me that the Department of Justice should get this where it wants to be—to do what the department thinks is right.’ And I took that mandate and set about to do that, and I accomplished that.” [Newsweek, 1/9/2006; National Public Radio, 5/15/2007; New York Times, 5/15/2007; Washington Post, 5/16/2007; PBS, 5/16/2007; Associated Press, 6/7/2007] Goldsmith recalls his surprise when Congress later approves the program and brings it somewhat under the supervision of the FISA court. “I was sure the government was going to melt down,” Goldsmith says in 2007. “No one anticipated they were going to reverse themselves.” [New York Times Magazine, 9/9/2007]
Did Gonzales Break the Law? - It is also possible that Gonzales and Card may have broken the law in discussing classified information in a public venue. “Executive branch rules require sensitive classified information to be discussed in specialized facilities that are designed to guard against the possibility that officials are being targeted for surveillance outside of the workplace,” says law professor Neal Katyal, a national security adviser under Bill Clinton. “The hospital room of a cabinet official is exactly the type of target ripe for surveillance by a foreign power. And the NSA program is particularly sensitive. One government official familiar with the program notes, “Since it’s that program, it may involve cryptographic information,” some of the most highly protected information in the intelligence community. The law governing disclosure of classified information is quite strict, and numerous government and military officials have been investigated for potential violations in the past. “It’s the one you worry about,” says the government official. Katyal says that if Gonzales did indeed break the law, the Justice Department cannot run any investigation into the matter: “The fact that you have a potential case against the Attorney General himself calls for the most scrupulous and independent of investigations.” Many others are dismayed and confused by the contradictions between the absolute secrecy surrounding the program, and Gonzales’s and Card’s willingness to openly discuss it in such an insecure location, and in front of witnesses not cleared to hear details about the program—including Ashcroft’s wife, who is present in the room while the officials seek her husband’s signature. Former NSA general counsel Elizabeth Parker says not enough is known about the meeting to be sure whether or not the law was broken. “Obviously things can be discussed in ways that don’t divulge highly classified information,” she says. “The real issue is what is it about this program that is so classified that can’t allow it to be discussed in a Congressional setting, even a closed Congressional hearing. In order to have confidence in what this program is all about, one needs to understand better what the approach is and how it affects the rights of American citizens.”
'Horrible' Judgment - John Martin, who oversaw Justice’s counterintelligence division for 26 years, calls Gonzales’s and Card’s attempt to override Comey’s authority as acting attorney general as more than just “bad judgment.” Martin calls their judgement “horrible…they both knew or should have known that the Attorney General while he was so incapacitated had delegated his power to his deputy Jim Comey. Comey’s actions were heroic under the circumstances.” [Time, 5/17/2007]
Snow Dismisses Concerns - In May 2007, after Comey’s testimony to the Senate hits the media, White House press secretary Tony Snow dismisses any concerns about the inappropriateness of Gonzales’s and Card’s pressuring of Ashcroft in his hospital room, and skips over the fact that Comey, not Ashcroft, had the final authority of the Attorney General at the time. “Because he had an appendectomy, his brain didn’t work?” Snow will say of Ashcroft. “Jim Comey can talk about whatever reservations he may have had. But the fact is that there were strong protections in there, this program has saved lives and it’s vital for national security and furthermore has been reformed in a bipartisan way.” Judiciary Committee member Charles Schumer (D-NY) has a different take on the incident: “What happened in that hospital room crystallized Mr. Gonzales’ view about the rule of law: that he holds it in minimum low regard.” [Associated Press, 6/7/2007] Senate Democrats are preparing to introduce a resolution of no-confidence against Gonzales. [Time, 5/17/2007]

Entity Tags: National Security Agency, George W. Bush, Jack Goldsmith, James B. Comey Jr., John Ashcroft, Elizabeth Parker, Janet Ashcroft, Richard (“Dick”) Cheney, John Martin, David Ayres, Alberto R. Gonzales, Andrew Card, US Department of Justice, Charles Schumer, Theodore (“Ted”) Olson, Tony Snow, Robert S. Mueller III, Senate Judiciary Committee, Patrick F. Philbin, Neal Katyal

Timeline Tags: Civil Liberties

Multiple bombs destroyed this train in Madrid, Spain.Multiple bombs destroyed this train in Madrid, Spain. [Source: Rafa Roa/ Cover/ Corbis] (click image to enlarge)At about 7:40 a.m., four trains are bombed in Madrid, Spain, killing 191 people and injuring about 1,800 more. These are not suicide bombings, but were set by cell phone timers. Basque separatists are initially blamed, but evidence later points to people loosely associated with al-Qaeda. It will later be reported that 34 out of the 40 main people suspected or arrested for involvement in the bombings were under surveillance in Spain prior to the bombings (see Shortly Before March 11, 2004). Most of the bombers had never been to any training camps. In 2006, Spanish investigators will announce that the bombings were inspired by al-Qaeda, but not ordered or funded by al-Qaeda’s leadership. Specifically, the bombers are said to have been inspired by a speech allegedly given by Osama bin Laden in October 2003 (see October 19, 2003). [New Yorker, 7/26/2004; Associated Press, 3/9/2006] However, there will also be evidence against this that will not be refuted. For instance, the investigators will claim that all the key participants are either dead or in jail, but a number of them remain free overseas. For example, Amer el-Azizi is implicated in the Madrid bombings (see Before March 11, 2004), and he has links to well-known al-Qaeda figures such as Khalid Shaikh Mohammed (see (November 2001)), Ramzi bin al-Shibh (see Before July 8, 2001), and Zacarias Moussaoui (see Before August 16, 2001). In late 2002 or early 2003, el-Azizi is said to have met with Serhane Abdelmajid Fakhet, one of the key bombers, to discuss a bombing. He reportedly gave Fakhet permission to stage a bombing in the name of al-Qaeda, but it is unclear if he gave any funding or other assistance. [Associated Press, 4/10/2004; New Yorker, 7/26/2004] There are suggestions that el-Azizi was protected by Spanish intelligence (see Shortly After November 21, 2001), so the government may not be eager to highlight his involvement. Fakhet, considered one of the three masterminds of the bombings, may have been a government informant (see Shortly After October 2003). Many of the other plotters also appear to have been informants, and almost all the plotters were under surveillance before the bombings (see Shortly Before March 11, 2004). Former counterterrorism “tsar” Richard Clarke will say later in the month: “If we catch [bin Laden] this summer, which I expect, it’s two years too late. Because during those two years when forces were diverted to Iraq… al-Qaeda has metamorphosized into a hydra-headed organization with cells that are operating autonomously like the cells that operated in Madrid recently.” [USA Today, 3/28/2004] It will be noted that the 9/11 terrorist attacks in the US and the Madrid train bombings are separated by a total of 911 days. [MSNBC, 3/19/2004; Bloomberg, 4/22/2005]

Entity Tags: Osama bin Laden, Amer el-Azizi, Al-Qaeda, Richard A. Clarke, Serhane Abdelmajid Fakhet

Timeline Tags: Complete 911 Timeline

After senior Justice Department officials object to the possible illegality of the National Security Agency’s secret domestic surveillance program, and refuse to sign off on its continued use, the program is suspended for several months while Justice Department officials conduct a secret audit of the program. Attorney General John Ashcroft will recertify the program at the end of the month (see Late March, 2004). The suspension is prompted by acting Attorney General James Comey’s refusal to approve the program when it comes up for its regular 45-day review, and a subsequent late-night hospital visit by White House officials Andrew Card and Alberto Gonzales to the hospital room of Attorney General John Ashcroft, where they unsuccessfully attempt to pressure Ashcroft, recuperating from surgery, to overrule Comey and approve the program (see March 10-12, 2004). Bush himself has personally reauthorized the program over 30 times since its inception after the 9/11 attacks (see Early 2002), and reauthorizes it himself after Comey and Ashcroft refuse to give it their approval. This reauthorization prompts a threat of mass resignations by Justice Department officials unless the program is brought under increased oversight. Bush will allow the Justice Department to recommend changes to the program, though those changes have never been made public. The Justice Department audits a selection of cases to see how the NSA is running the program, scrutinizing how NSA officials determine that they have probable cause to wiretap US citizens’ phones and e-mail accounts. The results of that audit have not been made public. When the program was first authorized by Bush’s executive order in early 2002, it was so secret that then-Deputy Attorney General Larry Thompson, who was active in most of the government’s most highly classified counterterrorism operations, was not given access to the program. That decision, among other elements of the program, led many Justice Department officials to worry that the program was operating outside of the Constitution and without proper oversight. Comey, Thompson’s successor, was eventually given authorization to take part in the program and to review intelligence data produced by it. Justice Department officials say that Comey takes part in overseeing the reforms that are put into place during the current audit. However, those reforms do not restrict the NSA’s authority to independently choose its eavesdropping targets, and NSA shift supervisors have the authority to decide for themselves whether there is enough evidence against a US citizen to warrant a secret wiretap. No one at the Justice Department or in the White House needs to be consulted before a wiretap is put into place. [New York Times, 12/31/2005]

Entity Tags: US Department of Justice, National Security Agency, Larry D. Thompson, Associated Press, James B. Comey Jr., John Ashcroft, Alberto R. Gonzales, George W. Bush, Andrew Card

Timeline Tags: Civil Liberties

Attorney General John Ashcroft recertifies the NSA’s warrantless wiretapping program as being within the law, three weeks after he and his deputy, James Comey, refused to certify it. The program had come under question in early 2004, when Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel, wrote to Ashcroft and Comey expressing his doubts about the program’s legality (see September 9, 2007). For those three weeks, the program operated without Justice Department approval; President Bush personally recertified it himself, though it was suspended and subjected to an internal review (see March 12-Mid-2004). Ashcroft had previously refused to recertify the program while recuperating from surgery, despite pressure from White House officials Alberto Gonzales and Andrew Card (see March 10-12, 2004). Ashcroft, Comey, Goldsmith, and other Justice Department officials had even threatened to resign en masse if Bush recertified the program without their department’s support; Bush promised to revamp the program to address Ashcroft and Comey’s objections to the program, though what those changes are remains unclear. [Boston Globe, 5/16/2007; Associated Press, 6/7/2007]

Entity Tags: Andrew Card, Alberto R. Gonzales, George W. Bush, Jack Goldsmith, National Security Agency, James B. Comey Jr., US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

At a speech in Hershey, Pennsylvania, supporting the USA Patriot Act (see October 26, 2001), President Bush tells listeners that all US surveillance efforts are done with warrants from the Foreign Intelligence Surveillance Act (FISA) Court: “For years, law enforcement used so-called roving wire taps to investigate organized crime. You see, what that meant is if you got a wire tap by court order—and, by the way, everything you hear about requires court order, requires there to be permission from a FISA court, for example.… See, with court approval, we have long used roving wire taps to lock up monsters—mobsters. Now [with the Patriot Act in effect] we have a chance to lock up monsters, terrorist monsters.” [White House, 4/19/2004] The next day, Bush makes a similar claim during another pro-Patriot Act speech in Buffalo. He tells listeners: “[T]here are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires—a wiretap requires a court order. Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so. It’s important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. But a roving wiretap means—it was primarily used for drug lords. A guy, a pretty intelligence drug lord would have a phone, and in old days they could just get a tap on that phone. So guess what he’d do? He’d get him another phone, particularly with the advent of the cell phones. And so he’d start changing cell phones, which made it hard for our DEA types to listen, to run down these guys polluting our streets. And that changed, the law changed on—roving wiretaps were available for chasing down drug lords. They weren’t available for chasing down terrorists, see? And that didn’t make any sense in the post-9/11 era. If we couldn’t use a tool that we’re using against mobsters on terrorists, something needed to happen. The Patriot Act changed that. So with court order, law enforcement officials can now use what’s called roving wiretaps, which will prevent a terrorist from switching cell phones in order to get a message out to one of his buddies.” [White House, 4/20/2004] Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48] Klein will call Bush’s description of the surveillance program “disingenuous,” and continue: “They present it as about phone calls. They’re just watching a few bad people who make phone calls to al-Qaeda and the Middle East, and you notice they don’t talk about the Internet hardly at all. That part of it hasn’t been revealed, because if they did, Americans would realize it’s not just a few people; it’s everybody, because the data they’re handing over is not selected out. When you run fiber optics through a splitter and you send all that data to a secret room, there’s no selecting going on there at all.… They have no way of sifting it out unless they look through it later. Now they can claim, ‘Oh, we are right as rain; we’re only doing the legal thing and selecting out a few people that we’re legally entitled to,’ but that’s only after they get all the data. The analogy I use: If the government claims: ‘Well, when you do your taxes, why don’t you just write me a blank check and we’ll fill in the amount? Don’t worry. We’ll do it legal. We’ll fill in the right amount,’ would you do that? Nobody would trust the government by writing a blank check to them. It’s the same thing with the data we’re giving them.… [T]he Fourth Amendment specifically bans general warrants. It calls for specific warrants in which the things to be seized and the persons to be seized are specifically named. There’s a reason for that. It’s to protect against arbitrary government power. And what they’ve done is to trample over the Fourth Amendment by basically instituting a general warrant on the Internet.” [PBS Frontline, 5/15/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Mark Klein, National Security Agency, George W. Bush

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Entity Tags: Mark Klein, AT&T

Timeline Tags: Civil Liberties

Attorney General John Ashcroft again invokes the “state secrets” privilege (see March 9, 1953), forbidding former FBI translator Sibel Edmonds from testifying in a case brought by hundreds of families of September 11 victims (see October 18, 2002). [New York Times, 5/20/2004] Four weeks earlier, on April 26, the Justice Department had obtained a temporary court order preventing her from testifying before the court. [Independent, 4/2/2004; Government Executive, 4/30/2004] The families, represented by the law firm Motley-Rice, allege that a number of banks and two members of the Saudi royal family provided financial support to al-Qaeda. [New York Times, 5/20/2004] Ashcroft’s order retroactively classifies information it provided Senators Chuck Grassley and Patrick Leahy (see June 17, 2002) concerning former FBI translator Sibel Edmonds and her allegations. Among the documents to be “reclassified” are the follow-up letters sent by Grassley and Leahy to the FBI which they posted on their website. Their staff members are prohibited from discussing the information, even though it is now public knowledge. The order bars Edmonds from answering even simple questions like, “When and where were you born?” “What languages do you speak?” and “Where did you go to school?” [New York Times, 5/20/2004; Boston Globe, 7/5/2004; Asia Times, 8/6/2004; Vanity Fair, 9/2005] In response to the announcement, Grassley says: “I think it’s ludicrous, because I understand that almost all of this information is in the public domain and has been very widely available. This classification is very serious, because it seems like the FBI would be attempting to put a gag order on Congress.” [New Republic, 6/7/2004]

Entity Tags: US Department of Justice, Sibel Edmonds, Charles Grassley, Patrick J. Leahy

Timeline Tags: Complete 911 Timeline, Civil Liberties

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

Yaser Esam Hamdi.Yaser Esam Hamdi. [Source: Associated Press]In the case of Yaser Esam Hamdi v. Donald Rumsfeld, the Supreme Court rules 8-1 that, contrary to the government’s position, Hamdi (see December 2001), as a US citizen held inside the US, cannot be held indefinitely and incommunicado without an opportunity to challenge his detention. It rules he has the right to be given the opportunity to challenge the basis for his detention before an impartial court. Justice Sandra Day O’Connor writes for the majority: “It would turn our system of checks and balances on its head to suggest that a citizen could not make his way to court with a challenge to the factual basis for his detention by his government, simply because the Executive opposes making available such a challenge. Absent suspension of the writ by Congress, a citizen detained as an enemy combatant is entitled to this process.” Hamdi, on the other hand, apart from military interrogations and “screening processes,” has received no process. Due process, according to a majority of the Court, “demands some system for a citizen detainee to refute his classification [as enemy combatant].” A “citizen-detainee… must receive notice of the factual basis for his classification, and a fair opportunity to rebut the government’s factual assertions before a neutral decision-maker.” However, O’Connor writes, “an interrogation by one’s captor… hardly constitutes a constitutionally adequate factfinding before a neutral decisionmaker.”
Conservative Dissent: President Has Inherent Power to Detain Citizens during War - Only Justice Clarence Thomas affirms the government’s opinion, writing, “This detention falls squarely within the federal government’s war powers, and we lack the expertise and capacity to second-guess that decision.” [Supreme Court opinion on writ of certiorari. Shafiq Rasul, et al. v. George W. Bush, et al., 6/28/2004] Thomas adds: “The Founders intended that the president have primary responsibility—along with the necessary power—to protect the national security and to conduct the nation’s foreign relations. They did so principally because the structural advantages of a unitary executive are essential in these domains.” [Dean, 2007, pp. 105]
'A State of War Is Not a Blank Check for the President' - The authority to hold Hamdi and other such US citizens captured on enemy battlefields derives from Congress’s Authorization to Use Military Force (AUMF—see September 14-18, 2001). Justice Antonin Scalia dissents from this portion of the majority ruling, saying that because Congress had not suspended habeas corpus, Hamdi should either be charged with a crime or released. The Court also finds that if Hamdi was indeed a missionary and not a terrorist, as both he and his father claim, then he must be freed. While the Court does not grant Hamdi the right to a full criminal trial, it grants him the right to a hearing before a “neutral decision-maker” to challenge his detention. O’Connor writes: “It is during our most challenging and uncertain moments that our nation’s commitment to due process is most severely tested; and it is in these times that we must preserve our commitment at home to the principles for which we fight abroad.… We have long made clear that a state of war is not a blank check for the president when it comes to the rights of the nation’s citizens.”
Affirms President's Right to Hold US Citizens Indefinitely - Although the media presents the ruling as an unmitigated defeat for the Bush administration, it is actually far more mixed. The White House is fairly pleased with the decision, insamuch as Hamdi still has no access to civilian courts; the administration decides that Hamdi’s “neutral decision-maker” will be a panel of military officers. Hamdi will not have a lawyer, nor will he have the right to see the evidence against him if it is classified. This is enough to satisfy the Court’s ruling, the White House decides. In 2007, author and reporter Charlie Savage will write: “[T]he administration’s legal team noted with quiet satisfaction that, so long as some kind of minimal hearing was involved, the Supreme Court had just signed off on giving presidents the wartime power to hold a US citizen without charges or a trial—forever.” The Justice Department says of the ruling that it is “pleased that the [Court] today upheld the authority of the president as commander in chief of the armed forces to detain enemy combatants, including US citizens.… This power, which was contested by lawyers representing individuals captured in the War on Terror, is one of the most essential authorities the US Constitution grants the president to defend America from our enemies.” [Savage, 2007, pp. 193-194]

Entity Tags: Sandra Day O’Connor, Antonin Scalia, Donald Rumsfeld, Yaser Esam Hamdi, Clarence Thomas, Charlie Savage

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The New York Times agrees to a White House request to withhold publication of a potential “bombshell” story: an in-depth article revealing an enormous, and possibly illegal, warrantless wiretapping program executed by the NSA at President Bush’s behest after the 9/11 attacks. The Times will publish the story almost a year later (see December 15, 2005). In August 2006, the Times’s public editor, Byron Calame, will confirm the delay, and note that he has been “increasingly intrigued” by the various descriptions of the delay by Times editor Bill Keller (see December 16, 2005) and others. Keller will tell Calame that, contrary to some statements he and others have made, the story was originally scheduled to be published just days before the November 2004 presidential election. “The climactic discussion about whether to publish was right on the eve of the election,” Keller will say, though he will refuse to explain why he makes the final decision to hold the story. However, he will say that at this time he is not sure the story’s sources are reliable enough to warrant its publication before a close election. [New York Times, 8/13/2006]

Entity Tags: Bush administration (43), Bill Keller, New York Times, Byron Calame, National Security Agency

Timeline Tags: Civil Liberties

Salim Ahmed Hamdan.Salim Ahmed Hamdan. [Source: Public domain]US District Judge James Robertson rules that the Combatant Status Review Tribunal being held at the Guantanamo base in Cuba to determine the status of detainee Salim Ahmed Hamdan is unlawful and cannot continue. At the time of the decision, Hamdan is before the Guantanamo military commission. [Washington Post, 11/9/2004; USA Today, 11/9/2004] The commission system, as set up by White House lawyers David Addington and Timothy Flanigan three years before (see Late October 2001), gives accused terrorists such as Hamdan virtually no rights; in author and reporter Charlie Savage’s words, “the [Bush] administration had crafted rules that would make it easy for prosecutors to win cases.” [Savage, 2007, pp. 195-196]
Violation of Geneva Conventions - Robertson, in his 45-page opinion, says the government should have conducted special hearings to determine whether detainees qualified for prisoner-of-war protections under the Geneva Conventions at the time of capture. [USA Today, 11/9/2004] He says that the Bush administration violated the Geneva Conventions when it designated prisoners as enemy combatants, denied them POW protections, and sent them to Guantanamo. [Boston Globe, 11/9/2004] The Combatant Status Review Tribunals that are currently being held in response to a recent Supreme Court decision (see June 28, 2004) are inadequate, Robertson says, because their purpose is to determine whether detainees are enemy combatants, not POWs, as required by the Third Geneva Convention. [USA Today, 11/9/2004]
Rejects Claims of Presidential Power - Robertson also rejects the administration’s claim that the courts must defer to the president in a time of war. “The president is not a ‘tribunal,’” the judge says. [USA Today, 11/9/2004] Robertson, a Clinton appointee, thus squarely opposes both the president’s military order of November 13, 2001 (see November 13, 2001) establishing the possibility of trial by military tribunal, and his executive order of February 7, 2002 (see February 7, 2002) declaring that the Geneva Conventions do not to apply to Taliban and al-Qaeda prisoners. “The government has asserted a position starkly different from the positions and behavior of the United States in previous conflicts,” Robertson writes, “one that can only weaken the United States’ own ability to demand application of the Geneva Conventions to Americans captured during armed conflicts abroad.” [USA Today, 11/9/2004; Washington Post, 11/9/2004; Boston Globe, 11/9/2004]
Orders Military Courts-Martial - Robertson orders that until the government conducts a hearing for Hamdan before a competent tribunal in accordance with the Third Geneva Conventions, he can only be tried in courts-martial, according to the same long-established military rules that apply to trials for US soldiers. [Washington Post, 11/9/2004; Boston Globe, 11/9/2004] Robertson’s ruling is the first by a federal judge to assert that the commissions are illegal. [Washington Post, 11/9/2004]
Hearings Immediately Recessed - When word of Robertson’s ruling comes to Guantanamo, Colonel Peter Brownback, presiding over a pretrial hearing for Hamdan, immediately gavels the hearing closed, declaring an “indefinite recess” for the tribunal. [Savage, 2007, pp. 195-196]
Ruling Applauded by Civil Libertarians, Rejected by Bush Lawyers - Anthony Romero, director of the American Civil Liberties Union; Eugene Fidell, president of the National Institute of Military Justice; and Michael Ratner, president of the Center for Constitutional Rights, all applaud Robertson’s ruling. [Boston Globe, 11/9/2004] The Bush administration rejects the court’s ruling and announces its intention to submit a request to a higher court for an emergency stay and reversal of the decision. “We vigorously disagree.… The judge has put terrorism on the same legal footing as legitimate methods of waging war,” Justice Department spokesman Mark Corallo says. “The Constitution entrusts to the president the responsibility to safeguard the nation’s security. The Department of Justice will continue to defend the president’s ability and authority under the Constitution to fulfill that duty.” [Washington Post, 11/9/2004; Boston Globe, 11/9/2004] He also says that the commission rules were “carefully crafted to protect America from terrorists while affording those charged with violations of the laws of war with fair process.” [Boston Globe, 11/9/2004]
Ruling May Affect Other Detainees - Though the ruling technically only applies to Hamdan, his civilian attorney, Neal Katyal, says it could affect other detainees. “The judge’s order is designed only to deal with Mr. Hamdan’s case,” Katyal says. “But the spirit of it… extends more broadly to potentially everything that is going on here at Guantanamo.” [USA Today, 11/9/2004]

Entity Tags: Mark Corallo, Neal Katyal, James Robertson, George W. Bush, Anthony D. Romero, Peter Brownback, Charlie Savage, US Supreme Court, American Civil Liberties Union, Salim Ahmed Hamdan

Timeline Tags: Torture of US Captives, Civil Liberties

2005: NSA Proposes New Data Mining Program

The National Security Agency calls for proposals in regard to a new electronic surveillance program, the Advanced Capabilities for Intelligence Analysis (ACIA). Like its cousin, the Novel Intelligence from Massive Data (NIMD) project (see After September 11, 2001), ACIA will use a huge electronic database of information on US citizens and foreign nationals to track potential terrorists and terror plots. Like NIMD, ACIA will look for ways “to construct and use plausible futures in order to provide additional, novel interpretations for today’s collection” of intelligence information, according to the call for proposals. [National Journal, 1/20/2006]

Entity Tags: National Security Agency, Advanced Capabilities for Intelligence Analysis, Novel Intelligence from Massive Data

Timeline Tags: Civil Liberties

The Senate Judiciary Committee brings in several experts to expand upon the testimony of attorney general nominee Alberto Gonzales (see January 6, 2005 and January 6, 2005). One of the most outspoken critics is Yale Law School dean Harold Koh. Koh had worked in the Justice Department’s Office of Legal Counsel (OLC) under Ronald Reagan, and later served as assistant secretary of state for democracy, human rights, and labor in the Clinton administration. He is a vocal critic of the Bush administration’s detention policies at Guantanamo and elsewhere. Koh had once worked closely with OLC lawyer John Yoo, the author of numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002), but now, without explicitly mentioning Yoo by name, he repudiates his former student’s legal positions. Gonzales worked closely with Yoo to craft the administration’s positions on wiretapping, torture, the inherent power of the president, and other issues. “Having worked in both Democratic and Republican administrations, and for more than two years as an attorney in the Office of Legal Counsel, I am familiar with how legal opinions like this are sought and drafted,” Koh states. “I further sympathize with the tremendous pressures of time and crisis that government lawyers face while drafting such opinions. Nevertheless, in my professional opinion, the August 1, 2002 OLC memorandum [drafted by Yoo at Gonzales’s behest—see August 1, 2002] is perhaps the most clearly erroneous legal opinion I have ever read.” The August 1 memo, as well as other opinions by Yoo and Gonzales, “grossly overreads the inherent power of the president” as commander in chief, Koh testifies. The memos raise profound questions about the legal ethics of everyone involved—Gonzales, Yoo, and others in the Justice Department and White House. “If a client asks a lawyer how to break the law and escape liability, the lawyer’s ethical duty is to say no,” Koh testifies. “A lawyer has no obligation to aid, support, or justify the commission of an illegal act.” [Senate Judiciary Committee, 1/7/2005 pdf file; Savage, 2007, pp. 211-212]

Entity Tags: Senate Judiciary Committee, US Department of Justice, Harold Koh, Alberto R. Gonzales, Bush administration (43), John C. Yoo, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

The Justice Department issues a secret opinion that countermands and contradicts the administration’s official policy that torture is “abhorrent” and will not be practiced by US military or law enforcement officials (see December 30, 2004). The secret opinion is, the New York Times writes two years later while publicly revealing its existence, “an expansive endorsement of the harshest interrogation techniques ever used by the Central Intelligence Agency.” The opinion gives explicit authorization to abuse detainees with a combination of physical and psychological abuse, including head-slapping, stress positioning, simulated drowning (“waterboarding”), and prolonged exposure to intense cold. New attorney general Alberto Gonzales (see November 10, 2004) approves the memo over the objections of deputy attorney general James Comey, himself preparing to leave the Justice Department after a series of battles over the legality of torture and the domestic surveillance program (see March 10-12, 2004). Comey says at the time that everyone at the department will be “ashamed” of the new opinion once the world learns of it. [New York Times, 10/4/2007]

Entity Tags: US Department of Justice, Alberto R. Gonzales, Central Intelligence Agency, New York Times

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Zacarias Moussaoui wants captured al-Qaeda leaders Khalid Shaikh Mohammed and Ramzi bin al-Shibh to testify in his trial. However, an appeals court in April 2004 had only allowed indirect access to those prisoners, and further appeals court decisions in September and October 2004 had reaffirmed that ruling. On this date, the US Supreme Court, without comment, refuses to hear a further appeal. This was expected because the Supreme Court typically doesn’t hear such appeals until after the case goes to trial. [Washington Post, 9/14/2004; Washington Post, 10/14/2004; Washington Post, 3/22/2005] Moussaoui’s guilty plea one month later (see April 22, 2005) may lead to a new round of appeals. Presiding judge Leonie Brinkema has indicated she believes witness access is “highly relevant to the sentencing phase,” which will begin next, and could constitute “mitigating evidence” that could make the difference between Moussaoui receiving the death penalty or not. [Washington Post, 4/23/2005]

Entity Tags: Zacarias Moussaoui, Khalid Shaikh Mohammed, US Supreme Court, Ramzi bin al-Shibh, Leonie Brinkema

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The DC federal appeals court rules in favor of the attorney general’s use of the state secrets privilege (see March 9, 1953, October 18, 2002 and May 19, 2004) to prevent the court from hearing Sibel Edmonds’ lawsuit (see June 2002). Lawyers for the Justice Department had addressed the judge behind sealed doors. [Vanity Fair, 9/2005]

Entity Tags: Sibel Edmonds, US Department of Justice

Timeline Tags: Complete 911 Timeline

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

Months after the Bush administration successfully convinced the New York Times to hold off publishing its report on the administration’s warrantless wiretapping program (see Early November 2004, December 6, 2005, and December 15, 2005), one of the reporters on the story, Eric Lichtblau, attempts to get a response on the program from one of the few Democrats briefed on it, House Intelligence Committee ranking member Jane Harman (D-CA). In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau will write about covering a House hearing where Harman launches into a passionate call for stronger civil liberties safeguards in the reauthorization of the USA Patriot Act (see March 9, 2006). According to his recollection, Lichtblau approaches Harman and says, “I’m trying to square what I heard in there with what we know about that program.” He will write: “Harman’s golden California tan turned a brighter shade of red. She knew exactly what I was talking about. Shooing away her aides, she grabbed me by the arm and drew me a few feet away to a more remote section of the Capitol corridor. ‘You should not be talking about that here,’ she scolded me in a whisper. ’ They don’t even know about that,’ she said, gesturing to her aides, who were now looking on at the conversation with obvious befuddlement.” Harman tells Lichtblau, “The Times did the right thing by not publishing that story,” but will not discuss the details. When asked what intelligence capabilities would be lost by informing the public about something the terrorists already knew—that the government was listening to them—she simply replies, “This is a valuable program, and it would be compromised.” Lichtblau will add: “This was clearly as far as she was willing to take the conversation, and we didn’t speak again until months later, after the NSA story had already run. By then, Harman’s position had undergone a dramatic transformation. When the story broke publicly, she was among the first in line on Capitol Hill to denounce the administration’s handling of the wiretapping program, declaring that what the NSA was doing could have been done under the existing FISA law.” [TPM Muckraker, 3/19/2008]

Entity Tags: Eric Lichtblau, Bush administration (43), New York Times, House Intelligence Committee, Jane Harman

Timeline Tags: Civil Liberties

George Christian.George Christian. [Source: PBS]Librarian and data manager George Christian is served with a so-called “National Security Letter” (NSL) from the FBI demanding that his firm turn over private information on its patrons because of an apparent terrorist threat e-mailed from one of his libraries (see February 2005). Christian is the executive director of Library Connection, Inc., which manages catalog information, patron records, and circulation information for 27 libraries in and around Hartford, Connecticut, as well as providing telecommunications services to many of its member libraries. Christian is given the NSL, as well as a gag order preventing them from ever mentioning their receipt of the letter, or any details surrounding it. Christian is notified of the letter five days before actually receiving it; he spends those days frantically learning more about NSLs and the laws surrounding them (see October 25, 2005). He learns that a district court in New York had found the entire NSL statute unconstitutional because of what Christian calls “prima facie violations of the 1st, 4th and 5th amendments.” By the time they receive the letter, he has decided to oppose it. The letter, delivered by two FBI agents, orders Christian and Library Connection to turn over information about a specific IP address registered to the firm. One of the agents warns Christian that the gag order prohibits anyone in the firm from telling anyone that the FBI is attempting to secure information from its library business records. Christian, who will testify before the Senate Judiciary Committee about the NSL in April 2007 (see April 11, 2007), says neither he nor his colleagues could “fathom any ‘exigent’ nature for the FBI request.” The letter was dated May 19, nearly two months before its delivery, was not addressed to Christian, and requested information from the use of the IP address five months earlier, February 15. Christian later says that while he and his colleagues want to assist the FBI in any way they can, and have no desire to “impede the investigation of a perilous situation that endanger[s] my country or my fellow citizens,” because of the date of the letter and the IP usage, they conclude that the FBI has not been in any rush to get the information. Christian tells the FBI agents that he believes the use of NSLs is unconstitutional and that he will consult his attorney. Library Connection’s attorney says that the only way to contest compliance with an NSL is to take the Attorney General, Alberto Gonzales, to court. Christian is understandably reluctant to involve his firm in such a court challenge without authorization, and takes the case to the Executive Committee of the firm’s board of directors. The three members, Barbara Bailey, Peter Chase, and Janet Nocek (who will soon be dubbed the “Connecticut Four” by the media), after conferring with the attorney and reviewing the New York court’s decision against NSLs, decide to go forward with the complaint. They secure representation from the American Civil Liberties Union (ACLU). Together, they decide to ask for relief from the NSL, to seek a broader ruling that the use of NSLs is unconstitutional, and to have the gag order lifted so they can publicly discuss the incident as “part of the national debate over renewal of the Patriot Act” (see March 9, 2006). Christian will tell the Senate Judiciary Committee, “We… felt we were defending our democracy by insisting that the checks and balances established in the Constitution be observed. We had no court order, and there was no evidence that an independent judge had examined the FBI’s evidence and found there to be probable cause justifying their request for information.… [W]e did not want to aid terrorists or criminals.… But we did not feel we would be helping the country or making anyone safer by throwing out the Constitution either.” Because of the way the computer system is set up, to give the FBI the information about the specific IP address and usage it required, Christian would have to give the FBI information about everyone using every computer in the particular library on the day in question. He later says, “[S]ince there was no way of determining who was using the computers in the library five months after the fact, we felt that [the FBI wanted] information we had on all the patrons of that library. That seemed like a rather sweeping request. Some would call it a fishing expedition.” The case goes to trial in August 2005 (see August 2005-May 2006). [Senate Judiciary Committee, 4/11/2007] It is later learned that the original e-mailed threat is a hoax. [USA Today, 7/6/2006]

Entity Tags: Peter Chase, National Security Letters, Senate Judiciary Committee, Library Connection, Inc., Barbara Bailey, George Christian, American Civil Liberties Union, Janet Nocek, Alberto R. Gonzales, Federal Bureau of Investigation, Connecticut Four

Timeline Tags: Civil Liberties

The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey.The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey. [Source: Robert Deutsch/ USA Today]A case filed against Attorney General Alberto Gonzales by four plaintiffs from Connecticut’s Library Connection, Inc.—George Christian, Barbara Bailey, Peter Chase, and Janet Nocek—goes to trial in federal district court (see July 13, 2005). The trial is filed as Doe v. Gonzales because the government has filed a gag order against the plaintiffs forbidding them from identifying themselves or discussing the case publicly. The case involves a demand for information from the FBI for information concerning library usage by patrons of a Connecticut library; the four plaintiffs, on behalf of their data management firm Library Connection, have refused. The case revolves around the use of a National Security Letter (NSL) by the FBI; the plaintiffs, with support from the American Civil Liberties Union, want the NSL voided, the gag order lifted, and such use of NSLs found unconstitutional. Christian and his three colleagues are not allowed to attend the hearings in person because of the possibility that they might be identified as the plaintiffs; they are forced to watch the proceedings on a closed-circuit broadcast from a locked room in the Hartford courthouse. When the judge in the proceeding asks to review the government’s evidence for keeping the gag rule in place, Justice Department lawyers insist on submitting secret evidence directly to the judge, without providing that evidence to the plaintiff’s lawyers. The judge is not pleased, and rules, as did her predecessor in New York, that a perpetual gag order amounts to prior restraint, and thereby is unconstitutional. She adds that her review of the secret evidence gives no national security rationale for keeping the plaintiffs gagged. The Justice Department immediately appeals the ruling, and the plaintiffs stay silent and gagged. While the four plaintiffs remain silent about the NSL and the court case, the Justice Department’s primary lawyer, Kevin O’Conner, does not: O’Conner has frequently debated one of the plaintiffs, Chase, about the Patriot Act, and though Chase is now required to remain silent, O’Conner continues to make frequent public appearances touting the Patriot Act. Christian later says, in 2007 testimony before the Senate Judiciary Committee (see April 11, 2007), that the continuing gag order causes the four “John Does” considerable professional and personal distress, especially after the national media begins reporting the story. The media eventually learns, through the careless redaction of information by government lawyers, of Chase’s identity as one of the four plaintiffs, and reveals that Library Connection is the firm involved in the lawsuit. Christian’s name comes to light shortly thereafter. The attorneys warn Christian and the others that even though their identities and their firm have been revealed, they still cannot comment at all on the case. Christian, for one, wants to testify before Congress in regards to the upcoming reauthorization of the Patriot Act (see March 9, 2006), but cannot. The four plaintiffs quickly become known in the media as the “Connecticut John Does” or the “Connecticut Four.”
Appeals Court - In November 2005, a New York court of appeals hears the case. Christian and his colleagues are allowed to be present at the case this time, but are required to conceal their identities by entering and leaving the court building separately, are not allowed to sit together, and are not allowed to confer with, or even make eye contact with, each other or their attorneys. The Justice Department lawyers argue that even revealing themselves as recipients of a NSL would violate national security, an argument refuted by submission of the raft of news articles identifying Christian, Chase, and Library Connection. The government argues that those news reports don’t matter because no one in Connecticut reads the primary newspaper carrying the story, the New York Times, and that surveys prove that most people don’t believe what they read in the news anyway. The Justice Department also tries to get the news articles to be kept under seal in court papers. Christian characterizes the entire proceeding as “absurd.” The court refuses to admit the plaintiff’s claim that 48 states, including Connecticut, have laws protecting the privacy of library patrons, but does admit into evidence the claims by Gonzales that there is no statutory justification for claims of privacy. In an attempt to get the gag order lifted before the Patriot Act reauthorization, the plaintiff’s attorneys make an emergency appeal directly to the Supreme Court, but are rebuffed. [Senate Judiciary Committee, 4/11/2007] In June 2006, Nocek tells a reporter, “Imagine the government came to you with an order demanding that you compromise your professional and personal principles. Imagine then being permanently gagged from speaking to your friends, your family or your colleagues about this wrenching experience.… Under the Patriot Act, the FBI demanded Internet and library records without showing any evidence or suspicion of wrongdoing to a court of law. We were barred from speaking to anyone about the matter and we were even taking a risk by consulting with lawyers.” [Interview: George Christian, 6/2/2006]
Gag Order Lifted, Case Dropped - Weeks after President Bush signs into law the Patriot Act reauthorization (see March 9, 2006), the FBI voluntarily lifts the gag order without waiting for a court order. The agency then tries to get the original ruling against the gag order vacated, an attempt that the appeals court refuses. The appellate judges are clearly disturbed by the breadth of the NSL gag provisions; one appellate judge writes, “A ban on speech and a shroud of secrecy in perpetuity are antithetical to democratic concepts and do not fit comfortably with the fundamental rights guaranteed American citizens… Unending secrecy of actions taken by government officials may also serve as a cover for possible official misconduct and/or incompetence.” The appeals court refers the case back to district court, allowing the original opinion to stand. Weeks later, the FBI withdraws its NSL, saying that it no longer needs the information it originally requested. Christian later testifies, “In doing so, they removed the Patriot Act from the danger of court review.” Christian later says that he believes the entire procedure was managed as an attempt to prevent the case from becoming public knowledge before Congress could vote on the reauthorization of the Patriot Act. [Senate Judiciary Committee, 4/11/2007]

Entity Tags: Peter Chase, Senate Judiciary Committee, National Security Letters, US Department of Justice, Library Connection, Inc., George Christian, George W. Bush, American Civil Liberties Union, Barbara Bailey, Connecticut Four, Alberto R. Gonzales, Federal Bureau of Investigation, Kevin O’Conner

Timeline Tags: Civil Liberties

Lawyers for Sibel Edmonds file a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urges the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. In May, the federal appeals court had closed the courtroom to the public and media. Edmonds’ lawyers include the American Civil Liberties Union and Mark Zaid of Krieger and Zaid, PLLC. If the Supreme Court rules in favor of Edmonds, she will return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 pdf file; Government Executive, 8/8/2005]

Entity Tags: US Supreme Court, American Civil Liberties Union, Mark Zaid

Timeline Tags: Complete 911 Timeline

Brett Tolman.Brett Tolman. [Source: ABC4 (.com)]Brett Tolman, a Republican Senate Judiciary Committee official, tells Assistant Attorney General William Moschella that he will perform a “comprehensive fix” to the USA Patriot Act reauthorization coming up for approval in Congress (see March 9, 2006). Tolman and Moschella are referring to a provision in the reauthorization legislation that would allow the attorney general to appoint interim US Attorneys on an indefinite basis without having them go through Senate confirmation, and remove the ability of a federal court to appoint a US Attorney (see July 2005 - March 2006). Moschella suggests Tolman use the “comprehensive fix” of repealing Section 546 of Title 28 of the United States Code, subsections C and D, and replacing them with the following language: “A person appointed as United States Attorney under this section may serve until the qualification of a United States Attorney for such district appointed by the president under section 541 of this title.” Late the same evening, Tolman receives an email from Moschella instructing him to quietly insert the provision in the USA Patriot Act reauthorization bill that would eliminate a 120-day limit for “interim” US Attorneys to serve without Senate confirmation. In essence, the provision would allow such “interims” to serve indefinitely, cutting the Senate entirely out of the process of naming US Attorneys and allowing the attorney general to make political appointments without oversight. Tolman replies, “I will get the comprehensive fix done.” He slips the provision into a draft of the bill while it is in conference committee. None of the members notice the provision, and it is part of the bill as signed into law in March 2006 (see March 9, 2006). Tolman himself is one of the first beneficiaries of the new provision, becoming the US Attorney for Utah. When the new provision comes to light in early 2007, both chambers of Congress vote overwhelmingly to repeal it. This is one of numerous “stealth provisions” the White House will have inserted into legislation with the help of compliant Congressional Republicans and staffers. [Savage, 2007, pp. 316; US Department of Justice, 3/23/2007 pdf file] Moschella will later take the credit for the provision, and will tell reporters that he made the change on behalf of the Justice Department “without the knowledge or coordination of his superiors at the Justice Department or anyone at the White House.” [Talking Points Memo, 2011]

Entity Tags: William E. Moschella, USA Patriot Act, Senate Judiciary Committee, Bush administration (43), Brett Tolman, US Department of Justice

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales sends a letter to a federal judge in Montana, assuring him that US Attorney William W. Mercer is not violating federal law by spending almost all of his time in Washington as a temporary Justice Department official. The same day, Mercer has a Republican Senate staffer insert language into the USA Patriot reauthorization bill (see March 9, 2006) that would retroactively change the rules and allow federal prosecutors such as himself to live outside their districts and serve in other positions. Congress will include the language in the bill when it passes the legislation. Mercer and a small number of other Justice Department employees are the only ones to benefit from the provision. In 2007, when the provision is revealed to the public, Justice Department officials will say the provision was necessary to ensure that prosecutors such as Mercer could fill temporary positions in Washington, Iraq, and elsewhere. Critics will accuse Gonzales of being, in the Washington Post’s words, “less than truthful” about the actions of himself, his staff, and the White House. The question surrounding Mercer involves residency. Mercer is the US Attorney for Montana, appointed in 2001. In June 2005, he was appointed to serve as principal associate deputy attorney general, at Gonzales’s request. US District Chief Judge Donald W. Molloy of Billings has become increasingly irked at Mercer’s absence from Montana for the last two years. In October, Molloy wrote Gonzales to say that Mercer was violating federal law because he “no longer resides in Montana” and was living with his family in the Washington area. Gonzales replies three weeks later to tell Molloy that Mercer “is in compliance with the residency requirement” under federal law because he “is domiciled there, returns there on a regular basis, and will live there full-time as soon as his temporary assignment is completed.” At the same time Gonzales writes Molloy, Mercer has a Senate staffer, Brett Tolman, insert the provision into the Patriot Act legislation. Tolman is the counsel for Senator Arlen Specter (R-PA), chairman of the Senate Judiciary Committee. Tolman will later be named the US Attorney for Utah. Specter’s office will characterize the provision as “unremarkable” and aboveboard. Mercer currently serves as acting associate attorney general and has been nominated for the position on a permanent basis. He spends only about three days a month in Montana and delegates almost all of his duties as US Attorney to underlings. [ePluribus Media, 3/26/2007; Washington Post, 5/2/2007] Mercer will be nominated to serve as associate attorney general, the third-highest position in the Justice Department, in September 2006. He will not be confirmed for the position by the Senate, as confirmation would require his leaving the position of US Attorney. In June 2007, Mercer will resign from the associate attorney general position, retaining his position as US Attorney for Montana (see June 22, 2007). [ePluribus Media, 3/26/2007; Washington Post, 6/22/2007]

Entity Tags: Donald W. Molloy, Alberto R. Gonzales, Brett Tolman, Washington Post, Arlen Specter, Senate Judiciary Committee, William W. Mercer, US Department of Justice

Timeline Tags: Civil Liberties

The Supreme Court declines, without comment, to hear the case (see August 4, 2005) brought by former FBI translator Sibel Edmonds. [New York Times, 11/28/2005; Reuters, 11/28/2005] The decision puts an end to Edmonds’ legal efforts to hold the bureau accountable for its failure to address several security issues raised by Edmonds in late 2001 and early 2002 (see December 2, 2001 and Afternoon February 12, 2002, respectively). On August 4, Edmonds had filed a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urged the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. (In May, the federal appeals court had closed the courtroom to the public and media.) Had the Supreme Court had ruled in favor of Edmonds, she would have been able to return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 pdf file; Government Executive, 8/8/2005]

Entity Tags: US Supreme Court, Sibel Edmonds

Timeline Tags: Complete 911 Timeline

Supreme Court Chief Justice John Roberts (see September 29, 2005) has his first opportunity to name a judge to the secret Foreign Intelligence Surveillance Court. Judge James Robertson has resigned from the court in protest of the administration’s warrantless wiretapping program (see December 21, 2005). Roberts chooses as his replacement Judge Robert Bates, who voted to dismiss the General Accounting Office’s lawsuit attempting to force Vice President Cheney to release documents surrounding his energy task force (see May 10, 2005). [Savage, 2007, pp. 262]

Entity Tags: John G. Roberts, Jr, Robert Bates, Foreign Intelligence Surveillance Court, US Supreme Court, James Robertson

Timeline Tags: Civil Liberties

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, AT&T, George W. Bush, USA Patriot Act, National Security Agency

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

During a press conference, President Bush is asked if he will order an investigation into the leak that revealed the NSA’s domestic surveillance program (see December 15, 2005). Bush says he has not directly ordered an investigation, presuming the Justice Department is handling the matter, but he calls the leak “a shameful act for someone to disclose this very important program in a time of war.” And he implies that the leak, and the New York Times’s decision to print the resulting article, is treason: “The fact that we’re discussing this program is helping the enemy.… But it is a shameful act by somebody who has got secrets of the United States government and feels like they need to disclose them publicly.” When asked why he “skip[ped] the basic safeguards of asking courts for permission for the intercepts,” he answers: “[R]ight after September the 11th, I knew we were fighting a different kind of war. And so I asked people in my administration to analyze how best for me and our government to do the job people expect us to do, which is to detect and prevent a possible attack. That’s what the American people want. We looked at the possible scenarios. And the people responsible for helping us protect and defend came forth with the current program, because it enables us to move faster and quicker. And that’s important. We’ve got to be fast on our feet, quick to detect and prevent. We use FISA still—you’re referring to the FISA court in your question—of course, we use FISAs. But FISA is for long-term monitoring. What is needed in order to protect the American people is the ability to move quickly to detect. Now, having suggested this idea, I then, obviously, went to the question, is it legal to do so? I am—I swore to uphold the laws. Do I have the legal authority to do this? And the answer is, absolutely.… [T]he legal authority is derived from the Constitution, as well as the authorization of force by the United States Congress” (see September 14-18, 2001). A reporter asks why “has your administration not sought to get changes in the law instead of bypassing it, as some of your critics have said?” Bush responds by reiterating the point that the program is “limited in nature to those that are known al-Qaeda ties and/or affiliates.” He then reiterates another point: he believes he has the authority to bypass the law. He “share[s] the same concerns” about civil liberties that members of Congress have expressed (see December 16, 2005).” However, his reassurances that domestic calls are not being monitored are not absolute. “[I]f you’re calling from Houston to [Los Angeles], that call is not monitored. And if there was ever any need to monitor, there would be a process to do that.” He is asked: “You say you have an obligation to protect us. Then why not monitor those calls between Houston and LA? If the threat is so great, and you use the same logic, why not monitor those calls? Americans thought they weren’t being spied on in calls overseas—why not within the country, if the threat is so great?” Bush replies: “We will, under current law, if we have to. We will monitor those calls. And that’s why there is a FISA law. We will apply for the right to do so. And there’s a difference—let me finish—there is a difference between detecting so we can prevent, and monitoring. And it’s important to know the distinction between the two.” He concludes, “I just want to assure the American people that, one, I’ve got the authority to do this; two, it is a necessary part of my job to protect you; and, three, we’re guarding your civil liberties.” [White House, 12/19/2005]

Entity Tags: US Department of Justice, George W. Bush, New York Times, National Security Agency

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Judge James Robertson.Judge James Robertson. [Source: US Courts.gov]US District Judge James Robertson resigns from the Foreign Intelligence Surveillance Court (FISC), a special, secret court set up to oversee government surveillance operations. Robertson refuses to comment on his resignation from FISC, but two of Robertson’s associates say that Robertson’s resignation stems from his deep concerns that the NSA’s warrantless domestic wiretapping program (see Early 2002) is not legal, and has tainted the work of the court. Robertson, formerly one of ten “revolving” members of FISC who periodically rotate in and out of duty on the court, continues to serve as a Washington, DC district judge. Colleagues of Robertson say that he is concerned that information gained from the warrantless surveillance under Bush’s program subsequently could have been used to obtain warrants under the FISA program, a practice specifically prohibited by the court. Robertson, a Clinton appointee selected for FISC by Chief Justice William Rehnquist, has also been critical of the Bush administration’s treatment of detainees at the Guantanamo Bay prison camp, and recently issued a decision that sidetracked Bush’s use of military tribunals for some Guantanamo detainees (see November 8, 2004). Even though Robertson was hand-picked for FISC by the deeply conservative Rehnquist, who expressly selected judges who took an expansive view of wiretapping and other surveillance programs, [Associated Press, 12/21/2005] some conservative critics such as Jim Kouri, a vice-president of the National Association of Chiefs of Police, call Robertson a “left-leaning, liberal” “Clintonista” jurist with ties to “ultra-liberal” civil rights associations and a desire for media attention (though Robertson has refused to speak to the press about his resignation). Critics also demand that less attention be directed at the NSA wiretapping program and more on finding out who leaked the information that led to the New York Times’s recent revelatory articles on the program (see Early 2002). GOP strategist Mike Baker says in response to Robertson’s resignation, “Only the Democrats make confirmations and appointments of people by Republican President [sic] a question of ideology. The news media try to portray [Robertson] as non-partisan. He’s as liberal as they come and as partisan as they come.” [Men's News, 12/23/2005] Presiding judge Colleen Kollar-Kotelly is arranging for a classified briefing of all the remaining FISC judges on the wiretapping program, partly in order to bring any doubts harbored by other justices into the open. Sources say Kollar-Kotelly expects top NSA and Justice Department officials to outline the program for the judges. No one on FISC except for Kollar-Kotelly and her predecessor, Judge Royce Lambeth, have ever been briefed on the program. If the judges are not satisfied with the information provided in this briefing, they could take action, which could include anything from demanding proof from the Justice Department that previous wiretaps were not tainted, could refuse to issue warrants based on secretly-obtained evidence, or, conceivably, could disband the entire court, especially in light of Bush’s recent suggestions that he has the power to bypass the court if he so desires. [Washington Post, 12/22/2005]

Entity Tags: US Department of Justice, Royce Lambeth, William Rehnquist, National Security Agency, Jim Kouri, Mike Baker, Foreign Intelligence Surveillance Court, George W. Bush, James Robertson, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales testifies before the Senate Judiciary Committee that the new “reasonable belief” standard for wiretaps is just another term for “probable cause.” Gonzales’s claim is legally false. The difference between the two standards is significant: while administration officials must present relatively compelling evidence that a US citizen has ties to US-designated terrorist organizations or is involved in terror plots to meet the “probable cause” standard for authorizing electronic surveillance, the “reasonable belief” standard is far more lenient. Gonzales also repeats for the committee President Bush’s claims that the Foreign Intelligence Surveillance Court (FISC) isn’t “agile” or “nimble” enough to assist the Justice Department and the US intelligence community in finding and arresting terrorists, a claim that FISC judges find baffling. FISC routinely approves almost all warrant requests, and FISA allows the government to conduct surveillance for 72 hours before even applying for a warrant. Additionally, FISC has consistently worked with the government to expedite requests and streamline the warrant-issuance procedure. For example, in March 2002, when the FBI and Pakistani police arrested al-Qaeda operative Abu Zubaida, agents found that almost all of Zubaida’s contacts were already being monitored under FISA warrants or through international surveillance efforts (see March 28, 2002). One government official says that the Zubaida discovery gave them “some comfort” that surveillance efforts were working as needed. [Washington Post, 2/9/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Abu Zubaida, Al-Qaeda, Alberto R. Gonzales, US Department of Justice, Senate Judiciary Committee

Timeline Tags: Civil Liberties

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

John Yoo’s ‘The Powers of War and Peace.’John Yoo’s ‘The Powers of War and Peace.’ [Source: University of Maryland]Libertarian law professor Cass Sunstein reviews a recent book by former Bush legal adviser John Yoo, who authored several of the Bush administration’s most controversial legal opinions concerning terrorism and executive power (see September 21, 2001, September 25, 2001, September 25, 2001, October 4, 2001, October 23, 2001, October 23, 2001, November 2, 2001, November 6-10, 2001, November 15, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24, 2002, January 24-26, 2002, March 13, 2002, April 8, 2002, June 27, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and October 11, 2002). Yoo’s book, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11, is a compendium of his pre-9/11 academic writings that landed him his job at the Justice Department’s Office of Legal Counsel. Sunstein notes that Yoo, perhaps more than any other single legal scholar, has reshaped the government’s legal stance on any number of issues. He argued for the president’s unilateral ability to declare war without the approval of Congress, the use of “enhanced interrogation techniques” on suspected terrorists, the withdrawal of essential civil liberties and legal rights from suspected terrorists and enemy collaborators, the right of the administration to electronically eavesdrop on the American citizenry without judicial consent or oversight, the ability to ignore or withdraw from international treaties without congressional approval, and more besides. Sunstein writes: “[T]aken as a whole, the claims of the Bush administration may be properly regarded as an effort to create a distinctive set of constitutional understandings for the post-September 11 era. The White House is attempting to create a kind of 9/11 Constitution. A defining feature of these understandings is a strong commitment to inherent presidential authority over national security, including a belief that in crucial domains the president can act without congressional permission, and indeed cannot be checked by congressional prohibitions.” Yoo is a key figure in that effort. Sunstein calls his work interesting but completely one-sided, simply ignoring “the mountainous counter-evidence” against most of his constitutional claims. “Yoo’s reading would require us to ignore far too many statements by prominent figures in the founding generation,” Sunstein writes. “There are not many issues on which James Madison, Thomas Jefferson, John Marshall, Alexander Hamilton, George Washington, James Wilson, John Adams, and Pierce Butler can be said to agree. Were all of them wrong?” Sunstein concludes: “[W]ith respect to war, there is no reason for a 9/11 Constitution. The old one, read in the light of our traditions, will do just fine.” [New Republic, 1/9/2006; Savage, 2007, pp. 81-82]

Entity Tags: Bush administration (43), Office of Legal Counsel (DOJ), John C. Yoo, Cass Sunstein

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” [Dean, 2006, pp. 170-171; Talking Points Memo, 1/17/2006]

Entity Tags: Albert Arnold (“Al”) Gore, Jr., George W. Bush, Joshua Micah Marshall

Timeline Tags: Civil Liberties

A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” [US House of Representatives, 1/4/2006; Congressional Research Service, 1/18/2006 pdf file; Washington Post, 1/19/2006] The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. [Washington Post, 1/20/2006] On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).

Entity Tags: Jane Harman, John D. Rockefeller, National Security Agency, National Security Act, Richard (“Dick”) Cheney, Michael Hayden, House Intelligence Committee, George W. Bush, Dana Perino, “Gang of Eight”, Alberto R. Gonzales, Harry Reid, Congressional Research Service, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

Current and former National Security Agency (NSA) employees say that the agency often retaliates against whistleblowers by labeling them “delusional,” “paranoid,” or “psychotic.” They say such labeling protects powerful superiors who might be incriminated by potentially criminal evidence provided by such whistleblowers, and helps to keep employees in line through fear and intimidation. One NSA whistleblower, former intelligence analyst Russell Tice, is currently the victim of such agency allegations. Tice, along with three other former analysts, Diane Ring, Thomas Reinbold, and another analyst who wishes to remain anonymous, make the allegations of unfounded psychological labeling by the agency; their allegations are corroborated by a current NSA officer who also wishes to remain anonymous. [Cybercast News Service, 1/25/2006]
Identifying a Potential Spy - Tice, a former signals intelligence (SIGINT) officer, is the first NSA whistleblower to capture the media’s attention, when in 2004, the Pentagon investigated possible NSA retaliation against him. In 2001, Tice reported that a co-worker at the Pentagon’s Defense Intelligence Agency (DIA) was possibly engaged in espionage for China, possibly connected to California Republican official and Chinese double agent Katrina Leung. [Democracy Now!, 1/3/2006; Cybercast News Service, 1/25/2006] Tice says, “I saw all the classic signs” in the DIA employee. After transferring to the NSA in November 2002, he reported his concerns again, this time adding criticisms of incompetence for the FBI, who in Tice’s view failed to properly investigate his allegations. Instead, Tice was ordered by NSA Security to undergo psychiatric evaluation. He was labeled “paranoid” and “psychotic” by NSA forensic psychologist Dr. John Michael Schmidt; Tice lost his top-secret security clearance as a result. [Cybercast News Service, 1/25/2006]
Fired - He was fired from the NSA in 2005 after spending his last years at the agency pumping gas and working in an agency warehouse. “I reported my suspicion and got blown off,” he says. “I pushed the issue and that ticked them off, the fact that I questioned their almighty wisdom.” [Cox News Service, 5/5/2005] Tice again made news on January 10, 2006 (see January 10, 2006), when he admitted to being a source for the New York Times’s article about a secret NSA electronic surveillance program against American citizens, a program carried out in the name of combating terrrorism. [ABC News, 1/10/2006]
No Evidence of Mental Instability - As for Tice’s own psychological evaluation by Schmidt, according to three other clinical psychologists, there is “no evidence” of either of the disorders in Tice’s mental makeup. And another NSA psychologist pronounced Tice mentally sound in 2002, though having a “somewhat rigid approach to situations.” Tice is described by five retired NSA and intelligence officials as “congenial,” “enthusiastic,” and “a scholar of high intellectual rigor [with] sound judgment [and] unparalleled professionalism.” Tice says of the NSA’s attempts to smear whistleblowers with apparently baseless psychological allegations, “This nonsense has to stop. It’s like Soviet-era torture. These people are vicious and sadistic. They’re destroying the lives of good people, and defrauding the public of good analysts and linguists.” But it has been effective in cowing others who were, in Tice’s words, “too afraid or ashamed to come forward.” [Cybercast News Service, 1/25/2006]
Further Allegations - Another former analyst, now employed by another federal agency and who only allows himself to be identified as “J,” describes similar targeting by the NSA. J is fluent in an unusually high number of languages, and is described by former colleagues as “brilliant” and possessed of “amazing” critical skills. “I believe the abuse is very widespread,” J says. “The targeted person suddenly is described as ‘not being a team player,’ as ‘disgruntled,’ and then they’re accused of all sorts of bizarre things. Soon they’re sent to the psych people.” J himself was targeted in September 1993 (see September 11, 1993) when he and other analysts concluded that the United States was being targeted by Islamic terrorists, and then again in early 2001 after predicting a terrorist attack using planes as weapons (see May 2001).
NSA Like the 'Gestapo' - A third whistleblower, a current NSA officer who refuses to be identified, confirms the allegations and says that baseless psychiatric allegations as a form of retaliation are “commonplace” at the agency. He says, “A lot of people who work there are going through the same thing. People live in fear here. They run it like some kind of Gestapo.” Those identified as “problems” are “yelled at, badgered and abused.…These are really good people, who start to be labeled crazy, but they’re telling the truth.” The official adds that the NSA often plants false evidence in personnel files as part of the intimidation campaign. Tice says the NSA maintains what he calls a “dirt database” of inconsequential but potentially embarrassing information on employees, gathered during routine clearance investigations and used as a form of leverage. The current officer says that an “underground network” has developed to discuss these issues. “It’s like the Nazis have taken over,” he says. [Cybercast News Service, 1/25/2006]
Personal Vendettas - Diane Ring is another former NSA official targeted by her superiors. Unlike Tice, a self-described conservative who believes President Bush should be impeached over the NSA’s illegal wiretapping program, Ring is a Bush supporter who believes the surveillance program is entirely proper. Ring, a former NSA computer scientist, says she was ordered to undergo psychiatric evaluations after coming into conflict with a colonel at the Pentagon. Ring is not a whistleblower per se like the others, but says she was targeted for retaliation because of a personal vendetta against her. The colonel “blew up” at Ring after she missed a meeting and explained that her branch chief had her working on a classified program that took priority over the meeting. Ring also was evaluated by Dr. Schmidt. When she complained about the apparent retaliation, her security clearance was, like Tice’s, revoked, and she was “red-badged,” or put on restricted access within the NSA offices. Ring says she received an excellent job evaluation just three months prior to the actions taken against her. She says her colleagues at the time were told not to talk to her, and she was restricted to working in a room filled with other red-badgers. She thinks she was isolated as part of an intentional campaign to force her to leave the agency. “They had these red-badgers spread out all over the place.” she recalls. “Some were sent to pump gas in the motor pool and chauffeur people around. In our room, some people brought sleeping bags in and slept all day long. Others read. I would think that would incense the taxpaying public.” Schmidt eventually reported that another doctor diagnosed Ring with a “personality disorder,” but Ring has a July 21, 2005 letter from that doctor, Lawrence Breslau, which reads in part, “On mental status examination including cognitive assessment she performs extremely well.” In the letter, Breslau says he never made such a diagnosis. She, like others in her position, went to the NSA Employee Assistance Service (EAS) for confidential counseling, but the current NSA officer says that though those sessions are supposed to be confidential, NSA officials can and do obtain “confidential” sessions for retaliatory purposes. “Their goal is to freak you out, to get inside your mind,” that officer says. Rice claims that NSA General Counsel Paul Caminos lied about her case before a judge, denying that he had sent an internal e-mail forbidding anyone from supporting Ring. Ring says she was “floored” by Caminos’s actions: “I served in Bosnia. We had mines going off all around us, all day long. That was nothing compared to this.” She is currently working on clearing her name with the NSA’s new director, Lieutenant General Keith Alexander. Ring believes that the problem at NSA involves a small number of people, “The whole lot of them is corrupt though. There is zero integrity in the process. And zero accountability.”
'Psychiatric Abuse' 'Very Widespread' - Like his fellow whistleblowers, former NSA officer Thomas Reinbold says the practice of “psychiatric abuse” inside the NSA is “very widespread.” Reinbold, who recelved 26 commendations and awards during his career at the NSA, including a medal for the intelligence he provided during the 1991 Gulf War, says, “They call it ‘doing a mental’ on someone.” Such practices have a “chilling effect” on other potential whistleblowers: “They fear for their careers because they fear someone will write up bad [psychological] fitness reports on them.” Reinhold was labeled “paranoid” and “delusional” by Schmidt after he complained to an inspector general on February 25, 1994, that the federal government was guilty of contract tampering; Schmidt’s evaluation contradicts a psychological evaluation he conducted on Reinbold eight months before that found he was mentally sound. At the time, Reinbold worked as a contracting officer representative for the Naval Security Group (NAVSECGRU) in Virginia. Reinbold had his high-level security clearance revoked, and was escorted off the grounds by armed security officers. Reinbold says NSA officials fabricated evidence in his personnel file to force him out; that evidence included allegations that he was a danger to himself and others, and that he had said “if [he] was going down, [he] would take everyone with him.” In September 1995, an administrative hearing found that the revocation of Reinbold’s security clearance was unjustified and recommended restoring his clearance, but did not allow the damaging information to be removed from his personnel file. He later sued the agency, and then retired because of diabetes. “I gave 29 years of my life to the intelligence community,” he recalls. “They couldn’t get me out the door fast enough. There are very good people, getting screwed and going through hell.”
Helping Those Who Come After - Some of the whistleblowers hope to gain the assistance of politicians to help their cases. But Tice is less optimistic. “Our time is over,” Tice says he told Ring. “But we can make a difference for those who come behind us.” The five whistleblowers have the support of the whistleblower advocacy group Integrity International. Its founder and director, Dr. Don Soeken, himself a whistleblower while he was with the US Public Health Service in the 1970s, says, “When this retaliation first starts, there’s a tendency by bosses to use code words like ‘delusional,’ ‘paranoid’ and ‘disgruntled’. Then they use psychiatric exams to destroy them. They kill the messenger and hope the PR spin will be bought by the public.” Tom Devine of the Government Accountability Project says that “psychiatric retaliation” is a knee-jerk reaction against whistleblowers: “It’s a classic way to implement the first rule of retaliation: shift the spotlight from the message to the messenger. We call it the ‘Smokescreen Syndrome.’” Superiors investigate and smear the whistleblower for anything from financial irregularities to family problems, sexual practices, bad driving records, or even failure to return library books, Devine says. “It’s a form of abuse of power.” The Whistleblower Protection Act was written to protect those like Tice, Ring, Reinbold, and Soeken, but, says Beth Daly of the Project on Government Oversight (POGO), the act has serious flaws. “You have to go through the inspector general or the director of the CIA to let them know if you’re going to Congress and what you’re going to disclose,” she says. “And inspector generals are notorious for revealing who whistleblowers are.”

Entity Tags: Paul Caminos, Project for Government Oversight, Naval Security Group, Russell Tice, Tom Devine, Thomas Reinbold, National Security Agency, US Public Health Service, Keith Alexander, Lawrence Breslau, Diane Ring, Defense Intelligence Agency, Beth Daly, Don Soeken, House National Security Subcommittee, Government Accountability Project, John Michael Schmidt, Integrity International, “J”

Timeline Tags: Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

Electronic Frontier Foundation logo.Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Entity Tags: Electronic Frontier Foundation, Foreign Intelligence Surveillance Act, National Security Agency, AT&T, US Department of Justice, Kevin Bankston

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Entity Tags: US Department of Justice, Tasia Scolinos, H. Marshall Jarrett, National Security Agency, George W. Bush, Bush administration (43), Maurice Hinchey, Office of Professional Responsibility

Timeline Tags: Civil Liberties

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]

Entity Tags: Jeff Jonas, Foreign Intelligence Surveillance Act, Bush administration (43), James W. Pennebaker, Mark Klein, National Security Agency, Washington Post

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). [United Press International, 2/14/2006] Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” [In These Times, 5/15/2006]

Entity Tags: Russell Tice, Christopher Shays, Dennis Kucinich, House Armed Services Committee, James Bamford, House Government Reform Subcommittee on National Security, Emerging Threats and International Relations

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales says he will sharply limit the testimony of former attorney general John Ashcroft and former deputy attorney general James Comey before the Senate Judiciary Committee. The committee is preparing for hearings on the warrantless wiretapping program authorized by President Bush several months after the 9/11 attacks (see Early 2002). Gonzales says that “privilege issues” will circumscribe both men’s testimony: “As a general matter, we would not be disclosing internal deliberations, internal recommendations. That’s not something we’d do as a general matter, whether or not you’re a current member of the administration or a former member of the administration.” He adds, “You have to wonder what could Messrs. Comey and Ashcroft add to the discussion.” Comey was an observer to the late-night visit by Gonzales and then-White House chief of staff Andrew Card to Ashcroft’s hospital room, where Gonzales and Card unsuccessfully attempted to persuade the heavily sedated Ashcroft to reauthorize the program after Comey, as acting attorney general, determined the program was likely illegal (see March 10-12, 2004). Committee chairman Arlen Specter (R-PA) says he has asked Gonzales for permission to call Comey and Ashcroft to testify, but has not yet received an answer. Specter says, “I’m not asking about internal memoranda or any internal discussions or any of those kind of documents which would have a chilling effect.” Specter will ask Ashcroft and Comey to talk about the legal issues at play in the case, including the events surrounding the hospital visit. In the House Judiciary Committee, Republicans block an attempt by Democrats to ask Gonzales to provide legal opinions and other documents related to the program. [Washington Post, 2/16/2006]

Entity Tags: Andrew Card, Alberto R. Gonzales, Arlen Specter, George W. Bush, John Ashcroft, House Judiciary Committee, James B. Comey Jr., Senate Judiciary Committee

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]

Entity Tags: Senate Judiciary Committee, Bruce Fein, Arlen Specter, Bush administration (43), Pat Roberts, Douglas Kmiec, Mike DeWine, John D. Rockefeller, Senate Intelligence Committee

Timeline Tags: Civil Liberties

President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]

Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Responding to President Bush’s signing statement indicating that he will not comply with several oversight provisions in the USA Patriot Act reauthorization (see March 9, 2006), House members Jane Harman (D-CA) and John Conyers (D-MI) write to Attorney General Alberto Gonzales asking that the administration rescind the statement. They write, “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the President does. As Article 1, Section 7, of the Constitution states: ‘Every Bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’ If the President does not like part of a bill, he has only one option: to veto the entire thing. This signing statement, and many of the 107 similar statements the President has issued on other legislation, have the effect of corrupting the legislative process. Indeed, during consideration of this matter, many Members who supported the final law did so based upon the guarantee of additional reporting and oversight. This Administration cannot, after the fact, unilaterally repeal provisions of the law implementing such oversight.” [US House of Representatives, 3/29/2006]

Entity Tags: Jane Harman, Alberto R. Gonzales, George W. Bush, John Conyers, USA Patriot Act, Bush administration (43)

Timeline Tags: Civil Liberties

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, J. Scott Marcus

Timeline Tags: Civil Liberties

John Dean.John Dean. [Source: Truthdig.com]Nixon White House counsel and Watergate veteran John Dean says that President Bush’s domestic spying program is worse than anything his former boss, Richard Nixon, did while he occupied the Oval Office. Testifying before the Senate Judiciary Committee during a hearing on Senator Russ Feingold’s (D-WI) motion to censure Bush over the program (see March 12, 2006 and After), Dean says Bush “needs to be told he cannot simply ignore a law with no consequences.” Republican committee leaders grudgingly agreed to hold the hearing over the censure motion, but dismiss the motion as little more than an election-year stunt designed by Democrats to, in committee member Orrin Hatch’s (R-UT) words, “weaken the commander in chief” in a time of war. Feingold’s measure, if passed, would condemn Bush’s “unlawful authorization of wiretaps of Americans within the United States without obtaining the court orders required” by the Foreign Intelligence Surveillance Act (FISA). The measure has little chance of passing, with even most Senate Democrats refusing to get behind the resolution. “To me, this is not really and should not be a partisan question,” Dean says. “I think it’s a question of institutional pride of this body, of the Congress of the United States.… [T]he president needs to be reminded that separation of powers does not mean an isolation of powers.” Dean has previously suggested, in his book Worse Than Watergate and in op-eds, that Bush may deserve impeachment over the surveillance program. [Associated Press, 3/31/2006]

Entity Tags: Senate Judiciary Committee, Russell D. Feingold, John Dean, Orrin Hatch, Foreign Intelligence Surveillance Act, Richard M. Nixon, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” [New York Times, 4/7/2006; Klein, 2009, pp. 70] A week later, the Times will publish a more in-depth article (see April 12, 2006).

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, New York Times, National Security Agency

Timeline Tags: Civil Liberties

The New York Times does a more in-depth report on the allegations advanced by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The Times published a far briefer report five days earlier (see April 7, 2006). The article provides a brief synopsis of Klein’s allegations—that AT&T worked with the National Security Agency (NSA) to illegally monitor and record millions of Americans’ telephone and Internet communications and thus illegally invaded its customers’ privacy. It also notes, as did the first article, that Klein had provided some of his documentation “to reporters,” though neither article admits that the Times received the documents months beforehand (see Mid-February - Late March, 2006). The new information in the article is the conclusion of “four independent telecommunications and computer security experts” who examined Klein’s documents “at the request of The New York Times.” According to the four experts, the documents “describe equipment capable of monitoring a large quantity of email messages, Internet phone calls, and other Internet traffic. The equipment… was able to select messages that could be identified by keywords, Internet or email addresses, or country of origin and divert copies to another location for further analysis.” All four experts agreed that the documents proved “AT&T had an agreement with the federal government to systematically gather information flowing on the Internet through the company’s network. The gathering of such information, known as data mining, involves the use of sophisticated computer programs to detect patterns or glean useful intelligence from masses of information.” Brian Reid, the director of engineering at the Internet Systems Consortium, says of the AT&T/NSA project: “This took expert planning and hundreds of millions of dollars to build. This is the correct way to do high volume Internet snooping.” An expert who refuses to be named says the documents are “consistent” with Bush administration claims that the NSA only monitored foreign communications and communications between foreign and US locations, in part because of the location of the monitoring sites. (An expert witness, former AT&T and FCC employee J. Scott Marcus, has given testimony for EFF that flatly contradicts this expert’s assertions—see March 29, 2006). The article notes the Justice Department’s objections to Klein’s documents being filed with the court in the EFF lawsuit, and notes that the department withdrew its objections (see Late March - April 4, 2006). It also notes AT&T’s request for the court to order the EFF to return the documents because they are, the firm claimed, “proprietary” (see April 6-8, 2006). AT&T spokesman Walt Sharp says of Klein and the EFF lawsuit: “AT&T does follow all laws with respect to assistance offered to government agencies. However, we are not in a position to comment on matters of national security.” NSA spokesman Don Weber makes a similar statement: “It would be irresponsible of us to discuss actual or alleged operational issues as it would give those wishing to do harm to the United States the ability to adjust and potentially inflict harm.” [New York Times, 4/12/2006] Klein will write of the story, “Finally it was out there in a major newspaper, though I noticed that the New York Times did not show any images of the actual documents, and never called me back for an in-depth followup story.” [Klein, 2009, pp. 71]

Entity Tags: J. Scott Marcus, Brian Reid, AT&T, Bush administration (43), Electronic Frontier Foundation, National Security Agency, Walter Sharp, Mark Klein, Don Weber, New York Times, US Department of Justice

Timeline Tags: Civil Liberties

The Justice Department announces that it is invoking the “state secrets” clause to prevent a lawsuit by the Electronic Frontier Foundation (EFF) against AT&T from going forward (see March 9, 1953 and January 31, 2006). The EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The government alleges that the lawsuit would reveal “state secrets” critical to “national security” if it continues. The Justice Department makes its initial filing in mid-May (see May 13, 2006). [US District Court, Northern District of California, 4/28/2006 pdf file; Klein, 2009, pp. 71]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

Maurice Hinchey.Maurice Hinchey. [Source: Washington Post]A Justice Department investigation into the National Security Agency’s warrantless wiretapping program ends before it begins, because the NSA will not grant Justice Department lawyers routine security clearances. The investigation had been opened in February 2006 (see February 2, 2006) when Representative Maurice Hinchey (D-NY) asked the Justice Department’s Office of Professional Responsibility (OPR) to investigate the NSA’s warrantless surveillance of US citizens (see After September 11, 2001). Without security clearances, investigators could not examine NSA lawyers’ role in the program. OPR counsel H. Marshall Jarrett writes in a letter to Hinchey: “We have been unable to make any meaningful progress in our investigation because OPR has been denied security clearances for access to information about the NSA program. Without these clearances, we cannot investigate this matter and therefore have closed our investigation.” Jarrett and his office have made routine requests for security clearances since January, to no avail. The OPR’s investigation would have focused strictly on whether Justice Department lawyers violated ethical rules, and would not have examined the entire NSA program. Hinchey says, “This administration thinks they can just violate any law they want, and they’ve created a culture of fear to try to get away with that.” [Associated Press, 5/11/2006] Hinchey writes to Jarrett, regarding the failure to grant clearances: “We are perplexed and cannot make sense of your denial of these security clearances. Our request did not ask OPR to give us the intricate details of the NSA program; we understand that such a request would not even be within OPR’s jurisdiction. There appear to be no reasonable grounds for blocking this investigation. Not only does your denial of their request for a security clearance not make sense, it is unprecedented.” Hinchey will try, and fail, to get a bill through the Republican-controlled House Judiciary Committee to force the White House, Justice Department, and Defense Department to turn over to Congress all documents related to the closure of the OPR probe. He will write in a letter to President Bush, “If the NSA program is justified and legal, as you yourself have indicated, then there is no reason to prevent this investigation from continuing.” [US House of Representatives, 7/18/2006] In June 2006, it will be revealed that Bush personally made the decision not to grant the OPR investigators security clearances (see Late April 2006).

Entity Tags: Office of Professional Responsibility, Maurice Hinchey, US Department of Justice, George W. Bush, H. Marshall Jarrett, National Security Agency

Timeline Tags: Civil Liberties

Page 2 of 3 (283 events)
previous | 1, 2, 3 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike