!! History Commons Alert, Exciting News

Context of 'April 2, 2008: ACLU Calls on Justice Department to Release October 2001 Memo Nullifying Fourth Amendment'

This is a scalable context timeline. It contains events related to the event April 2, 2008: ACLU Calls on Justice Department to Release October 2001 Memo Nullifying Fourth Amendment. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 2 (193 events)
previous | 1, 2 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

Edwin Meese.Edwin Meese. [Source: GQ (.com)]Attorney General Edwin Meese receives a report, “Separation of Powers: Legislative-Executive Relations.” Meese had commissioned the report from the Justice Department’s Domestic Policy Committee, an internal “think tank” staffed with hardline conservative scholars and policy advisers.
Recommendations for Restoring, Expanding Executive Power - The Meese report approvingly notes that “the strong leadership of President Reagan seems clearly to have ended the congressional resurgence of the 1970s.” It lays out recommendations for restoring the power taken from the executive branch after Watergate and Vietnam, and adding new powers besides. It recommends that the White House refuse to enforce laws and statutes that “unconstitutionally encroach upon the executive branch,” and for Reagan to veto more legislation and to use “signing statements” to state the White House’s position on newly passed laws. It also assails the 1972 War Powers Resolution and other laws that limit presidential power.
Reinterpreting the Separation of Powers and the Concept of 'Checks and Balances' - Perhaps most importantly, the Meese report claims that for 200 years, courts and scholars alike have misunderstood and misinterpreted the Founders’ intentions in positing the “separation of powers” system (see 1787 and 1793). The belief that the Constitution mandates three separate, co-equal branches of government—executive, judicial, and legislative—who wield overlapping areas of authority and work to keep each of the other branches from usurping too much power—a concept taught in school as “checks and balances”—is wrong, the report asserts. Instead, each branch has separate and independent sets of powers, and none of the three branches may tread or encroach on the others’ area of responsibility and authority. “The only ‘sharing of power’ is the sharing of the sum of all national government power,” the report claims. “But that is not joint shared, it is explicitly divided among the three branches.” According to the report, the White House should exercise total and unchallenged control of the executive branch, which, as reporter and author Charlie Savage will later explain, “could be conceived of as a unitary being with the president as its brain.” The concept of “checks and balances” is nothing more than an unconstitutional attempt by Congress to encroach on the rightful power of the executive. This theory of presidential function will soon be dubbed the “unitary executive theory,” a title adapted from a passage by Alexander Hamilton in the Federalist Papers. [Savage, 2007, pp. 47-48] Charles Fried, Reagan’s solicitor general during the second term, will later write that though the unitary executive theory displays “perfect logic” and a “beautiful symmetry,” it is difficult to defend, because it “is not literally compelled by the words of the Constitution. Nor did the framers’ intent compel this view.” [Savage, 2007, pp. 50]

Entity Tags: Charles Fried, Reagan administration, Domestic Policy Committee, US Department of Justice, Ronald Reagan, Edwin Meese, Charlie Savage

Timeline Tags: Civil Liberties

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Around eight calls made by hijacker Khalid Almihdhar from San Diego to an al-Qaeda communications hub in Sana’a, Yemen, run by his father-in-law Ahmed al-Hada are intercepted by the NSA. [US Congress, 7/24/2003, pp. xii, 16-17, 157 pdf file; Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] At least one of the calls is made from a phone registered to hijacker Nawaf Alhazmi in their San Diego apartment. [US Department of Justice, 11/2004, pp. 251 pdf file] Other calls are made from a mobile phone registered to Alhazmi. [McDermott, 2005, pp. 296] Calls may also be made from the communications hub to the US. [MSNBC, 7/21/2004]
Dates of Calls - One of the calls takes place days after they move into their San Diego apartment in February (see January 15-February 2000). [MSNBC, 7/21/2004] Another is on March 20, 2000 and lasts 16 minutes. [Federal Bureau of Investigation, 10/2001, pp. 57 pdf file; US Department of Justice, 11/2004, pp. 251 pdf file]
Intercepted by NSA - Although NSA analysts pick up Almihdhar’s first name, “Khalid,” they do not connect it to his second name, even though the NSA has been intercepting communications to and from the hub involving him throughout 1999 (see Early 1999 and December 29, 1999) and he is on the NSA watch list at this point (see Mid-January 2000). [US Congress, 7/24/2003, pp. xii, 16, 157 pdf file; US News and World Report, 3/15/2004] Some, or perhaps all, of these calls are between Almihdhar and his wife, who lives at the communications hub and reportedly gives birth to a daughter in early 2000 while Almihdhar is in the US. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] However, the NSA analysts suspect that Khalid is part of an “operational cadre.” [US News and World Report, 3/15/2004]
Dissemination and Content - According to the 9/11 Congressional Inquiry, the NSA disseminates some of this information to the FBI, CIA, and other agencies, but not all of it, as it apparently does not meet reporting thresholds. It is unclear why it does not meet such thresholds, although some sources will suggest Almihdhar was just talking to his wife. [US Congress, 7/24/2003, pp. 157 pdf file; US News and World Report, 3/15/2004; 9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94] Another source suggests operational information was passed on during the calls (see Early 2000-Summer 2001). However, two FBI agents who worked on al-Qaeda cases relating to Yemen, Dan Coleman and Ali Soufan, will later claim that they and other senior counterterrorism officials only learn about these calls after 9/11. [Los Angeles Times, 12/21/2005; Suskind, 2006, pp. 94; New Yorker, 7/10/2006 pdf file]
Significance - Author Lawrence Wright will comment: “You know, this is the key. The NSA is all over this phone. And everybody, you know, that has any connection with it is drawing links from that phone. Now imagine eight lines from Yemen to San Diego. How obvious would it be that al-Qaeda is in America[?]” [Federal News Service, 10/5/2006]
Other Calls - The NSA also intercepts various other communications between the hijackers and the communications hub (see Early 2000-Summer 2001).

Entity Tags: Ahmed al-Hada, Al-Qaeda, Salem Alhazmi, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Osama bin Laden, Lawrence Wright, 9/11 Congressional Inquiry

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” [Savage, 2007, pp. 67]

Entity Tags: Bush administration (43), John C. Yoo, Nixon administration, Clinton administration

Timeline Tags: Civil Liberties

In the months after the USS Cole is bombed in autumn 2000 (see October 12, 2000), the NSA intercepts about half a dozen communications between hijacker Nawaf Alhazmi in the US and an al-Qaeda communications hub in Sana’a, Yemen, run by hijacker Khalid Almihdhar’s father in law, Ahmed al-Hada. [MSNBC, 7/21/2004; Los Angeles Times, 12/21/2005; US President, 12/26/2005 pdf file] The hub and people associated with it are thought to have played a support role in the Cole bombing (see also October 14-Late November, 2000 and October 4, 2001). [CNN, 2/14/2002; MSNBC, 7/21/2004] It was also involved in the bombing of US embassies in Tanzania and Kenya (see August 4-25, 1998). The NSA has been monitoring the number for at least two years (see Late August 1998) and the FBI has used it to map al-Qaeda’s global organisation (see Late 1998-Early 2002). The NSA had previously intercepted calls between hijacker Khalid Almihdhar in the US and the hub (see Spring-Summer 2000 and Early 2000-Summer 2001) and also intercepts a call between Alhazmi and the hub a few weeks before 9/11 (see (August 2001)).

Entity Tags: Nawaf Alhazmi, National Security Agency, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Around this time, the NSA intercepts telephone conversations between 9/11 mastermind Khalid Shaikh Mohammed (KSM) and 9/11 hijacker Mohamed Atta, but apparently it does not share the information with any other agencies. The FBI has had a $2 million reward for KSM since 1998 (see January 8, 1998), while Atta is in charge of hijacker operations inside the US. [Knight Ridder, 6/6/2002; Independent, 6/6/2002] The monitored calls between the two of them continue until September 10, one day before the 9/11 attacks (see September 10, 2001). The NSA either fails to translate these messages in a timely fashion or fails to understand the significance of what was translated. [Knight Ridder, 6/6/2002] However, it will later be revealed that an FBI squad built an antenna in the Indian Ocean some time before 9/11 with the specific purpose of listening in on KSM’s phone calls, so they may have learned about these calls to Atta on their own (see Before September 11, 2001).

Entity Tags: Mohamed Atta, National Security Agency, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

The NSA has been intercepting calls between at least two 9/11 hijackers, Nawaf Alhazmi and Khalid Almihdhar, in the US and an al-Qaeda communications hub in Sana’a, Yemen, run by al-Qaeda operative Ahmed al-Hada over an approximately 18-month period before 9/11 (see Early 2000-Summer 2001). According to MSNBC, the final intercepted call comes “only weeks” before 9/11. [MSNBC, 7/21/2004] Around the same time there is great alarm in the US intelligence community over a communications intercept in Yemen indicating there was going to be a major al-Qaeda attack against US interests (see June 30-July 1, 2001). Further, the investigation of the USS Cole bombing has reignited interest in Almihdhar and Alhazmi on the part of the US intelligence community since at least June 2001 (see June 11, 2001 and July 13, 2001). The two of them are placed on an international no-fly list in late August (see August 23, 2001).

Entity Tags: National Security Agency, Khalid Almihdhar, Ahmed al-Hada, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Mohamed Atta calls 9/11 mastermind Khalid Shaikh Mohammed (KSM) in Afghanistan. KSM gives final approval to Atta to launch the attacks. The specifics of the conversation haven’t been released. [Independent, 9/15/2002] Unnamed intelligence officials later tell Knight Ridder Newspapers that the call is monitored by the NSA, but only translated after the 9/11 attacks. KSM, “using coded language, [gives] Atta final approval” for the attacks. [Knight Ridder, 9/9/2002] NSA monitored other calls between KSM and Atta in the summer of 2001 but did not share the information about this with other agencies (see Summer 2001). Additionally, it will later be revealed that an FBI squad built an antenna in the Indian Ocean some time before 9/11 with the specific purpose of listening in on KSM’s phone calls, so they may have learned about this call to Atta on their own (see Before September 11, 2001).

Entity Tags: United States, Mohamed Atta, Federal Bureau of Investigation, Khalid Shaikh Mohammed, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Issuetsdeah, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

In a memo, responding to a request from Deputy White House Counsel Timothy E. Flanigan, Justice Department lawyer John C. Yoo provides legal advice on “the legality of the use of military force to prevent or deter terrorist activity inside the United States.” He addresses the question of how the Fourth Amendment to the US Constitution applies to the use of “deadly force” by the military “in a manner that endangered the lives of United States citizens.” The Fourth Amendment requires the government to have some objective suspicion of criminal activity before it can infringe on an individual’s liberties, such as the right to privacy or the freedom of movement. Yoo writes that in light of highly destructive terrorist attacks, “the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties.” If the president determines the threat of terrorism high enough to deploy the military inside US territory, then, Yoo writes, “we think that the Fourth Amendment should be no more relevant than it would be in cases of invasion or insurrection.” [New York Times, 10/24/2004] A month later, the Justice Department will issue a similar memo (see October 23, 2001).

Entity Tags: John C. Yoo, Timothy E. Flanigan, US Department of Justice

Timeline Tags: Torture of US Captives, Civil Liberties

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

The Justice Department’s John Yoo, an official in the Office of Legal Counsel (OLC), issues a secret opinion regarding legal statutes governing the use of certain interrogation techniques. The opinion will not be made public; its existence will not be revealed until October 18, 2007, when future OLC head Steven Bradbury will note its existence as part of an American Civil Liberties Union (ACLU) lawsuit. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, John C. Yoo, Office of Legal Counsel (DOJ), Steven Bradbury

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

John Yoo, a lawyer with the Justice Department’s Office of Legal Counsel (OLC), writes a legal opinion that claims the attorney general, under Executive Order 12333 (see December 4, 1981), can grant the deputy attorney general the legal authority to approve the use of surveillance techniques for which a warrant would be required for law enforcement purposes. [US Department of Justice, 11/5/2001; American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

John Yoo, a lawyer for the Justice Department’s Office of Legal Counsel and a member of Vice President Cheney’s ad hoc legal team tasked to radically expand the power of the presidency, writes a legal brief declaring that President Bush does not need approval from Congress or the federal courts for denying suspected terrorists access to US courts, and instead can be tried in military commissions (see (After 10:00 a.m.) September 11, 2001). Two other team members, Cheney’s chief of staff David Addington and White House deputy counsel Timothy Flanigan, have decided that the government bureaucrats need to see that Bush can and will act, in the words of author Craig Unger, “without their blessing—and without the interminable process that goes along with getting that blessing.” Yoo’s opinion is a powerful object lesson. Yoo later says that he saw no need to seek the opinion of the State Department’s lawyers; that department hosts the archives of the Geneva Conventions and its lawyers are among the government’s top experts on the laws of war. “The issue we dealt with was: Can the president do it constitutionally?” Yoo will say. “State—they wouldn’t have views on that.” Neither does Yoo see a need to consult with his own superiors at the Justice Department. Attorney General John Ashcroft is livid upon learning that the draft gives the Justice Department no say in which alleged terrorists will be tried in military commissions. According to witnesses, Ashcroft confronts Cheney and David Addington over the brief, reminding Cheney that he is the president’s senior law enforcement officer; he supervises the FBI and oversees terrorism prosecutions throughout the nation. The Justice Department must have a voice in the tribunal process. He is enraged, participants in the meeting recall, that Yoo had recommended otherwise as part of the White House’s strategy to deny jurisdiction to the courts. Ashcroft talks over Addington and brushes aside interjections from Cheney: “The thing I remember about it is how rude, there’s no other word for it, the attorney general was to the vice president,” one participant recalls. But Cheney refuses to acquiesce to Ashcroft’s objections. Worse for Ashcroft, Bush refuses to discuss the matter with him, leaving Cheney as the final arbiter of the matter. In the following days, Cheney, a master of bureaucratic manipulation, will steer the new policy towards Bush’s desk for approval while avoiding the usual, and legal, oversight from the State Department, the Justice Department, Congress, and potentially troublesome White House lawyers and presidential advisers. Cheney will bring the order to Bush for his signature, brushing aside any involvement by Ashcroft, Secretary of State Colin Powell, or National Security Adviser Condoleezza Rice (see November 11-13, 2001). [Unger, 2007, pp. 222-223; Washington Post, 6/24/2007]

Entity Tags: John C. Yoo, Craig Unger, Condoleezza Rice, Colin Powell, David S. Addington, George W. Bush, John Ashcroft, US Department of State, Timothy E. Flanigan, US Department of Justice, Richard (“Dick”) Cheney, Office of Legal Counsel (DOJ)

John Yoo and Robert Delahunty of the Justice Department’s Office of Legal Counsel (OLC) write a classified memo to John Bellinger, the senior legal counsel to the National Security Council. Yoo and Delahunty claim that President Bush has the unilateral authority to “suspend certain articles” of the Anti-Ballistic Missile Treaty between the US and Russia (see May 26, 1972). Six months later, President Bush will withdraw the US from the treaty (see December 13, 2001). [US Department of Justice, 11/15/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo will not be released until two months after the Bush administration leaves the White House (see March 2, 2009).

Entity Tags: National Security Council, John Bellinger, John C. Yoo, US Department of Justice, Robert J. Delahunty, Office of Legal Counsel (DOJ)

Timeline Tags: US International Relations

Justice Department lawyer John Yoo, an official with the Office of Legal Counsel (OLC), issues a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but its existence will be revealed in a June 2007 deposition filed in the course of an American Civil Liberties Union (ACLU) lawsuit. The memo is known to cover the War Crimes Act, the Hague Convention, the Geneva Conventions, the federal criminal code, and detainee treatment. [American Civil Liberties Union [PDF], 1/28/2009 pdf file] It is co-authored by OLC special counsel Robert Delahunty. [ProPublica, 4/16/2009]

Entity Tags: Robert J. Delahunty, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo, US Department of Justice

Timeline Tags: Civil Liberties

The National Security Agency begins sending data—consisting of telephone numbers, e-mail addresses, and names—to the FBI that was obtained through surveillance of international communications originating within the US (see After September 11, 2001 and October 2001). The NSA sends so much data, in fact, that hundreds of agents are needed to investigate the thousands of tips per month that the data is generating. However, virtually all of this information leads to dead ends and/or innocent people. FBI officials repeatedly complain that the unfiltered information is bogging down the bureau: according to over a dozen current and former law enforcement and counterterrorism officials, the flood of tips provide them and their colleagues with very few real leads against terrorism suspect. Instead, the NSA data diverts agents from more productive work. Some FBI officials view the NSA data as pointless and likely illegal intrusions on citizens’ privacy. Initially, FBI director Robert Mueller asks senior administration officials “whether the program had a proper legal foundation,” but eventually defers to Justice Department legal opinions. One former FBI agent will later recall, “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism—case closed. After you get a thousand numbers and not one is turning up anything, you get some frustration.” A former senior prosecutor will add, “It affected the FBI in the sense that they had to devote so many resources to tracking every single one of these leads, and, in my experience, they were all dry leads. A trained investigator never would have devoted the resources to take those leads to the next level, but after 9/11, you had to.” Former NSA director Bobby Ray Inman says that the problem between the FBI and the NSA may stem in part from their very different approaches. Signals intelligence, the technical term for the NSA’s communications intercepts, rarely produces “the complete information you’re going to get from a document or a witness” in a traditional FBI investigation, he says. And many FBI officials are uncomfortable with the NSA’s domestic operations, since by law the NSA is precluded from operating inside US borders except under very specific circumstances. [New York Times, 1/17/2006]

Entity Tags: Federal Bureau of Investigation, National Security Agency, Bobby Ray Inman, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, Civil Liberties

The Justice Department’s John Yoo sends a classified memo to the Defense Department’s general counsel, William Haynes. The contents will not be made public, but the American Civil Liberties Union (ACLU) will eventually learn that the memo concerns possible criminal charges to be brought against an American citizen who is suspected of being a member of either al-Qaeda or the Taliban. The ACLU believes the memo discusses the laws mandating that US military personnel must adhere to the Uniform Code of Military Justice, and how those laws may not apply to military personnel during a so-called “undeclared war.” [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo

Timeline Tags: Civil Liberties

Deputy Assistant Attorney Generals Patrick Philbin and John Yoo send a memorandum to Pentagon General Counsel William J. Haynes offering the legal opinion that US courts do not have jurisdiction to review the detention of foreign prisoners at Guantanamo Bay. Therefore detentions of persons there cannot be challenged in a US court of law. The memo is endorsed by the Department of Defense and White House legal counsel Alberto Gonzales. [Newsweek, 5/24/2004] The memo addresses “the question whether a federal district court would properly have jurisdiction to entertain a petition for a writ of habeas corpus filed on behalf of an alien detained at the US naval base at Guantanamo Bay, Cuba.” The conclusion of Philbin and Yoo is that it cannot, based primarily on their interpretation of a decision by the US Supreme Court in the 1950 Eisentrager case, in which the Supreme Court determined that no habeas petition should be honored if the prisoners concerned are seized, tried, and held in territory that is outside of the sovereignty of the US and outside the territorial jurisdiction of any court of the US. Both conditions apply to Guantanamo according to Philbin and Yoo. Approvingly, they quote the US Attorney General in 1929, who stated that Guantanamo is “a mere governmental outpost beyond our borders.” A number of cases, quoted by the authors, “demonstrate that the United States has consistently taken the position that [Guantanamo Bay] remains foreign territory, not subject to US sovereignty.” Guantanamo is indeed land leased from the state of Cuba, and therefore in terms of legal possession and formal sovereignty still part of Cuba. But Philbin and Yoo acknowledge a problem with the other condition: namely that the territory is outside the US’s jurisdiction. They claim with certainty that Guantanamo “is also outside the ‘territorial jurisdiction of any court of the United States.’” However, the Supreme Court should not have made a distinction between jurisdiction and sovereignty here; the wording of the decision is really, Philbin and Yoo believe, an inaccurate reflection of its intent: “an arguable imprecision in the Supreme Court’s language.” For that reason, they call for caution. “A non-frivolous argument might be constructed, however, that [Guantanamo Bay], while not be part of sovereign territory of the United States, is within the territorial jurisdiction of a federal court.” [US Department of Justice, 12/28/2001 pdf file]

Entity Tags: John C. Yoo, Alberto R. Gonzales, Patrick F. Philbin, William J. Haynes

Timeline Tags: Torture of US Captives, Civil Liberties

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a neoconservative lawyer in the Justice Department’s Office of Legal Counsel serving as deputy assistant attorney general, writes a classified memo to senior Pentagon counsel William J. Haynes, titled “Application of Treaties and Law to al-Qaeda and Taliban Detainees.” [New York Times, 5/21/2004]
Yoo: Geneva Conventions Do Not Apply in War on Terror - Yoo’s memo, written in conjunction with fellow Justice Department lawyer Robert Delahunty, echoes arguments by another Justice Department lawyer, Patrick Philbin, two months earlier (see November 6, 2001). Yoo states that, in his view, the laws of war, including the Geneva Conventions, do not apply to captured Taliban or al-Qaeda prisoners, nor do they apply to the military commissions set up to try such prisoners.
Geneva Superseded by Presidential Authority - Yoo’s memo goes even farther, arguing that no international laws apply to the US whatsoever, because they do not have any status under US federal law. “As a result,” Yoo and Delahunty write, “any customary international law of armed conflict in no way binds, as a legal matter, the president or the US armed forces concerning the detention or trial of members of al-Qaeda and the Taliban.” In essence, Yoo and Delahunty argue that President Bush and the US military have carte blanche to conduct the global war on terrorism in any manner they see fit, without the restrictions of law or treaty. However, the memo says that while the US need not follow the rules of war, it can and should prosecute al-Qaeda and Taliban detainees for violating those same laws—a legal double standard that provokes sharp criticism when the memo comes to light in May 2004 (see May 21, 2004). Yoo and Delahunty write that while this double standard may seem “at first glance, counter-intuitive,” such expansive legal powers are a product of the president’s constitutional authority “to prosecute the war effectively.” The memo continues, “Restricting the president’s plenary power over military operations (including the treatment of prisoners)” would be “constitutionally dubious.” [Mother Jones, 1/9/2002; US Department of Justice, 6/9/2002 pdf file; Newsweek, 5/21/2004; New York Times, 5/21/2004]
Overriding International Legal Concerns - Yoo warns in the memo that international law experts may not accept his reasoning, as there is no legal precedent giving any country the right to unilaterally ignore its commitment to Geneva or any other such treaty, but Yoo writes that Bush, by invoking “the president’s commander in chief and chief executive powers to prosecute the war effectively,” can simply override any objections. “Importing customary international law notions concerning armed conflict would represent a direct infringement on the president’s discretion as commander in chief and chief executive to determine how best to conduct the nation’s military affairs.” [Savage, 2007, pp. 146] The essence of Yoo’s argument, a Bush official later says, is that the law “applies to them, but it doesn’t apply to us.” [Newsweek, 5/21/2004] Navy general counsel Alberto Mora later says of the memo that it “espoused an extreme and virtually unlimited theory of the extent of the president’s commander-in-chief authority.” [Savage, 2007, pp. 181]
White House Approval - White House counsel and future Attorney General Alberto Gonzales agrees (see January 25, 2002), saying, “In my judgment, this new paradigm renders obsolete Geneva’s strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.” [Mother Jones, 1/9/2002]
Spark for Prisoner Abuses - Many observers believe that Yoo’s memo is the spark for the torture and prisoner abuses later reported from Iraq’s Abu Ghraib prison (see Evening November 7, 2003), Guantanamo Bay (see December 28, 2001), and other clandestine prisoner detention centers (see March 2, 2007). The rationale is that since Afghanistan is what Yoo considers a “failed state,” with no recognizable sovereignity, its militias do not have any status under any international treaties. [Newsweek, 5/21/2004; Newsweek, 5/24/2004]
Resistance from Inside, Outside Government - Within days, the State Department will vehemently protest the memo, but to no practical effect (see January 25, 2002).

Entity Tags: Patrick F. Philbin, Robert J. Delahunty, US Department of Justice, Office of Legal Counsel (DOJ), Taliban, John C. Yoo, Colin Powell, Geneva Conventions, Al-Qaeda, George W. Bush, Alberto Mora, US Department of State, Alberto R. Gonzales, William J. Haynes

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Justice Department lawyer John Yoo sends a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo is about the Geneva Conventions. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, Alberto R. Gonzales, American Civil Liberties Union, John C. Yoo, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

Justice Department lawyers John Yoo and Robert Delahunty send a classified memo to the chief legal adviser for the State Department, William Howard Taft IV. The contents of the memo will remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo concerns the Justice Department’s interpretation of the War Crimes Act. According to Yoo and Delahunty, the War Crimes Act does not allow the prosecution of accused al-Qaeda and Taliban suspects. Yoo will cite this memo in a 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), American Civil Liberties Union, John C. Yoo, William Howard Taft IV, US Department of Justice, War Crimes Act, US Department of State

Timeline Tags: Civil Liberties

Siding with the Pentagon and Justice Department against the State Department, President Bush declares the Geneva Conventions invalid with regard to conflicts with al-Qaeda and the Taliban. Secretary of State Colin Powell urges Bush to reconsider, saying that while Geneva does not apply to al-Qaeda terrorists, making such a decision for the Taliban—the putative government of Afghanistan—is a different matter. Such a decision could put US troops at risk. Both Defense Secretary Donald Rumsfeld and Joint Chiefs chairman General Richard B. Myers support Powell’s position. Yet another voice carries more weight with Bush: John Yoo, a deputy in the Justice Department’s Office of Legal Counsel (OLC—see October 23, 2001). Yoo says that Afghanistan is a “failed state” without a functional government, and Taliban fighters are not members of an army as such, but members of a “militant, terrorist-like group” (see January 9, 2002). White House counsel Alberto Gonzales agrees with Yoo in a January 25 memo, calling Yoo’s opinion “definitive.” The Gonzales memo concludes that the “new kind of war” Bush wants to fight should not be equated with Geneva’s “quaint” privileges granted to prisoners of war, or the “strict limitations” they impose on interrogations (see January 25, 2002). Military lawyers dispute the idea that Geneva limits interrogations to recitals of name, rank, and serial number, but their objections are ignored. For an OLC lawyer to override the judgment of senior Cabinet officials is unprecedented. OLC lawyers usually render opinions on questions that have already been deliberated by the legal staffs of the agencies involved. But, perhaps because OLC lawyers like Yoo give Bush the legal opinions he wants, Bush grants that agency the first and last say in matters such as these. “OLC was definitely running the show legally, and John Yoo in particular,” a former Pentagon lawyer will recall. “Even though he was quite young, he exercised disproportionate authority because of his personality and his strong opinions.” Yoo is also very close to senior officials in the office of the vice president and in the Pentagon’s legal office. [Ledger (Lakeland FL), 10/24/2004]
Undermining, Cutting out Top Advisers - Cheney deliberately cuts out the president’s national security counsel, John Bellinger, because, as the Washington Post will later report, Cheney’s top adviser, David Addington, holds Bellinger in “open contempt” and does not trust him to adequately push for expanded presidential authority (see January 18-25, 2002). Cheney and his office will also move to exclude Secretary of State Colin Powell from the decision-making process, and, when the media learns of the decision, will manage to shift some of the blame onto Powell (see January 25, 2002). [Washington Post, 6/24/2007]
Final Decision - Bush will make his formal final declaration three weeks later (see February 7, 2002).

Entity Tags: US Department of Defense, US Department of Justice, Richard B. Myers, US Department of State, Taliban, Office of Legal Counsel (DOJ), John C. Yoo, Alberto R. Gonzales, Richard (“Dick”) Cheney, Colin Powell, Al-Qaeda, Condoleezza Rice, Donald Rumsfeld, John Bellinger, George W. Bush, Geneva Conventions, David S. Addington

Timeline Tags: Torture of US Captives, Civil Liberties

Defense Secretary Rumsfeld sends a memo to Joint Chiefs of Staff Chairman General Richard Myers informing him that Bush has declared the Geneva Conventions invalid with regard to conflicts with al-Qaeda and the Taliban (see January 18-25, 2002). In this “Memorandum for Chairman of the Joint Chiefs of Staff,” Rumsfeld states: “The United States has determined that al-Qaeda and Taliban individuals under the control of the Department of Defense are not entitled to prisoner of war status for purposes of the Geneva Conventions of 1949.” Nevertheless, “[t]he Combatant Commanders shall, in detaining al-Qaeda and Taliban individuals under the control of the Department of Defense, treat them humanely and, to the extent appropriate and consistent with military necessity, in a manner consistent with the principles of the Geneva Conventions of 1949.” [US Department of Defense, 1/19/2002 pdf file] The same day, the memorandum is disseminated as an order by the Joint Chiefs of Staff. [Chairman of the Joint Chiefs of Staff, 1/19/2002 pdf file]

Entity Tags: Richard B. Myers, Donald Rumsfeld

Timeline Tags: Torture of US Captives

Attorney General John Ashcroft publicly defends the president’s decision (see January 18-25, 2002) to deny detainees the protections of Geneva Conventions. He calls the detainees “terrorists” who “are uniquely dangerous.” [CNN, 1/22/2002]

Entity Tags: John Ashcroft

Timeline Tags: Torture of US Captives

Jay Bybee, the head of the Justice Department’s Office of Legal Counsel (OLC), and OLC lawyer John Yoo send a memo to White House counsel Alberto Gonzales and Defense Department chief counsel William Haynes. Known as the “Treaties and Laws Memorandum,” the document addresses the treatment of detainees captured in Afghanistan, and their eventual incarceration at Guantanamo and possible trial by military commissions. The memo asserts that the Geneva Conventions do not apply to al-Qaeda detainees, and the president has the authority to deny Taliban members POW status. The document goes on to assert that the president is not bound by international laws such as the Geneva Conventions because they are neither treaties nor federal laws. [US Department of Justice, 1/22/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), John C. Yoo, Jay S. Bybee, US Department of Justice

Timeline Tags: Torture of US Captives, Civil Liberties, War in Afghanistan

John Yoo, a lawyer in the Justice Department’s Office of Legal Counsel (OLC), sends a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo is about the Geneva Conventions and is applicable to prisoners of war. Yoo’s boss, OLC head Jay Bybee, sends another secret memo about the Geneva Conventions to Deputy Attorney General Larry Thompson. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Jay S. Bybee, American Civil Liberties Union, Geneva Conventions, US Department of Justice, John C. Yoo, Office of Legal Counsel (DOJ), Larry D. Thompson

Timeline Tags: Civil Liberties

White House lawyer Alberto Gonzales completes a draft memorandum to the president advising him not to reconsider his decision (see January 18-25, 2002) declaring Taliban and al-Qaeda fighters ineligible for prisoner of war status as Colin Powell has apparently recommended. [US Department of Justice, 1/25/2004 pdf file; Newsweek, 5/24/2004] The memo recommends that President Bush accept a recent Office of Legal Counsel (OLC) memo saying that the president has the authority to set aside the Geneva Conventions as the basis of his policy (see January 9, 2002). [Savage, 2007, pp. 146]
Geneva No Longer Applies, Says Gonzales - Gonzales writes to Bush that Powell “has asked that you conclude that GPW [Third Geneva Convention] does apply to both al-Qaeda and the Taliban. I understand, however, that he would agree that al-Qaeda and the Taliban fighters could be determined not to be prisoners of war (POWs) but only on a case-by-case basis following individual hearings before a military board.” Powell believes that US troops will be put at risk if the US renounces the Geneva Conventions in relation to the Taliban. Rumsfeld and his chairman of the Joint Chiefs of Staff, Gen. Richard B. Myers, allegedly agree with Powell’s argument. [New York Times, 10/24/2004] But Gonzales says that he agrees with the Justice Department’s Office of Legal Counsel, which has determined that the president had the authority to make this declaration on the premise that “the war against terrorism is a new kind of war” and “not the traditional clash between nations adhering to the laws of war that formed the backdrop for GPW [Geneva Convention on the treatment of prisoners of war].” Gonzales thus states, “In my judgment, this new paradigm renders obsolete Geneva’s strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.” [Newsweek, 5/24/2004] Gonzales also says that by declaring the war in Afghanistan exempt from the Geneva Conventions, the president would “[s]ubstantially [reduce] the threat of domestic criminal prosecution under the War Crimes Act [of 1996]” (see August 21, 1996). The president and other officials in the administration would then be protected from any future “prosecutors and independent counsels who may in the future decide to pursue unwarranted charges.” [New York Times, 5/21/2004; Newsweek, 5/24/2004]
Memo Actually Written by Cheney's Lawyer - Though the memo is released under Gonzales’s signature, many inside the White House do not believe the memo was written by him; it has an unorthodox format and a subtly mocking tone that does not go with Gonzales’s usual style. A White House lawyer with direct knowledge of the memo later says it was written by Cheney’s chief lawyer, David Addington. Deputy White House counsel Timothy Flanigan passed it to Gonzales, who signed it as “my judgment” and sent it to Bush. Addington’s memo quotes Bush’s own words: “the war against terrorism is a new kind of war.” [Washington Post, 6/24/2007]
Powell 'Hits the Roof' over Memo - When Powell reads the memo (see January 26, 2002), he reportedly “hit[s] the roof” and immediately arranges for a meeting with the president (see January 25, 2002). [Newsweek, 5/24/2004]

Entity Tags: George W. Bush, Office of Legal Counsel (DOJ), Geneva Conventions, Alberto R. Gonzales, Colin Powell, David S. Addington, Al-Qaeda, Taliban, Richard B. Myers

Timeline Tags: Torture of US Captives, Civil Liberties

James Ho, an attorney-adviser to the Office of Legal Counsel (OLC), sends a classified memo to the OLC’s John Yoo. The memo, entitled “RE: Possible interpretation of Common Article 3 of the 1949 Geneva Convention Relative to the Treatment of Prisoners of War,” will remain secret, but according to the American Civil Liberties Union (ACLU), it is likely a legal interpretation of Common Article 3 of the Geneva Convention, the section addressing the treatment of prisoners of war. The ACLU believes the memo interprets the scope of prohibited conduct under Common Artlcle 3, and gives specificity to the phrases “outrages upon personal dignity” and “humiliating and degrading treatment.” It also believes that the memo determines that Geneva does not apply to conflicts with terrorist organizations. Yoo will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [American Civil Liberties Union [PDF], 1/28/2009 pdf file; ProPublica, 4/16/2009]

Entity Tags: Office of Legal Counsel (DOJ), American Civil Liberties Union, John C. Yoo, James C. Ho, US Department of Justice

Timeline Tags: Civil Liberties

The White House declares that the United States will apply the Geneva Conventions to the conflict in Afghanistan, but will not grant prisoner-of-war status to captured Taliban and al-Qaeda fighters. Though Afghanistan was party to the 1949 treaty, Taliban fighters are not protected by the Conventions, the directive states, because the Taliban is not recognized by the US as Afghanistan’s legitimate government. Likewise, al-Qaeda fighters are not eligible to be protected under the treaty’s provisions because they do not represent a state that is party to the Conventions either.
Administration Will Treat Detainees Humanely 'Consistent' with Geneva - In the memo, President Bush writes that even though al-Qaeda detainees do not qualify as prisoners of war under Geneva, “as a matter of policy, the United States Armed Forces shall continue to treat detainees humanely and to the extent appropriate and consistent with military necessity, in a manner consistent with the principles of Geneva.” The presidential directive is apparently based on Alberto Gonzales’s January 25 memo (see January 25, 2002) and a memo from Vice President Cheney’s chief of staff, David Addington (see January 25, 2002).
Bush Chooses Not to Suspend Geneva between US and Afghanistan - The directive also concludes that Bush, as commander in chief of the United States, has the authority to suspend the Geneva Conventions regarding the conflict in Afghanistan, should he feel necessary: Bush writes, “I have the authority under the Constitution to suspend Geneva as between the United States and Afghanistan, but I decline to exercise that authority at this time.” Though not scheduled for declassification until 2012, the directive will be released by the White House in June 2004 to demonstrate that the president never authorized torture against detainees from the wars in Afghanistan and Iraq. [George W. Bush, 2/7/2002 pdf file; CNN, 2/7/2002; Newsweek, 5/24/2004; Truthout (.org), 1/19/2005; Dubose and Bernstein, 2006, pp. 191]
Overriding State Department Objections - Bush apparently ignores or overrides objections from the State Department, including Secretary of State Colin Powell (see January 25, 2002) and the department’s chief legal counsel, William Howard Taft IV (see January 25, 2002). Both Powell and Taft strenuously objected to the new policy. [Savage, 2007, pp. 147]
Ignoring Promises of Humane Treatment - The reality will be somewhat different. Gonzales laid out the arguments for and against complying with Geneva in an earlier memo (see January 18-25, 2002), and argued that if the administration dispensed with Geneva, no one could later be charged with war crimes. Yet, according to Colin Powell’s chief of staff, Lawrence Wilkerson, sometime after the Bush memo is issued, Vice President Cheney and Defense Secretary Rumsfeld decide to ignore the portions promising humane treatment for prisoners. “In going back and looking at the deliberations,” Wilkerson later recalls, “it was clear to me that what the president had decided was one thing and what was implemented was quite another thing.” [Dubose and Bernstein, 2006, pp. 190-191]

Entity Tags: Geneva Conventions, George W. Bush, Colin Powell, Lawrence Wilkerson, William Howard Taft IV, Richard (“Dick”) Cheney, Bush administration (43)

Timeline Tags: Torture of US Captives, Civil Liberties

Jay Bybee, the chief of the Justice Department’s Office of Legal Counsel (OLC), issues a classified memo to William Howard Taft IV, the chief counsel of the State Department, titled “The President’s Power as Commander in Chief to Transfer Captive Terrorists to the Control and Custody of Foreign Nations.” The memo, actually written by Bybee’s deputy John Yoo, says Congress has no authority to block the president’s power to unilaterally transfer detainees in US custody to other countries. In essence, the memo grants President Bush the power to “rendition” terror suspects to countries without regard to the law or to Congressional legislation, as long as there is no explicit agreement between the US and the other nations to torture the detainees. [US Department of Justice, 3/12/2002 pdf file; Savage, 2007, pp. 148; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009] The memo directly contradicts the 1988 Convention Against Torture (see October 21, 1994), which specifically forbids the transfer of prisoners in the custody of a signatory country to a nation which practices torture. Once the treaty was ratified by Congress in 1994, it became binding law. But Yoo and Bybee argue that the president has the authority as commander in chief to ignore treaties and laws that supposedly interfere with his power to conduct wartime activities. [Savage, 2007, pp. 148-149] In 2009, when the memos are made public (see March 2, 2009), Jennifer Daskal of Human Rights Watch says she is shocked at the memo: “That is [the Office of Legal Counsel] telling people how to get away with sending someone to a nation to be tortured. The idea that the legal counsel’s office would be essentially telling the president how to violate the law is completely contrary to the purpose and the role of what a legal adviser is supposed to do.” [Washington Post, 3/3/2009]

Entity Tags: John C. Yoo, Jay S. Bybee, Office of Legal Counsel (DOJ), US Department of Justice

Timeline Tags: Civil Liberties

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

In the days following the capture of al-Qaeda operative Abu Zubaida (see March 28, 2002), a group of top White House officials, the National Security Council’s Principals Committee, begins a series of meetings that result in the authorization of specific torture methods against Zubaida and other detainees. The top secret talks and meetings eventually approve such methods to be used by CIA agents against high-value terrorism suspects. The US media will not learn of this until six years later (see April 9, 2008). The Principals Committee meetings are chaired by National Security Adviser Condoleezza Rice, and attendees include Vice President Dick Cheney, CIA Director George Tenet, Secretary of Defense Donald Rumsfeld, Secretary of State Colin Powell, and Attorney General John Ashcroft. Tenet’s successor, Porter Goss, will also participate in the meetings. Sometimes deputies attend in place of their superiors. Rice’s group not only discusses and approves specific “harsh” methods of interrogation, but also approves the use of “combined” interrogation techniques on suspects who prove recalcitrant. The approved techniques include slapping and shoving prisoners, sleep deprivation, and waterboarding, or simulated drowning, a technique banned for decades by the US military. Some of the discussions of the interrogation sessions are so detailed that the Principals Committee virtually choreographs the sessions down to the number of times CIA agents can use specific tactics. [ABC News, 4/9/2008; Associated Press, 4/10/2008; ABC News, 4/11/2008] The Principals Committee also ensures that President Bush is not involved in the meetings, thereby granting him “deniability” over the decisions, though Bush will eventually admit to being aware of the decisions (see April 11, 2008). The Principals Committee, particularly Cheney, is described by a senior intelligence official as “deeply immersed” in the specifics of the decisions, often viewing demonstrations of how specific tactics work. [Associated Press, 4/10/2008]
Imminent Threat Calls for Extreme Measures - The move towards using harsh and likely illegal interrogation tactics begins shortly after the capture of Zubaida in late March 2002 (see Late March through Early June, 2002 and March 28, 2002). Zubaida is seen as a potentially critical source of information about potential attacks similar to 9/11. He is kept in a secret CIA prison where he recovers from the wounds suffered during his capture, and where he is repeatedly questioned. However, he is allegedly uncooperative with his inquisitors, and CIA officials want to use more physical and aggressive techniques to force him to talk (see March 28, 2002-Mid-2004 and April - June 2002). The CIA briefs the Principals Committee, chaired by Rice, and the committee signs off on the agency’s plan to use more extreme interrogation methods on Zubaida. After Zubaida is waterboarded (see April - June 2002), CIA officials tell the White House that he provided information leading to the capture of two other high-level al-Qaeda operatives, Khalid Shaikh Mohammed (see Shortly After February 29 or March 1, 2003) and Ramzi bin al-Shibh (see Late 2002 and May 2002-2003). The committee approves of waterboarding as well as a number of “combined” interrogation methods, basically a combination of harsh techniques to use against recalcitrant prisoners.
The 'Golden Shield' - The committee asks the Justice Department to determine whether using such methods would violate domestic or international laws. “No one at the agency wanted to operate under a notion of winks and nods and assumptions that everyone understood what was being talked about,” a second senior intelligence official will recall in 2008. “People wanted to be assured that everything that was conducted was understood and approved by the folks in the chain of command.” In August 2002, Justice Department lawyers in the Office of Legal Counsel will write a memo that gives formal legal authority to government interrogators to use harsh, abusive methods on detainees (see August 1, 2002). The memo is called the “Golden Shield” for CIA agents who worry that they could be held criminally liable if the harsh, perhaps tortuous interrogations ever become public knowledge. CIA veterans remember how everything from the Vietnam-era “Phoenix Program” of assassinations to the Iran-Contra arms sales of the 1980s were portrayed as actions of a “rogue,” “out-of-control” CIA; this time, they intend to ensure that the White House and not the agency is given ultimate responsibility for authorizing extreme techniques against terror suspects. Tenet demands White House approval for the use of the methods, even after the Justice Department issues its so-called “Golden Shield” memo explicitly authorizing government interrogators to torture suspected terrorists (see August 1, 2002). Press sources will reveal that Tenet, and later Goss, convey requests for specific techniques to be used against detainees to the committee (see Summer 2003). One high-ranking official will recall: “It kept coming up. CIA wanted us to sign off on each one every time. They’d say: ‘We’ve got so and so. This is the plan.’” The committee approves every request. One source will say of the discussions: “These discussions weren’t adding value. Once you make a policy decision to go beyond what you used to do and conclude it’s legal, [you should] just tell them to implement it.” [ABC News, 4/9/2008; Associated Press, 4/10/2008; ABC News, 4/11/2008] In April 2008, law professor Jonathan Turley will say: “[H]ere you have the CIA, which is basically saying, ‘We’re not going to have a repeat of the 1970s, where you guys have us go exploding cigars and trying to take out leaders and then you say you didn’t know about it.’ So the CIA has learned a lot. So these meetings certainly cover them in that respect.” [MSNBC, 4/10/2008] A former senior intelligence official will say, “If you looked at the timing of the meetings and the memos you’d see a correlation.” Those who attended the dozens of meetings decided “there’d need to be a legal opinion on the legality of these tactics” before using them on detainees. [Associated Press, 4/10/2008]
Ashcroft Uneasy at White House Involvement - Ashcroft in particular is uncomfortable with the discussions of harsh interrogation methods that sometimes cross the line into torture, though his objections seem more focused on White House involvement than on any moral, ethical, or legal problems. After one meeting, Ashcroft reportedly asks: “Why are we talking about this in the White House? History will not judge this kindly.” However, others in the discussions, particularly Rice, continue to support the torture program. Even after Jack Goldsmith, the chief of the Justice Department’s Office of Legal Counsel (OLC), withdraws the “Golden Shield” memo and after Powell begins arguing that the torture program is harming the image of the US abroad, when CIA officials ask to continue using particular torture techniques, Rice responds: “This is your baby. Go do it.”
Reaction after Press Learns of Meetings - After the press learns of the meetings (see April 9, 2008), the only person involved who will comment will be Powell, who will say through an assistant that there were “hundreds of [Principals Committee] meetings” on a wide variety of topics and that he is “not at liberty to discuss private meetings.” [ABC News, 4/9/2008; Associated Press, 4/10/2008; ABC News, 4/11/2008]

Entity Tags: Office of Legal Counsel (DOJ), Porter J. Goss, US Department of Justice, Ramzi bin al-Shibh, Richard (“Dick”) Cheney, Principals Committee, Khalid Shaikh Mohammed, Jack Goldsmith, John Ashcroft, Bush administration (43), Al-Qaeda, Abu Zubaida, Central Intelligence Agency, Colin Powell, Condoleezza Rice, George W. Bush, George J. Tenet, Donald Rumsfeld, Jonathan Turley, National Security Council

Timeline Tags: Torture of US Captives, Civil Liberties

Justice Department lawyer Patrick Philbin sends a classified memo to Daniel Bryant, a lawyer with the Justice Department’s Office of Legal Counsel, concerning the “Swift Justice Authorization Act.” The memo states that Congress has no power to interfere with President Bush’s authority to act as commander in chief to control US actions during wartime, including Bush’s authority to promulgate military commissions to try and sentence suspected terrorists and other detainees taken by the US as part of its “war on terror.” Philbin’s colleague, OLC lawyer John Yoo, will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [US Department of Justice, 4/8/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo will be made public in early 2009 (see March 2, 2009).

Entity Tags: Office of Legal Counsel (DOJ), Patrick F. Philbin, US Department of Justice, Daniel Bryant, John C. Yoo

Timeline Tags: Civil Liberties

In a memo to Attorney General John Ashcroft, Jay Bybee, the head of the Justice Department’s Office of Legal Counsel (OLC), says that the US has the absolute right to detain US citizen Jose Padilla without charge and without legal representation (see May 8, 2002). Bybee also claims that the Posse Comitatus Act, which prevents the US military from operating inside the US itself, “poses no bar to the military’s operations in detaining Padilla.” [US Department of Justice, 6/8/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The day after this memo is issued, Padilla is classified as an “enemy combatant” and transferred to the US Naval Brig in Charleston, South Carolina (see June 9, 2002).

Entity Tags: Jose Padilla, Jay S. Bybee, John Ashcroft, US Department of Justice, Posse Comitatus Act, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

John Yoo, a lawyer with the Office of Legal Counsel (OLC), sends a classified memo to Daniel J. Bryant, another OLC lawyer. Yoo concludes that the Constitution “vests full control of the military operations of the United States to the president,” and denies Congress any role in overseeing or influencing such operations. The memo is consisent with an earlier Justice Department memo (see April 8, 2002). Yoo will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [US Department of Justice`, 6/27/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo ignores the Non-Detention Act, which states, “No citizen shall be imprisoned or otherwise detained by the United States except pursuant to an act of Congress.” [ProPublica, 4/16/2009] It will be made public in early 2009 (see March 2, 2009).

Entity Tags: John C. Yoo, Daniel Bryant, Office of Legal Counsel (DOJ), US Department of Justice

Timeline Tags: Civil Liberties

John Yoo, a lawyer with the Office of Legal Counsel (OLC), sends a classified memo to White House counsel Alberto Gonzales. The memo’s contents will remain secret, but the American Civil Liberties Union (ACLU) will learn that the memo regards the 1984 Convention Against Torture. According to the memo, the first fifteen articles of the Convention, ratified by the United States almost a decade before, “are non-self executing and place no affirmative obligations on the executive branch.” Furthermore, international law in general “lacks domestic legal effect, and in any event can be overridden by the president,” the memo states. In essence, Yoo concludes that the Convention can be ignored by the president. Yoo will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [United Nations High Commissioner for Human Rights, 12/10/1984; American Civil Liberties Union [PDF], 1/28/2009 pdf file; ProPublica, 4/16/2009]

Entity Tags: John C. Yoo, Alberto R. Gonzales, American Civil Liberties Union, Convention Against Torture, Bush administration (43), US Department of Justice, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

Justice Department lawyer John Yoo, of the Office of Legal Counsel (OLC), signs off on a secret opinion that approves a long, disturbing list of harsh interrogation techniques proposed by the CIA. The list includes waterboarding, a form of near-drowning that some consider mock execution, and which has been prosecuted as a war crime in the US since at least 1901. The list only forbids one proposed technique: burying a prisoner alive (see February 4-5, 2004). Yoo concludes that such harsh tactics do not fall under the 1984 Convention Against Torture (see October 21, 1994 and July 22, 2002) because they will not be employed with “specific intent” to torture. Also, the methods do not fall under the jurisdiction of the International Criminal Court because “a state cannot be bound by treaties to which it has not consented”; also, since the interrogations do not constitute a “widespread and systematic” attack on civilian populations, and since neither Taliban nor al-Qaeda detainees are considered prisoners of war (see February 7, 2002), the ICC has no purview. The same day that Yoo sends his memo, Yoo’s boss, OLC chief Jay Bybee, sends a classified memo to the CIA regarding the interrogation of al-Qaeda members and including information detailing “potential interrogation methods and the context in which their use was contemplated” (see August 1, 2002). [US Department of Justice, 8/1/2002; Washington Post, 6/25/2007; American Civil Liberties Union [PDF], 1/28/2009 pdf file] Yoo will later claim that he warns White House lawyers, as well as Vice President Cheney and Defense Secretary Donald Rumsfeld, that it would be dangerous to allow military interrogators to use the harshest interrogation techniques, because the military might overuse the techniques or exceed the limitations. “I always thought that only the CIA should do this, but people at the White House and at [the Defense Department] felt differently,” Yoo will later say. Yoo’s words are prophetic: such excessively harsh techniques will be used by military interrogators at Guantanamo, Abu Ghraib, and elsewhere. [Washington Post, 6/25/2007]

Entity Tags: US Department of Defense, Richard (“Dick”) Cheney, Bush administration (43), Central Intelligence Agency, Convention Against Torture, Donald Rumsfeld, Office of Legal Counsel (DOJ), US Department of Justice, John C. Yoo

Timeline Tags: Torture of US Captives, Civil Liberties

Two days after General Rick Baccus has been relieved from duty as the guard commander at Guantanamo (see October 9, 2002), and almost one and a half months since the writing of the Office of Legal Counsel’s (OLC) August memo on torture (see August 1, 2002), military intelligence at Guantanamo begin suggesting new rules of interrogation. Lieutenant Colonel Jerald Phifer, Director J2, sends a memo, to Major General Michael E. Dunlavey, Commander of Joint Task Force (JTF) 170, requesting approval for more severe interrogation techniques. [US Department of Defense, 10/11/2002 pdf file; New Yorker, 2/27/2008] In 2009, Senator Carl Levin (D-MI) will write (see April 21, 2009) that Dunlavey’s request is sparked by recent reports on the use of SERE training techniques for interrogation purposes (see January 2002 and After and April 16, 2002). [Huffington Post, 4/21/2009]
Three Categories of Techniques - The memo states, “The current guidelines for interrogation procedures at GTMO [Guantanamo] limit the ability of interrogators to counter advanced resistance.” Phifer proposes three categories of techniques. The mildest, which includes yelling and weak forms of deception, are included in category one. Category two techniques are more severe and require approval by an “interrogator group director.” They include the use of stress positions for up to four hours; use of falsified documents; isolation for up to 30 days; sensory deprivation and hooding; 20-hour interrogations; removal of comfort and religious items; replacing hot food with cold military rations; removal of clothing; forced grooming, including the shaving of beards; and playing on detainees’ phobias to induce stress, such as a fear of dogs. The harshest techniques, listed in category three, are to be reserved for a “very small percentage of the most uncooperative detainees” and only used with permission from the commander of the prison. These methods include using non-injurious physical contact like poking or grabbing; threatening a detainee with death or severe pain or threatening that a family member would be subjected to such harm; exposing him to cold weather or water; using a wet towel to “induce the misperception of suffocation.” [US Department of Defense, 10/11/2002 pdf file; New Yorker, 2/27/2008]
Desire to Extract More Information from Detainee - The request is prompted in part by military intelligence’s belief that Guantanamo detainee Mohamed al-Khatani has more information than the FBI has managed to extract from him. “Al-Khatani is a person in… whom we have considerable interest,” Dell’Orto will explain during a 2004 press briefing at the White House. “He has resisted our techniques. And so it is concluded at Guantanamo that it may be time to inquire as to whether there may be more flexibility in the type of techniques we use on him.” [Washington File, 6/23/2004]
JAG Officer Concludes Tactics are Legal - The same day, a staff judge advocate, Lieutenant Colonel Diane E. Beaver, reviews Phifer’s proposed techniques for legality and, while making qualifications and recommending further review, concludes in a memo to Dunlavey that they are legal. Also the same day, Dunlavey sends the list of techniques to his superior, General James T. Hill, commander of the Southern Command, requesting approval for their use. Dunlavey writes: “Although [the techniques currently employed] have resulted in significant exploitable intelligence the same methods have become less effective over time. I believe the methods and techniques delineated in the accompanying J-2 memorandum will enhance our efforts to extract additional information.” [US Department of Defense, 10/11/2002 pdf file] Beaver concludes that since President Bush had decided that all the detainees “are not protected by the Geneva Conventions” (see January 18-25, 2002, February 7, 2002), all of the desired techniques are allowable because “no international body of law directly applies.” [Savage, 2007, pp. 178]

Entity Tags: Rick Baccus, George W. Bush, James T. Hill, Carl Levin, Daniel J. Dell’Orto, Diane E. Beaver, Michael E. Dunlavey, Mohamed al-Khatani

Timeline Tags: Torture of US Captives

Assistant Attorney General William Moschella informs the ranking members of the House and Senate Intelligence committees of the administration’s use of potentially unconstitutional data mining and electronic surveillance programs after the 9/11 attacks. Moschella tells the lawmakers, “The president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. One such program is the Novel Intelligence from Massive Data (NIMD) initiative (see After September 11, 2001). Moschella echoes the claims of National Security Agency director Michael Hayden and other administration officials, saying that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” [National Journal, 1/20/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002). Moschella informs the lawmakers of none of this.

Entity Tags: Senate Intelligence Committee, William E. Moschella, Michael Hayden, Bush administration (43), Foreign Intelligence Surveillance Act, Novel Intelligence from Massive Data, House Intelligence Committee

Timeline Tags: Civil Liberties

The NSA’s secret room in the AT&T switching center.The NSA’s secret room in the AT&T switching center. [Source: PBS]Veteran AT&T technician Mark Klein (see July 7, 2009) takes an informal tour of his company’s facility on San Francisco’s Folsom Street (see Late 2002), along with three other technicians from his Geary Street offices. The tour, Klein will later say, is to introduce the four technicians to the Folsom Street staff, “because they were obviously eventually planning to bring us over there.” Klein learns that the rumors of a “secret room” in the facility are true (see Fall 2002). The secret room is on the facility’s sixth floor and is being built to house some sort of equipment, but Klein is unsure exactly what that equipment might be. Klein and the others see the outer door of the secret room, and a workman working on the door “suddenly [began talking to Klein and his colleages in a] very low voice like he didn’t want to be overheard. He felt like this was something secret, you know, and he didn’t know much about it, and he was saying: ‘None of us can go in there. It’s all secret.’ This was not only an affront to the technicians; it was a violation of union rules, because they were obviously planning to install telecommunications equipment, which is supposed to be the jurisdiction of the union technicians. We had a contract. So the technicians were not only angry about this secret thing that they’re not let in on, but also the fact that there’s work there that they’re excluded from. And they were told nothing about it. So that was it.” Klein is further surprised to learn that only a single non-union technician (whom he only identifies as “Ski,” an AT&T “field support specialist” who has been granted a security clearance by the National Security Agency (NSA)), is allowed to work in the secure room. No union technicians are allowed in, even though the installation work being done is specifically contracted to the union workers. “The regular technician work force was not allowed in the room,” Klein will later state. Klein deduces that this secret room is the long-rumored NSA installation he has been hearing about. Moreover, he notes with some alarm that the room is next door to the 4ESS phone switch, “the traditional workhorse used for AT&T long-distance calls.” Klein will write, “Now my mental alarm bells were ringing, but for the moment there was nothing to do but take some mental notes, particularly since it was not clear exactly what they [the NSA and AT&T] were doing.” [Wired News, 4/7/2006; Democracy Now!, 5/12/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 26-28] Klein will explain that he chooses not to say anything about his concerns because he is “scared for several reasons, one being, well, this is obviously secret. This is obviously some federal government secret operation that they don’t want nosy people nosing around in, and if I started asking questions I could get into trouble. Furthermore, our jobs were in jeopardy anyway, because [we] were always getting wind that they were planning to close our previous office at Geary Street, and I didn’t need to give them an excuse to fire me. So I thought after thinking about it that the best thing to do is not to say anything and just watch it.” [PBS Frontline, 5/15/2007] He later learns that similar cabinets are being installed in AT&T centers in other cities, including Seattle, San Jose, Los Angeles, and San Diego (see Late 2003). [Wired News, 4/7/2006] The Folsom Street facility is apparently connected to a more central surveillance facility operated out of one of AT&T’s main command centers in Missouri (see Late 2002-Early 2003).

Entity Tags: Bush administration (43), AT&T, Electronic Frontier Foundation, Mark Klein, Terrorist Surveillance Program, “Ski” (AT&T field support specialist), National Security Agency

Timeline Tags: Civil Liberties

Alberto Mora, the Navy’s general counsel, invites Justice Department lawyer John Yoo to his office to discuss Yoo’s recent memo defending the legality of extreme interrogation techniques used against terror suspects (see January 9, 2002). Mora has been working to put an end to such tactics at the Pentagon, but was horrified when his supervisor, Pentagon general counsel William Haynes, outflanked him with the Yoo memo (see January 23-Late January, 2003). Mora wants to know if Yoo believes cruel, inhuman or degrading treatment can be allowed at Guantanamo, and if that the president’s authority to order torture is virtually unlimited. During the meeting with Yoo, Mora asks him, “Are you saying the President has the authority to order torture?” Yoo replies, “Yes.” “I don’t think so,” Mora retorts. “I’m not talking policy,” Yoo replies, “I’m just talking about the law.” Mora responds, “Well, where are we going to have the policy discussion, then?” Yoo has no idea. Perhaps it will take place within the Pentagon, where the defense-policy experts are. Mora knows that no such discussion will ever take place; the Bush administration will use Yoo’s memo to justify its support of torture. [New Yorker, 2/27/2006; Washington Post, 4/2/2008]

Entity Tags: William J. Haynes, John C. Yoo, Alberto Mora, Bush administration (43)

Timeline Tags: Torture of US Captives, Civil Liberties

The Justice Department sends a legal memorandum to the Pentagon that claims federal laws prohibiting torture, assault, maiming, and other crimes do not apply to military interrogators questioning al-Qaeda captives because the president’s authority as commander in chief overrides the law. The 81-page memo, written by the Office of Legal Counsel’s John Yoo, is not publicly revealed for over five years (see April 1, 2008).
President Can Order Maiming, Disfigurement of Prisoners - Yoo writes that infractions such as slapping, shoving, and poking detainees do not warrant criminal liability. Yoo goes even farther, saying that the use of mind-altering drugs can be used on detainees as long as they do not produce “an extreme effect” calculated to “cause a profound disruption of the senses or personality.” [John C. Yoo, 3/14/2003 pdf file; Washington Post, 4/2/2008] Yoo asks if the president can order a prisoner’s eyes poked out, or if the president could order “scalding water, corrosive acid or caustic substance” thrown on a prisoner. Can the president have a prisoner disfigured by slitting an ear or nose? Can the president order a prisoner’s tongue torn out or a limb permanently disabled? All of these assaults are noted in a US law prohibiting maiming. Yoo decides that no such restrictions exist for the president in a time of war; that law does not apply if the president deems it inapplicable. The memo contains numerous other discussions of various harsh and tortuous techniques, all parsed in dry legal terms. Those tactics are all permissible, Yoo writes, unless they result in “death, organ failure, or serious impairment of bodily functions.” Some of the techniques are proscribed by the Geneva Conventions, but Yoo writes that Geneva does not apply to detainees captured and accused of terrorism. [Washington Post, 4/6/2008]
'National Self-Defense' - Yoo asserts that the president’s powers as commander in chief supersede almost all other laws, even Constitutional provisions. “If a government defendant were to harm an enemy combatant during an interrogation in a manner that might arguably violate a criminal prohibition, he would be doing so in order to prevent further attacks on the United States by the al-Qaeda terrorist network,” Yoo writes. “In that case, we believe that he could argue that the executive branch’s constitutional authority to protect the nation from attack justified his actions.… Even if an interrogation method arguably were to violate a criminal statute, the Justice Department could not bring a prosecution because the statute would be unconstitutional as applied in this context.” Interrogators who harmed a prisoner are protected by a “national and international version of the right to self-defense.” He notes that for conduct during interrogations to be illegal, that conduct must “shock the conscience,” an ill-defined rationale that will be used by Bush officials for years to justify the use of waterboarding and other extreme interrogation methods. Yoo writes, “Whether conduct is conscience-shocking turns in part on whether it is without any justification,” explaining that that it would have to be inspired by malice or sadism before it could be prosecuted.
Memo Buttresses Administration's Justifications of Torture - The Justice Department will tell the Defense Department not to use the memo nine months later (see December 2003-June 2004), but Yoo’s reasoning will be used to provide a legal foundation for the Defense Department’s use of aggressive and potentially illegal interrogation tactics. The Yoo memo is a follow-up and expansion to a similar, though more narrow, August 2002 memo also written by Yoo (see August 1, 2002). Defense Secretary Donald Rumsfeld will suspend a list of aggressive interrogation techniques he had approved, in part because of Yoo’s memo, after an internal revolt by Justice Department and military lawyers (see February 6, 2003, Late 2003-2005 and December 2003-June 2004). However, in April 2003, a Pentagon working group will use Yoo’s memo to endorse the continued use of extreme tactics. [John C. Yoo, 3/14/2003 pdf file; Washington Post, 4/2/2008; New York Times, 4/2/2008]
Justice Department Claims Attorney General Knows Nothing of Memo - Yoo sends the memo to the Pentagon without the knowledge of Attorney General John Ashcroft or Ashcroft’s deputy, Larry Thompson, senior department officials will say in 2008. [Washington Post, 4/4/2008]

Entity Tags: US Department of Justice, John C. Yoo, Larry D. Thompson, Al-Qaeda, Office of Legal Counsel (DOJ), Donald Rumsfeld, John Ashcroft, Geneva Conventions, US Department of Defense

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

Jack Goldsmith, the new head of the Justice Department’s Office of Legal Counsel (see October 6, 2003), finds himself embroiled in a huge, if secretive, controversy over Justice Department lawyer John Yoo’s torture memos (see January 9, 2002 and January 25, 2002). Yoo, who wrote the original memos over former OLC chief Jay Bybee’s signature, had placed the OLC in the position of asserting that torture can indeed be used against terror suspects. Goldsmith disagrees, feeling that Yoo’s definitions of torture are far too narrow and give far too much latitude to US interrogators. He also believes that Yoo’s assertions of near-unchecked presidential power to authorize torture—at the direct expense of Congressional and judicial oversight—has no legal basis. And, Goldsmith worries, the opinions could be interpreted as a clumsy, “tendentious” attempt to protect Bush officials from criminal charges. The conflict between Goldsmith and Yoo will cost the two men their friendship. “I was basically taking steps to fix the mistakes of a close friend, who I knew would be mad about it,” Goldsmith will recall in 2007. “We don’t talk anymore, and that’s one of the many sad things about my time in government.” Goldsmith decides to withdraw the follow-up March 2003 torture memo, and tells White House officials they cannot rely on it any longer. Actually doing so proves a tricky business. [New York Times Magazine, 9/9/2007]
'Serious, Serious Problems' - Goldsmith will say in September 2007: “As soon as I absorbed the opinions I realized… that my reaction to them was a big problem. The Office of Legal Counsel rarely overturns its prior opinions, and even more rarely does so within an administration, and even more rarely than that, in the same administration about something this important. I didn’t find any precedent for it. And I did not want to do anything to affect either the programs or the underlying opinions. But they were serious, serious problems, and I knew if and when I was asked to stand by them that I would have a very hard time doing so.” [Newsweek, 9/8/2007]
Pressure from Abu Ghraib Scandal - The legal and bureaucratic niceties of withdrawing the memos become moot when, in April 2004, the Abu Ghraib scandal breaks (see Mid-April 2004), and when in June 2004, the first memo is leaked to the media. “After the leak, there was a lot of pressure on me within the administration to stand by the opinion,” he later says, “and the problem was that I had decided six months earlier that I couldn’t stand by the opinion.” [New York Times Magazine, 9/9/2007] “I had determined that the analysis was flawed,” he will recall. “But I hadn’t determined the underlying techniques were illegal. After Abu Ghraib, there was enormous pressure for me to stand by the decisions… and I couldn’t do so. I had already made up my mind many months earlier and I wasn’t about to change it. But I struggled for several days with what the consequences might be of withdrawing the opinion, because I wasn’t in the position to make an independent ruling on the other techniques. I certainly didn’t think they were unlawful, but I couldn’t get an opinion that they were lawful either. So I struggled to repudiate the flawed opinion while not causing massive disruption and fright throughout the counterterrorism world related to interrogation. And I ultimately decided that I had to withdraw those and under suspicions, stand by it, because it was so thoroughly flawed.” [Newsweek, 9/8/2007]
White House Resists Change - Though Goldsmith has the support of his boss, Attorney General John Ashcroft, Ashcroft’s deputy, James Comey, and his own deputy, Patrick Philbin, he knows the White House will fight the withdrawal. Goldsmith will decide to issue the withdrawal and then resign his position (see June 17, 2004), effectively forcing the administration to either quietly accept the withdrawal, or fight it and make his resignation a media circus. “If the story had come out that the US government decided to stick by the controversial opinions that led the head of the Office of Legal Counsel to resign, that would have looked bad,” he later recalls. “The timing was designed to ensure that the decision stuck.” Vice President Dick Cheney’s chief aide, David Addington, among other White House officials, is furious over the withdrawal of the torture opinion (interestingly, White House counsel and future attorney general Alberto Gonzales will modify his own opposition to the withdrawals later, telling Goldsmith in 2007, “I guess those opinions really were as bad as you said”). [New York Times Magazine, 9/9/2007]
Expansion of Presidential Power - Addington asks Goldsmith incredulously, “Why are you trying to give away the president’s power?” Like Cheney, Addington believes, in Goldsmith’s words, “that the very act of asking for Congress’s help would imply, contrary to the White House line, that the president needed legislative approval and could not act on his own. The president’s power would diminish, Addington thought, if Congress declined its support once asked, especially if it tried to restrict presidential power in some way. Congress had balked, during the month after 9/11, at giving the president everything he had asked for in the Congressional authorization to use force and the Patriot Act. Things would only be worse in 2004 and beyond, Addington believed.” Addington’s two questions are always, Goldsmith writes, “‘Do we have the legal power to do it ourselves?’ (meaning on the president’s sole authority), and ‘Might Congress limit our options in ways that jeopardize American lives?’” While Goldsmith and his colleagues agree that the president has the power, and that seeking Congressional approval might tie the White House’s hands more so than the administration is willing to accept, Goldsmith worries that an unfavorable Supreme Court decision would undercut Bush’s authority much more so than any restrictions passed by a compliant, Republican-led Congress. Addington sees things in very simple terms: ”“We’re going to push and push and push until some larger force makes us stop,” Addington says on several occasions. Addington tells Goldsmith, “Now that you’ve withdrawn legal opinions that the president of the United States has been relying on, I need you to go through all of [the OLC terror memos] and let me know which ones you still stand by.” Goldsmith will do just that, further angering Addington. [Savage, 2007, pp. 184; Slate, 9/11/2007]
Absolute Power Required to Defend Nation - Goldsmith later writes: “He and, I presumed, his boss viewed power as the absence of constraint. These men believed that the president would be best equipped to identify and defeat the uncertain, shifting, and lethal new enemy by eliminating all hurdles to the exercise of his power. They had no sense of trading constraint for power. It seemed never to occur to them that it might be possible to increase the president’s strength and effectiveness by accepting small limits on his prerogatives in order to secure more significant support from Congress, the courts, or allies. They believed cooperation and compromise signaled weakness and emboldened the enemies of America and the executive branch. When it came to terrorism, they viewed every encounter outside the innermost core of most trusted advisers as a zero-sum game that if they didn’t win they would necessarily lose.” [Slate, 9/11/2007]

Entity Tags: John Ashcroft, John C. Yoo, Jay S. Bybee, Office of Legal Counsel (DOJ), James B. Comey Jr., David S. Addington, Patrick F. Philbin, Alberto R. Gonzales, Bush administration (43), Daniel Levin, Jack Goldsmith, US Department of Justice

Timeline Tags: Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

The New York Times agrees to a White House request to withhold publication of a potential “bombshell” story: an in-depth article revealing an enormous, and possibly illegal, warrantless wiretapping program executed by the NSA at President Bush’s behest after the 9/11 attacks. The Times will publish the story almost a year later (see December 15, 2005). In August 2006, the Times’s public editor, Byron Calame, will confirm the delay, and note that he has been “increasingly intrigued” by the various descriptions of the delay by Times editor Bill Keller (see December 16, 2005) and others. Keller will tell Calame that, contrary to some statements he and others have made, the story was originally scheduled to be published just days before the November 2004 presidential election. “The climactic discussion about whether to publish was right on the eve of the election,” Keller will say, though he will refuse to explain why he makes the final decision to hold the story. However, he will say that at this time he is not sure the story’s sources are reliable enough to warrant its publication before a close election. [New York Times, 8/13/2006]

Entity Tags: Bush administration (43), Bill Keller, New York Times, Byron Calame, National Security Agency

Timeline Tags: Civil Liberties

Judge Colleen Kollar-Kotelly, the presiding judge over the Foreign Intelligence Surveillance Court (FISC), warns the Justice Department that if it does not stop using evidence collected with warrantless wiretaps to obtain warrants to continue surveillance, her court will be more reluctant to grant warrants for surveillance. Kollar-Kotelly has complained about this before (see 2004). Though both Kollar-Kotelly and her predecessor, Judge Royce Lambeth, express concerns to senior officials that Bush’s warrantless wiretapping program is inherently unconstitutional, neither judge feels that they have the authority to rule on the president’s power to order such surveillance. Instead, they work to preserve the integrity of the FISA process. Eventually, the judges reach a compromise with government lawyers: any case using evidence from warrantless wiretaps that is to be presented to the judges for FISA warrants to continue monitoring the same suspects will be “tagged,” and that evidence will not be used to obtain warrants. Those cases, numbering less than ten a year, are to be presented only to the presiding judge. Lambeth and Kollar-Kotelly both feel that the process will work primarily because of the trust they have developed in James Baker, the Justice Department’s liaison to FISC. Part of the problem stems from contradictory statements and claims from the administration; after the wiretapping program began (see After September 11, 2001, NSA chief Michael Hayden and then-Attorney General John Ashcroft made it clear in private meetings with the judges that President Bush wanted to gain all possible information on any potential terrorist attacks, and that such information-gathering must by necessity go beyond the FISA court’s probable-cause requirement. But more recent assertions by Hayden and Ashcroft’s successor, Alberto Gonzales (see December 19, 2005, claiming that NSA analysts do not listen to domestic calls unless they already have some evidence that one of the parties to the call has links to terrorism, contradict earlier administration claims to the judges. Kollar-Kotelly suspects that the entire truth of the matter is not being presented to her and the FISC. Her suspicions are validated when her court is, in spite of administration reassurances, again presented with warrant applications based on illegally obtained evidence (see Late 2005). [Washington Post, 2/9/2006]

Entity Tags: Royce Lambeth, US Department of Justice, National Security Agency, John Ashcroft, Alberto R. Gonzales, Colleen Kollar-Kotelly, Foreign Intelligence Surveillance Court, George W. Bush, James Baker, Michael Hayden

Timeline Tags: Civil Liberties

Attorney general nominee Alberto R. Gonzales, currently serving as chief White House counsel, tells the Senate Judiciary Committee during his confirmation hearings that there had been some discussion within the administration about trying to rewrite the Geneva Conventions. While he is committed to “ensuring that the United States government complies with all of its legal obligations as it fights the war on terror, whether those obligations arise from domestic or international law,” he says, “these obligations include, of course, honoring the Geneva Conventions wherever they apply.” However, he adds: “We are fighting a new type of enemy and a new type of war. Geneva was ratified in 1949… and I think it is appropriate to revisit whether or not Geneva should be revisited. Now I’m not suggesting that the principles of Geneva regarding basic treatment—basic decent treatment of human beings—should be revisited.… That should always be the basis on which we look at this. But I am aware there’s been some very preliminary discussion as to whether or not—is this something that we ought to look at.” [Los Angeles Times, 1/7/2005; Savage, 2007, pp. 209]
Questioned about Involvement in Torture - During the hearing, Gonzales is grilled on his involvement in the administration’s decision to allow aggressive interrogations of terrorism detainees. Critics believe the interrogation policy developed by Gonzales and his colleagues created the conditions that allowed abuses, such as those at Abu Ghraib, to occur. Senator Edward Kennedy tells Gonzales, “It appears that legal positions that you have supported have been used by the administration, the military, and the CIA to justify torture and Geneva Convention violations by military and civilian personnel.” [Associated Press, 1/6/2006] Retired Admiral John Hutson, a former Navy judge advocate general (JAG) who testifies as a witness at the hearing, says, “I believe that the prisoners’ abuses that we’ve seen… found their genesis in the decision to get cute with the Geneva convention.” [Reuters, 1/7/2005]
Lack of Understanding of International Law - At certain points during the hearing, Gonzales demonstrates an apparent lack of understanding about US and international law. When he is asked if he thinks other world leaders can legitimately torture US citizens, he answers, “I don’t know what laws other world leaders would be bound by.” On another occasion he is asked whether “US personnel [can] legally engage in torture under any circumstances,” to which he answers, “I don’t believe so, but I’d want to get back to you on that.” He is also asked whether he agrees with John Ashcroft’s judgment that torture should not be used because it produces nothing of value. Gonzales responds, “I don’t have a way of reaching a conclusion on that.” [Washington Post, 1/7/2005]

Entity Tags: John D. Hutson, John Ashcroft, Alberto R. Gonzales, Edward M. (“Ted”) Kennedy

Timeline Tags: Torture of US Captives, Civil Liberties

The Senate Judiciary Committee brings in several experts to expand upon the testimony of attorney general nominee Alberto Gonzales (see January 6, 2005 and January 6, 2005). One of the most outspoken critics is Yale Law School dean Harold Koh. Koh had worked in the Justice Department’s Office of Legal Counsel (OLC) under Ronald Reagan, and later served as assistant secretary of state for democracy, human rights, and labor in the Clinton administration. He is a vocal critic of the Bush administration’s detention policies at Guantanamo and elsewhere. Koh had once worked closely with OLC lawyer John Yoo, the author of numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002), but now, without explicitly mentioning Yoo by name, he repudiates his former student’s legal positions. Gonzales worked closely with Yoo to craft the administration’s positions on wiretapping, torture, the inherent power of the president, and other issues. “Having worked in both Democratic and Republican administrations, and for more than two years as an attorney in the Office of Legal Counsel, I am familiar with how legal opinions like this are sought and drafted,” Koh states. “I further sympathize with the tremendous pressures of time and crisis that government lawyers face while drafting such opinions. Nevertheless, in my professional opinion, the August 1, 2002 OLC memorandum [drafted by Yoo at Gonzales’s behest—see August 1, 2002] is perhaps the most clearly erroneous legal opinion I have ever read.” The August 1 memo, as well as other opinions by Yoo and Gonzales, “grossly overreads the inherent power of the president” as commander in chief, Koh testifies. The memos raise profound questions about the legal ethics of everyone involved—Gonzales, Yoo, and others in the Justice Department and White House. “If a client asks a lawyer how to break the law and escape liability, the lawyer’s ethical duty is to say no,” Koh testifies. “A lawyer has no obligation to aid, support, or justify the commission of an illegal act.” [Senate Judiciary Committee, 1/7/2005 pdf file; Savage, 2007, pp. 211-212]

Entity Tags: Senate Judiciary Committee, US Department of Justice, Harold Koh, Alberto R. Gonzales, Bush administration (43), John C. Yoo, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

Months after the Bush administration successfully convinced the New York Times to hold off publishing its report on the administration’s warrantless wiretapping program (see Early November 2004, December 6, 2005, and December 15, 2005), one of the reporters on the story, Eric Lichtblau, attempts to get a response on the program from one of the few Democrats briefed on it, House Intelligence Committee ranking member Jane Harman (D-CA). In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau will write about covering a House hearing where Harman launches into a passionate call for stronger civil liberties safeguards in the reauthorization of the USA Patriot Act (see March 9, 2006). According to his recollection, Lichtblau approaches Harman and says, “I’m trying to square what I heard in there with what we know about that program.” He will write: “Harman’s golden California tan turned a brighter shade of red. She knew exactly what I was talking about. Shooing away her aides, she grabbed me by the arm and drew me a few feet away to a more remote section of the Capitol corridor. ‘You should not be talking about that here,’ she scolded me in a whisper. ’ They don’t even know about that,’ she said, gesturing to her aides, who were now looking on at the conversation with obvious befuddlement.” Harman tells Lichtblau, “The Times did the right thing by not publishing that story,” but will not discuss the details. When asked what intelligence capabilities would be lost by informing the public about something the terrorists already knew—that the government was listening to them—she simply replies, “This is a valuable program, and it would be compromised.” Lichtblau will add: “This was clearly as far as she was willing to take the conversation, and we didn’t speak again until months later, after the NSA story had already run. By then, Harman’s position had undergone a dramatic transformation. When the story broke publicly, she was among the first in line on Capitol Hill to denounce the administration’s handling of the wiretapping program, declaring that what the NSA was doing could have been done under the existing FISA law.” [TPM Muckraker, 3/19/2008]

Entity Tags: Eric Lichtblau, Bush administration (43), New York Times, House Intelligence Committee, Jane Harman

Timeline Tags: Civil Liberties

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

An FBI investigation into Jane Harman (D-CA), the ranking minority member of the House Intelligence Committee, is halted by Attorney General Alberto Gonzales, according to three former top national security officials. The investigation was to determine whether she agreed to use her influence on behalf of accused Israeli spies in return for Israeli support in being named chairman of the committee (see Summer 2005, October 2005 and December 2, 2006). In contrast to the former officials’ claims, the media will report that the investigation is ended due to “lack of evidence” of impropriety or illegal behavior on Harman’s part. However, according to the former officials, Gonzales wants Harman to help defend the administration’s warrantless wiretapping program, which is about to be revealed by a long-simmering New York Times story (see December 15, 2005). The evidence against Harman includes NSA wiretaps of a conversation between her and an Israeli agent. Reporter Jeff Stein will write, “As for there being ‘no evidence’ to support the FBI probe, a source with first-hand knowledge of the wiretaps called that ‘bull****.’” Another former national security officer will confirm Harman’s presence on the wiretaps. “It’s true,” the official will say. “She was on there.” Justice Department attorneys in the intelligence and public corruption units have concluded that Harman had committed what they called a “completed crime,” meaning there was evidence to show that she had attempted to complete it; they were prepared to open a case on her that would include wiretaps approved by the Foreign Intelligence Surveillance Court (FISC). CIA Director Porter Goss certified the FISA wiretapping request, and decided to inform House Speaker Dennis Hastert (R-IL) and ranking House Democrat Nancy Pelosi (D-CA) of the impending FBI investigation. At this point, say Stein’s sources, Gonzales intervenes to stop the investigation. Two officials with knowledge of the events will say that, in Gonzales’s words, he “needed Jane” to help support the warrantless wiretapping program once it became public knowledge. Gonzales tells Goss that Harman had helped persuade the Times to refrain from publishing the story in late 2004 (see Early November 2004, December 6, 2005, and Mid-2005), and although the Times would no longer wait on the story, Harman could be counted on to help defend the program. She will do just that (see December 21, 2005 and February 8-12, 2006). Hastert and Pelosi are never told of the FBI investigation. Stein will also learn that Goss’s successor, Michael Hayden, will later be informed of the potential investigation, but choose to take no action. Likewise, Director of National Intelligence John Negroponte will oppose any such investigation. Former officials who will pursue the Israeli espionage case for years will say, in Stein’s words, that “Harman dodged a bullet… [s]he was protected by an administration desperate for help.” A recently retired national security official closely involved in the investigation will add: “It’s the deepest kind of corruption. It’s a story about the corruption of government—not legal corruption necessarily, but ethical corruption.” [Congressional Quarterly, 4/19/2009]

Entity Tags: Jeff Stein, Federal Bureau of Investigation, Dennis Hastert, Alberto R. Gonzales, Foreign Intelligence Surveillance Court, Jane Harman, Michael Hayden, Porter J. Goss, John Negroponte, House Intelligence Committee, New York Times, Nancy Pelosi

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Page 1 of 2 (193 events)
previous | 1, 2 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike