The Center for Grassroots Oversight

This page can be viewed at http://www.historycommons.org/context.jsp?item=a0502waterboarding&scale=5&startpos=1600


Context of 'May 2002-2003: CIA Uses Controversial Waterboarding Technique on Several High-Ranking Al-Qaeda Detainees'

This is a scalable context timeline. It contains events related to the event May 2002-2003: CIA Uses Controversial Waterboarding Technique on Several High-Ranking Al-Qaeda Detainees. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 17 of 22 (2160 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22 | next

Several individuals come forward and corroborate claims made about a military intelligence unit called Able Danger that, by mid-2000, allegedly identified Mohamed Atta and three other future 9/11 hijackers. Days previously, a US Army intelligence officer called Anthony Shaffer made claims about the unit (see August 17, 2005). On August 22, Scott J. Phillpott, an active-duty Navy captain who managed the Able Danger program for the Pentagon’s Special Operations Command, comes forward and corroborates Shaffer’s claims. He says, “My story is consistent. Atta was identified by Able Danger in January-February of 2000.” Phillpott states that he was the officer who met with staff from the 9/11 Commission in July 2004, and told them about the program (see July 12, 2004). (Shenon 8/22/2005) Claims about the program are further corroborated when a former employee of a defense contractor who says he worked on the technical side of the unit, also comes forward. James D. Smith, who worked for Orion Scientific Systems (Phucas 9/22/2005) , states that in 2000 he helped create a chart for Able Danger. He says, “I am absolutely positive that he [Atta] was on our chart among other pictures and ties that we were doing mainly based upon [terror] cells in New York City.” (Fox News 8/28/2005) Furthermore, the Pentagon admits that they have found three others, apart from Anthony Shaffer and Scott Phillpott, associated with Able Danger who assert that the program identified Mohamed Atta as an al-Qaeda suspect inside the US more than a year before 9/11. An official says that the five individuals associated with the program (including Shaffer and Phillpott) were all considered “credible people,” and that four of them recalled a photo of Mohamed Atta accompanying the chart they produced. (Dunham 9/1/2005) Eleven people ran Able Danger. (Kelly 8/14/2005) The Pentagon interviewed a total of 80 people who had some kind of association with the Able Danger program. (Shanker 9/1/2005)

Tammy Pruett weeps while watching Bush’s presentation.Tammy Pruett weeps while watching Bush’s presentation. [Source: Jim Watson / Agence France-Presse / Getty Images]The White House presents Tammy Pruett, whose four sons are serving in Iraq, as a counter to antiwar protester Cindy Sheehan, who lost her son Casey in Iraq (see August 6, 2005 and After). Unlike Sheehan, Pruett and her family staunchly support the war; also unlike Sheehan, Pruett has not lost any of her sons. Apparently the White House found Pruett after learning of her family’s appearance on CNN in June 2004, where she defended the war effort, and contacted the family a week before the event. “An obviously delighted President Bush,” who has repeatedly refused to meet with Sheehan (see August 12, 2005), flies to Idaho to introduce Pruett to what the Washington Post calls “a boisterous invitation-only audience mostly made up of military families.” Bush tells the audience: “There are few things in life more difficult than seeing a loved one go off to war. And here in Idaho, a mom named Tammy Pruett—I think she’s here—knows that feeling six times over. Tammy has four sons serving in Iraq right now with the Idaho National Guard—Eric, Evan, Greg, and Jeff. Last year, her husband Leon and another son, Eren, returned from Iraq, where they helped train Iraqi firefighters in Mosul. Tammy says this—and I want you to hear this—‘I know that if something happens to one of the boys, they would leave this world doing what they believe, what they think is right for our country. And I guess you couldn’t ask for a better way of life than giving it for something that you believe in.’ America lives in freedom because of families like the Pruetts.” Bush kisses Pruett on the cheek after the speech, then sends her out to talk to the press. (Froomkin 8/25/2005)
Pruetts Offer Condolences to Sheehan, Other Bereaved Families - But the Pruetts are not willing to merely serve as props for the White House’s pro-war agenda. Both Leon and Tammy Pruett are quick to offer tearful condolences to families who have lost loved ones overseas, specifically naming Sheehan. Tammy says while her family supports the war, they do not want to be seen as criticizing those who oppose it. “We don’t feel like we’re out here trying to be a poster family, we’re just proud of our sons,” she says. (O'Donnell 8/24/2005)
Careful Staging - The Post notes that the Pruett speech is viewed by White House planners “as a crucial opportunity for Bush to show both compassion and resolve when his conduct of the war is increasingly being publicly questioned, and polls of public support are flirting with Vietnam War-era depths.” The speech and presentation are carefully crafted, with a drum corps playing the themes of each of the five branches of service, and Bush placed before a group of soldiers dressed in fatigues and arrayed in front of a huge red, white, and blue backdrop festooned with photographs of soldiers, police officers, firefighters, and rescue workers beneath the heading “Honoring America’s Soldiers.” The entire event, Knight Ridder reporter William Douglas writes, is designed to “creat[e] a visual link between the Sept. 11, 2001, terrorist attacks and the war in Iraq.” (O'Donnell 8/24/2005; Froomkin 8/25/2005)

The FBI begins to build cases against high value detainees held by the US in Guantanamo Bay, due to Defense Department fears that evidence obtained from the detainees by the CIA will be inadmissible or too controversial to present at their upcoming war crimes tribunals. The investigation, which involves up to 300 agents in a “Guantanamo task force,” runs for at least two years and FBI agents travel widely to collect evidence. According to former officials and legal experts, “The [FBI] process is an embarrassment for the Bush administration, which for years held the men incommunicado overseas and allowed the CIA to use coercive means to extract information from them that would not be admissible in a US court of law—and might not be allowed in their military commissions….” In fact, the techniques used to extract the confessions even cause some CIA officials to question whether they are believable, much less sustainable in court, particularly as CIA officers are not trained to obtain evidence that can be used in such a setting. In addition, if the information is used, this may focus the trials on the actions of the CIA and not the accused. The detainees will be designated enemy combatants in 2007 in preparation for military commissions (see March 9-April 28, 2007 and August 9, 2007), but this process will be questioned by a judge (see June 4, 2007). The Los Angeles Times will also comment, “The FBI’s efforts appear in part to be a hedge in case the commissions are ruled unconstitutional or never occur, or the US military detention center at Guantanamo Bay is closed. Under those scenarios, authorities would have to free the detainees, transfer them to military custody elsewhere, send them to another country, or have enough evidence gathered by law enforcement officials to charge them with terrorism in US federal courts.” (Meyer 10/21/2007)

Supreme Court Chief Justice William Rehnquist (see September 26, 1986), 80, dies after a ten-month battle with thyroid cancer. He will be replaced by John Roberts (see September 29, 2005), who formerly clerked for him. Rehnquist’s term as Chief Justice marked a “sea change” in the direction of the Court. Former Clinton solicitor general Walter Dellinger says: “It is quite clear that there are three dominant chief justices of American history, and they are John Marshall, Earl Warren, and William H. Rehnquist. I think that there’s just no question that he’s of enormous historical importance.” Conservative law professor and former Reagan Justice Department official Douglas Kmiec, a co-founder of the Federalist Society, says that Rehnquist presided over a “sea change” in the Court, taking it sharply to the right. (Neary 7/20/2005; Mauro 9/5/2005; Dean 2007, pp. 129-137)

In a Guardian op-ed, British MP and former cabinet minister Michael Meacher suggests that Saeed Sheikh, known for his alleged involvement in the 9/11 attacks and the murder of reporter Daniel Pearl, may have played a role in the 7/7 London bombings despite being held in a high-security Pakistani prison since 2002. Meacher states that “reports from Pakistan suggest that Sheikh continues to be active from jail, keeping in touch with friends and followers in Britain.” He cites the India-based Observer Research Foundation, which argues that there are even “grounds to suspect that the [7/7 London bombings] were orchestrated by [Saeed] Sheikh from his jail in Pakistan.” (Meacher 9/10/2005) While there have been no firm reports linking Sheikh to the 7/7 bombings, he did work with Pakistani militant leader Maulana Masood Azhar (in fact both were released in 1999 as part of a deal to end an airplane hijacking (see December 24-31, 1999)), and there are reports that two of the 7/7 bombers called Azhar and had dealings with others linked to Azhar’s militant group (see August 1, 2005).

Nineteen US Representatives, headed by Lamar Smith (R-TX) and Darrell Issa (R-CA), send a letter to President Bush warning of a “crisis along the Southwest border” of the nation “that needs immediate attention.” Smith and his fellow signatories complain that “coyotes,” or criminals who smuggle illegal immigrants across the border in attempts to avoid immigration procedures and the US Border Patrol, constitute a grave threat to national security. Smith references the case of Antonio Amparo-Lopez, a “coyote” whom, after being arrested, was let go by Carol Lam, the US Attorney in Southern California (see February 2, 2004 and July 30, 2004). Lam and other Justice Department officials have cited a severe lack of resources in their decisions not to prosecute low-level alleged criminals such as Amparo-Lopez. The signatories ask Bush to “dedicate additional resources and direct US Attorneys in the Southwest region to make the prosecution of human smugglers a priority.” Representative Randall “Duke” Cunningham is one of the signatories; he is under investigation by Lam’s office for corruption. Six weeks later, the Justice Department’s Office of Legislative Affairs sends what conservative columnist Byron York will call “a brush-off letter” in response. (US Department of Justice 3/23/2007 pdf file; York 3/28/2007)

A Spanish court sentences a number of people to prison for connections to al-Qaeda. The main defendant, Imad Eddin Barakat Yarkas, is convicted of leading an al-Qaeda cell in Madrid and conspiring to commit the 9/11 attacks by hosting a meeting in Spain in July 2001 attended by Mohamed Atta, Ramzi bin al-Shibh, and others (see July 8-19, 2001). He is sentenced to 27 years in prison. (McLean 9/27/2005) However, in 2006, Spain’s supreme court will overturn his 9/11 conspiracy conviction, after prosecutors reverse themselves and ask that the conviction be dismissed. One of the reasons for the dismissal is that the US, which possesses evidence supporting the convictions, is reluctant to provide it (see Mid-2002-June 1, 2006). This will leave Zacarias Moussaoui the only person in the world jailed for a role in the 9/11 attacks. Yarkas will still have to serve a 12-year sentence for leading an al-Qaeda cell. (Naughton 6/1/2006) Seventeen men besides Yarkas, mostly Syrians, are also found guilty and are given sentences of six to eleven years. One of these is Tayseer Allouni, a correspondent for the Al Jazeera satellite network. He is convicted of giving $4,500 to a family of Syrian exiles in Afghanistan. The prosecutor alleged the family were al-Qaeda operatives, while Allouni argued he gave the money for humanitarian reasons. Two others, a Moroccan named Driss Chebli and a Syrian named Ghasoub al-Abrash Ghalyoun, were acquitted of being involved in the 9/11 plot, but Chebli was convicted of collaborating with a terrorist group. Ghalyoun was accused of videotaping the World Trade Center and other American landmarks in 1997 for the 9/11 plotters, but he claimed he was just a tourist (see 1998). (McLean 9/27/2005; Green 9/27/2005; Crawford 9/27/2005)

John Roberts.John Roberts. [Source: In These Times]John Roberts is approved by the Senate to become the new chief justice of the US Supreme Court, replacing the recently deceased William Rehnquist (see September 5, 2005). Roberts, who once clerked for Rehnquist while Rehnquist was an associate justice, also served in the Reagan Justice Department and as an associate counsel to then-President Reagan. He was deputy solicitor general in the first Bush administration. George W. Bush appointed him to the DC Circuit Court in 2001. (White House 9/29/2005) Roberts was originally nominated to succeed the retiring Sandra Day O’Connor, but when Rehnquist died, Bush quickly withdrew the nomination for associate justice and refiled Roberts’s name for chief justice.
Characteristics and History - Roberts appeals to conservatives for a number of reasons; he has a powerful legal intellect, is soft-spoken, personable, and telegenic, and has not been outspoken about his views on issues like abortion and the right to privacy. Law professor Stephen Wermiel, who knows Roberts well, said in July that Roberts is not “somebody who… comes off as gruff or overbearing, which some people will recall was a factor in the [Robert] Bork hearings in 1987” (see July 1-October 23, 1987). Wermiel called Roberts’s nomination “a stroke of brilliance on the White House’s part.” One area of controversy surrounds Roberts’s work with Governor Jeb Bush of Florida during the bitterly contested 2000 presidential election, where Roberts helped construct the strategies used in the Bush v. Gore case that awarded George W. Bush the presidency. Another is Roberts’s membership in the Federalist Society, an organization of conservative activist judges, lawyers, and legal thinkers. A third is his advocacy, during his time with the first Bush administration, for scrapping decades of law providing for the separation of church and state in order to allow prayer in public schools. (Neary 7/20/2005) Four days before President Bush nominated him to the Court, Roberts voted in favor of upholding the Bush administration’s assertions about its wartime powers in the case of Hamdan v. Rumsfeld (see June 30, 2006), ruling that Bush need not consult Congress before setting up military commissions, and ruling that Bush is not bound by the strictures of the Geneva Convention. Liberals are unhappy with his stance against abortion, his representation as a private attorney of corporate mining interests seeking to dodge environmental regulations and of businesses trying to evade affirmative action requirements, as well as his attempts to curb environmentalists’ efforts to save endangered species. In 2007, reporter Charlie Savage will write that while progressives and liberals busily attacked Roberts for his positions on various “hot-button” issues, “[a]lmost lost amid the hubbub was” Roberts’s “unwavering commitment to the [expansion of] presidential power,” dating back to his 1980-81 clerkship under Rehnquist and his tenure as a White House lawyer under Ronald Reagan (see June-July 1983, October 1983, February 13, 1984, and May 16, 1984). (Savage 2007, pp. 251-255)
Quick Confirmation - The Senate agreed to expedite Roberts’s confirmation process in order to allow him to preside over the next session of the Supreme Court in October, and so gave its members little time to peruse his record. Roberts sailed through the Senate Judiciary Committee hearings, and is confirmed by a 78-22 vote. Roberts hit a brief snag when he divulged that he had met with Attorney General Alberto Gonzales just six days before hearing oral arguments in the Hamdan case, had met with Vice President Cheney and a select coterie of top White House officials while considering his verdict, and had met with Bush for the president’s final approval on the Court nomination the same day that he handed down his favorable ruling. Though 22 Democrats vote against his confirmation, because Roberts’s ascension to the Court does not change the ideological balance among the nine justices (Roberts is replacing the equally conservative Rehnquist), Senate Democrats decided not to filibuster his nomination. (Dean 2007, pp. 154-155; Savage 2007, pp. 252)

Damage to a restaurant in Kuta, Bali, in 2005.Damage to a restaurant in Kuta, Bali, in 2005. [Source: Associated Press]Three suicide bombers blow themselves up in restaurants on the island of Bali, Indonesia. Twenty-two people are killed and over 100 are injured. No group takes credit for the bombings, but Jemaah Islamiyah (JI), al-Qaeda’s main affiliate in Southeast Asia, is widely blamed. Several days later, Indonesian police announce they are searching for five men linked to Imam Samudra, who has been sentenced to death for his role in the 2002 Bali bombings (see October 12, 2002). Three of the five had already served jail sentences for holding explosives linked to Samudra and were under police surveillance but somehow escaped. The Indonesian government also blames Noordin Mohammed Top and Azhari Husin for masterminding the bombing. (CNN 10/5/2005) The two men had been members of JI and acted on direction from al-Qaeda, but JI’s leadership has largely been destroyed through arrests and killings, and it is believed they now form ad hoc groups to carry out new attacks. (Bonner 10/7/2005) Husin is killed in a raid on his hideout in Java two months later, but Top remains at large. One year later, it will be revealed that a computer laptop and a cell phone were smuggled to Samudra in his death row prison cell several months before the bombings, and he raised funds and communicated with the bombers while remaining imprisoned. An unnamed prison warden will reportedly be detained for helping Samudra get the laptop, but no one will be tried for any involvement in the bombings. (Parry 8/24/2006; Australian Broadcasting Corporation 9/24/2006)

Harriet Miers.Harriet Miers. [Source: Harpers.org]After President Bush successfully places conservative judge John Roberts as chief justice of the Supreme Court (see September 29, 2005), he names White House counsel and personal friend Harriet Miers to replace the retiring Sandra Day O’Connor on the Court.
Firestorm of Criticism - The media reacts adversely to this; Miers is said to be insufficiently qualified for the position and to have been chosen because of her loyalty to Bush. Her nomination is further derailed by opposition from hard-line conservatives, who do not believe she is conservative enough in her beliefs, particularly on abortion. Miers is certainly a weak choice from most viewpoints—she has no constitutional law experience and lacks a reputation as a strong legal thinker. She has never been a judge, nor even published an academic law journal article. Even conservative stalwart Robert Bork, who is still a center of controversy from his failed Court nomination (see July 1-October 23, 1987), calls Miers’s nomination “a disaster on every level.” When a letter Miers had written Bush for his birthday in 1997 is published in the media—in which Miers gushed over Bush in breathless, almost schoolgirlish prose, calling him “cool!” and “the best governor ever!”—the derision hits a fever pitch. When she submits a questionnaire to the Senate Judiciary Committee listing her background and qualifications for the job, a questionnaire almost devoid of pertinent and specific information, the ranking members of the committee threaten to have her do it over, a humiliation she avoids by withdrawing her name from consideration.
Trumped-Up Dispute over Executive Privilege - The Senate asks to see Miers’s White House memos to judge the quality of her legal work, and the White House refuses, citing executive privilege. Many view the dispute as a trumped-up conflict designed to allow the Bush administration to save what little face it can in the debacle; neoconservative columnist Charles Krauthammer had suggested engineering just such a “conflict” to stage “irreconcilable differences over documents” that would allow the Bush White House to withdraw Miers’s nomination over the issue.
Withdrawal - Miers indeed asks Bush to withdraw her nomination, and Bush cites the documents dispute in announcing the decision to pull Miers from consideration: “It is clear that senators would not be satisfied until they gained access to internal documents concerning advice provided during her tenure at the White House—disclosures that would undermine a president’s ability to receive candid counsel,” Bush says. “Harriet Miers’s decision demonstrates her deep respect for this essential aspect of the Constitutional separation of powers—and confirms my deep respect and admiration for her.” Bush settles on another nominee, Samuel Alito, to replace O’Connor (see October 31, 2005 - February 1, 2006). (Savage 2007, pp. 262-266; Dean 2007, pp. 155)
Staunch Advocate for Expanded Executive Power - In 2007, reporter and author Charlie Savage will write that, in his view, the Bush administration chose Miers for a simple reason: she is a staunch advocate for the continued expansion of presidential power. “Miers… could be counted on to embrace Bush’s expansive view of presidential powers,” he will write. Miers is quite loyal to Bush “and, through him, the institution he represented.” Miers’s adoration of Bush on a personal level would further guarantee her “solid support for any presidential claim of power that might come before the Court,” he will write. “Like Roberts before her, she was an executive branch lawyer who identified with the task of defending the prerogatives of the president.” On the questionnaire she submits to the Senate Judiciary Committee, Miers writes that as White House counsel, she has gained significant constitutional experience in “presidential prerogatives, the separation of powers, executive authority, and the constitutionality of proposed regulations and statutes.… My time serving in the White House, particularly as counsel to the president, has given me a fuller appreciation of the role of the separation of powers in maintaining our constitutional system. In that role, I have frequently dealt with matters concerning the nature and role of the executive power.” (Savage 2007, pp. 265-267)

In a speech, President Bush lists ten terrorist plots the US has supposedly foiled since 9/11, as well as five “casings and infiltrations.” Here are the plots, exactly as they are described in a White House press release, rearranged into a rough chronological order:
West Coast Airliner Plot - In mid-2002 the US disrupted a plot to attack targets on the West Coast of the United States using hijacked airplanes. The plotters included at least one major operational planner involved in planning the events of 9/11.
Jose Padilla Plot - In May 2002 the US disrupted a plot that involved blowing up apartment buildings in the United States. One of the plotters, Jose Padilla, also discussed the possibility of using a “dirty bomb” in the US.
2002 Straits of Hormuz Plot - In 2002 the US and partners disrupted a plot to attack ships transiting the Straits of Hormuz.
2002 Arabian Gulf Shipping Plot - In late 2002 and 2003 the US and a partner nation disrupted a plot by al-Qaeda operatives to attack ships in the Arabian Gulf.
2003 Karachi Plot - In the spring of 2003 the US and a partner disrupted a plot to attack Westerners at several targets in Karachi, Pakistan.
East Coast Airliner Plot - In mid-2003 the US and a partner disrupted a plot to attack targets on the East Coast of the United States using hijacked commercial airplanes.
2003 Tourist Site Plot - In 2003 the US and a partner nation disrupted a plot to attack a tourist site outside the United States.
Heathrow Airport Plot - In 2003 the US and several partners disrupted a plot to attack Heathrow Airport using hijacked commercial airliners. The planning for this attack was undertaken by a major 9/11 operational figure.
2004 UK Plot - In the spring of 2004 the US and partners, using a combination of law enforcement and intelligence resources, disrupted a plot to conduct large-scale bombings in [Britain].
2004 [British] Urban Targets Plot - In mid-2004 the US and partners disrupted a plot that involved urban targets in [Britain]. These plots involved using explosives against a variety of sites.
Here are the five additional “casings and infiltrations”:
2001 Tasking - In 2001, al-Qaeda sent an individual to facilitate post-September 11 attacks in the US. US law enforcement authorities arrested the individual.
2003 Tasking - In 2003, an individual was tasked by an al-Qaeda leader to conduct reconnaissance on populated areas in the US.
Gas Station Tasking - In approximately 2003, an individual was tasked to collect targeting information on US gas stations and their support mechanisms on behalf of a senior al-Qaeda planner.
Iyman Faris and the Brooklyn Bridge - In 2003, and in conjunction with a partner nation, the US government arrested and prosecuted Iyman Faris, who was exploring the destruction of the Brooklyn Bridge in New York. Faris ultimately pleaded guilty to providing material support to al-Qaeda and is now in a federal correctional institution.
US Government & Tourist Sites Tasking - In 2003 and 2004, an individual was tasked by al-Qaeda to case important US Government and tourist targets within the United States. (White House 10/6/2005)
However, later in the month the Washington Post publishes a story questioning the importance of most of these plots. The article states that the plot list “has confused counterterrorism experts and officials, who say they cannot distinguish between the importance of some incidents on the list and others that were left off. Intelligence officials who spoke on the condition of anonymity said the White House overstated the gravity of the plots by saying that they had been foiled, when most were far from ready to be executed. Others noted that the nation’s color-coded threat index was not raised from yellow, or ‘elevated’ risk of attack, to orange, or ‘high’ risk, for most of the time covered by the incidents on the list.” An anonymous former CIA counterterrorism official tells the Post that Bush made it “sound like well-hatched plans… I don’t think they fall into that category.” Another anonymous counterterrorism official says, “We don’t know how they came to the conclusions they came to… It’s safe to say that most of the [intelligence] community doesn’t think [the list is] worth very much.” (Goo 10/23/2005)

The Fourth Circuit Court of Appeals rules that President Bush, as commander in chief, can continue to hold Jose Padilla (see June 9, 2002), a US citizen arrested on US soil (see June 8, 2002), indefinitely as an enemy combatant. Padilla is to be treated the same as an American captured on a foreign battlefield (see June 28, 2004). The majority ruling is written by Judge J. Michael Luttig, often thought of as a potential Bush Supreme Court nominee. Luttig rules there is “no difference in principle between [Yaser Esam] Hamdi (see June 28, 2004) and Padilla.” Bush’s “powers include the power to detain identified and committed enemies such as Padilla, who associated with al-Qaeda and the Taliban regime, and who entered the United States for the avowed purpose of further prosecuting [terrorism] by attacking American citizens and targets on our own soil.” Luttig ignores the fact that Padilla has never been charged, much less convicted, of any crime. When the Bush administration later charges Padilla as an ordinary criminal—and does not charge him with with any of the terrorist activities it had long alleged he had committed—many administration critics will conclude that, just as in the Hamdi case, the administration had used inflammatory rhetoric and baseless charges to obtain a judicial decision it wanted (see October 10, 2004). When Luttig learns of the administration’s actions, he will issue a supplementary opinion excoriating the White House (see December 21, 2005). (Savage 2007, pp. 200)

CIA Director Porter Goss announces that the agency will not pursue disciplinary action against any current or former CIA officials who have been severely criticized in an internal report produced by John Helgerson, the CIA’s inspector general. Those who have read the classified report say that it faults about 20 intelligence officials, including former CIA Director George Tenet, his former Deputy Director of Operations James Pavitt, and the former head of the CIA’s Counter Terrorism Center Cofer Black (see June 2005). Tenet in particular is faulted for focusing too little attention on combating al-Qaeda as a whole in the years prior to 9/11. However, he and others who are singled out strongly object to the report’s conclusions, and have prepared lengthy rebuttals. The 9/11 Congressional Inquiry, of which Goss was ironically the co-chairman, had formally requested the report in November 2002, as it was finishing its investigation. The 400-page document was completed in June 2004, but its release was delayed (see June-November 2004). John Helgerson finally delivered it to Congress in August 2005, and had urged Goss to convene “accountability boards” to assess the performance of officers it criticized. However, Goss says he has decided not to do this. He says the report in no way suggests “that any one person or group of people could have prevented 9/11,” and that “[o]f the officers named in [Helgerson’s] report, about half have retired from the Agency, and those who are still with us are amongst the finest we have.” Goss also claims the report “unveiled no mysteries,” and states that it will remain classified. (Jehl 10/5/2005; Miller 10/6/2005; Linzer and Pincus 10/6/2005) In response to Goss’s statement, Sen. John D. Rockefeller (D-WV), the senior Democrat on the Senate Select Committee on Intelligence, asks, “What failures in performance, if not these, warrant the convening of an accountability board at the CIA?” 9/11 victim’s relative Kristen Breitweiser comments, “No one has been held accountable for the failures on 9/11.” (Reuters 10/5/2005)

Abdurrahman Wahid.Abdurrahman Wahid. [Source: Indonesian Embassy in the Netherlands]In an interview with the Australian public television station SBS, Abdurrahman Wahid, president of Indonesia from 1999 to 2001, suggests that the country’s military or police may have been behind the 2002 Bali bombings (see October 12, 2002). The Australian reports: “Wahid told SBS’s Dateline program that he had grave concerns about links between Indonesian authorities and terrorist groups and believed that authorities may have organized the larger of the two 2002 Bali bombings which hit the Sari Club, killing the bulk of the 202 people who died.… Asked who he thought planted the Sari Club bomb, Mr Wahid said: ‘Maybe the police… or the armed forces. The orders to do this or that came from within our armed forces, not from the fundamentalist people.’” Wahid believes the smaller bomb was indeed planted by Islamist militants. (SBS Dateline 10/12/2005; Stewart and Powell 10/13/2005) Counterterrorism expert John Mempi also comments, “Why this endless violence [in Indonesia]? Why are there acts of terrorism year in, year out? Regimes change, governments change, but violence continues. Why? Because there is a sort of shadow state in this country. A state within a state ruling this country.” (SBS Dateline 10/12/2005) In 2008, Imam Samudra, imprisoned and sentenced to death for being one of the Bali bombings masterminds, will make comments similar to Wahid’s. While he admits being involved in the bombings, he claims that they never meant to kill so many people. He says the second explosion was much bigger than they had expected and suggests that “the CIA or KGB or Mossad” had somehow tampered with the bomb. (Sheridan 3/2/2008)

Representative Darrell Issa (R-CA) writes a letter to the US Attorney for Southern California, Carol Lam (see November 8, 2002), complaining about her “apparent instance of discretionary non-prosecution of criminal illegal aliens.” He says that Lam should immediately reverse her decision not to prosecute Alfredo Gonzales Garcia (also recorded as “Alfredo Garcia-Gonzalez”), a repeat offender currently in the custody of the Border Patrol; he writes, “Criminal alien repeat offenders pose a significant danger to our citizens and must be dealt with more severely than a 24-hour detention and release.” He continues: “Your office has established an appalling record of refusal to prosecute even the worst criminal alien offenders.… Every time one of these criminals is released, our communities become more dangerous.” (Issa 10/13/2005 pdf file; US Department of Justice 3/23/2007 pdf file; US House of Representatives, Committee on the Judiciary 4/13/2007 pdf file) Issa and his fellow Republicans have long pressured Lam to prosecute more immigrant cases (see February 2, 2004, July 30, 2004, November 4, 2004 - (February 2005), (December 30, 2004), and September 23, 2005). Issa has also accused Lam, apparently without proof, of having a policy of not prosecuting “immigration ‘mules,’” apparently referring to immigrant “smugglers,” sometimes called “coyotes,” who help immigrants illegally cross the border from Mexico into the US. In June 2005, Lam denied having such a policy, but did note that “it is not physically possible to prosecute every alien (or coyote) who is arrested” and therefore her office “must focus its prosecutorial resources on those aliens who pose the greatest danger to the United States by their presence.” At the same time, Assistant Attorney General William Moschella wrote in response: “The Southern District of California (SDCA) does not have a policy against prosecuting coyotes, publicly stated or otherwise. Nor does any other district. In fact, SDCA has aggressively prosecuted coyotes for years, with an increasing number of cases in each year since 2001.” (US House of Representatives, Committee on the Judiciary 4/13/2007 pdf file)

The Justice Department decides not to prosecute in most cases where detainees were abused and killed by the CIA. The cases, of which there are apparently eight, had been referred to the department by the CIA’s inspector general (see (August 2004)) and were investigated primarily by the US Attorneys Office for the Eastern District of Virginia, although officials at department headquarters in Washington are also involved in the decision not to prosecute. Although some of the cases are still technically under review at this time, the department indicates it does not intend to bring charges. (Jehl and Golden 10/23/2005) The cases include:
bullet The death of Iraqi prisoner Manadel al-Jamadi in CIA custody in November 2003 (see Between 4:30 a.m. and 5:30 a.m. November 4, 2003 and (7:00 a.m.) November 4, 2003);
bullet The asphyxiation of Major General Abed Hamed Mowhoush in Iraq, also in November 2003 (see November 24 or 25, 2003 and November 26, 2003). This incident involved the military, as well as at least one CIA contractor; (Jehl and Golden 10/23/2005)
bullet The intimidation of al-Qaeda leader Abd al-Rahim al-Nashiri by a CIA officer named “Albert” using a gun and drill (see September 11, 2003).
bullet The death of detainee Gul Rahman, who froze to death at the Salt Pit prison in Afghanistan (see November 20, 2002). The case was examined by prosecutors, but, in the end, a recommendation not to prosecute the officer who caused the detainee to die is made. (Johnson, Markon, and Tate 9/19/2009) The officer’s first name is not known, although his last name is Zirbel. (Mahoney and Johnson 10/9/2009, pp. 29 pdf file) The decision is made because prosecutors conclude that the prison was outside the reach of US law; although the CIA funded it and vetted its Afghan guards, it was technically an Afghan prison. In addition, it is unclear whether Rahman, who was captured in Pakistan and then taken to Afghanistan, would have died from injuries sustained during his capture, rather than by freezing. Although hypothermia was listed as the cause of death in the autopsy, the body was not available to investigators. According to the Washington Post, “questions remain whether hypothermia was used as a cover story in part to protect people who had beaten the captive.” However, according to a “senior official who took part in the review,” the decision not to prosecute in this case is not initially that clear, and an indictment is considered. However, the prosecutors decide not to press charges against Zirbel and a memo explaining this decision is drafted. An official involved in the review will later say there is “absolutely no pressure” from the Justice Department’s management to decide not to prosecute. However, a later report by the Post will indicate there may be a split among prosecutors over the decision, and that a political appointee, US Attorney for the Eastern District of Virginia Paul McNulty, assesses the case. McNulty will be nominated for the position of deputy attorney general around this time (see October 21, 2005). (Johnson, Markon, and Tate 9/19/2009)
However, one CIA employee, a contractor named David Passaro, has been charged with detainee abuse (see June 18-21, 2003). (Jehl and Golden 10/23/2005) The department will begin a second review of some or all of these cases in 2009 (see August 24, 2009).

David Wurmser, an aide to Vice President Dick Cheney, begins cooperating with the investigation into the exposure of Valerie Plame Wilson as a CIA agent. This follows the news that another Cheney aide, John Hannah, is also cooperating (see Before October 17, 2005). The news that Wurmser is cooperating comes from sources close to the investigation. He is expected to provide special counsel Patrick Fitzgerald with evidence that the leak of Plame Wilson’s identity was part of a coordinated effort to discredit her husband, war critic Joseph Wilson (see June 2003, June 3, 2003, June 11, 2003, June 12, 2003, June 19 or 20, 2003, July 6, 2003, July 6-10, 2003, July 7, 2003 or Shortly After, 8:45 a.m. July 7, 2003, 9:22 a.m. July 7, 2003, July 7-8, 2003, July 11, 2003, (July 11, 2003), July 12, 2003, July 12, 2003, July 18, 2003, October 1, 2003, April 5, 2006, and April 9, 2006). Wurmser is Cheney’s adviser on Middle East affairs, and formerly served as an assistant to then-Undersecretary of State John Bolton (see May 29, 2003). The sources say Wurmser is cooperating in order to negate potential criminal charges for his role in exposing Plame Wilson’s identity. Wurmser was a key member of the White House Iraq Group (WHIG—see August 2002), the propaganda group that operated primarily out of Cheney’s office. The sources say that in June 2003, Wurmser and Hannah were ordered by their superiors in Cheney’s office to leak Plame Wilson’s name and CIA identity in an attempt to discredit her husband, Joseph Wilson. In 2004, Wurmser was questioned by the FBI for his role in divulging classified national security information to Israel, an investigation that included Hannah and several prominent neoconservatives in the Defense Department. Wilson says: “John Hannah and David Wurmser, mid-level political appointees in the vice president’s office, have both been suggested as sources of the leak.… Mid-level officials, however, do not leak information without the authority from a higher level.” (Leopold and Alexandrovna 10/19/2005)

Eighteen Republican lawmakers sign a letter written by Representative Darrell Issa (R-CA) criticizing Southern California’s US Attorney Carol Lam (see November 8, 2002) for what they call her “lax” handling of immigration cases. Representative Randall (“Duke”) Cunningham is one of the signatories; he is under investigation by Lam’s office for corruption. Issa claims that Lam is using a “catch and release” policy towards illegal immigrants caught by law enforcement officials, and refusing to prosecute such immigrants unless they have already been convicted of two felonies. David L. Smith, a legislative counsel in the Executive Office for US Attorneys, writes a draft response that is never delivered, as the Justice Department is working to set up a briefing for Issa. Another lawyer in the same office, John Crews, will later write: “The issue of catch and release is an administrative, which is to say—non criminal context. The USAO’s [US Attorneys’ offices] don’t get involved in this part of immigration enforcement.” Smith’s response indicates that Lam’s office, “along with the USAOs for just four other districts, prosecuted over two-thirds of the criminal immigration cases nationwide last year.” Smith will later indicate that he does not know if the briefing ever took place. (US House of Representatives 10/20/2005 pdf file; US Department of Justice 2006 pdf file; US House of Representatives, Committee on the Judiciary 4/13/2007 pdf file; Thomas 2011)

The White House announces that President Bush will nominate Paul McNulty to be the next deputy attorney general. McNulty is currently the US Attorney for the Eastern District of Virginia, which the Washington Post will describe as the “central legal front in the Bush administration’s anti-terrorism strategy.” He was involved in the prosecutions of “American Taliban” John Walker Lindh and Zacarias Moussaoui, sometimes referred to as a candidate for the “20th hijacker” on 9/11. McNulty’s nomination comes after the previous nominee, Timothy E. Flanigan, withdrew his name from consideration at the start of the month due to opposition in the Senate. McNulty will keep his current job and serve as acting deputy attorney general until confirmed by the Senate. (Eggen and Markon 10/22/2005) McNulty recently took a decision not to prosecute CIA officers who abused and killed detainees in some cases referred to his office by the agency’s inspector general (see (August 2004) and Mid-October 2005).

The American Civil Liberties Union (ACLU) releases a report that documents the death of 44 detainees in Iraq and Afghanistan while in US custody. Most died during interrogation. The report, based on government reports (including autopsy reports, death reports, and other documents turned over to the ACLU through a Freedom of Information Act request), finds that “detainees were hooded, gagged, strangled, beaten with blunt objects, subjected to sleep deprivation, and to hot and cold environmental conditions.” ACLU director Anthony Romero says: “There is no question that US interrogations have resulted in deaths. High-ranking officials who knew about the torture and sat on their hands and those who created and endorsed these policies must be held accountable. America must stop putting its head in the sand and deal with the torture scandal that has rocked our military.” The detainees died during or after interrogations by Navy SEALs, military intelligence officials, and “OGA” (Other Governmental Agency) personnel, a designation the ACLU says is usually used to refer to the CIA. Twenty-one of the 44 deaths were homicides, the ACLU says. Eight died from abusive techniques; autopsy reports show the causes of death were “strangulation,” “asphyxiation,” and “blunt force injuries.” Most of the “natural deaths” were attributed to what government doctors termed “Arteriosclerotic Cardiovascular Disease.” The ACLU notes that the report proves that detainees died not only at the hands of CIA personnel, but from abuse and maltreatment by Navy SEALs and military intelligence officials as well. The report cites, among other deaths, an Iraqi prisoner who died from hypothermia (see April 5, 2004), an Iraqi prisoner who was strangled and beaten to death (see January 9, 2004), an Iraqi general who died from smothering and “chest compressions” (see November 26, 2003), an Iraqi prisoner beaten and smothered to death (see Between 4:30 a.m. and 5:30 a.m. November 4, 2003), two Afghani civilians beaten to death by US soldiers (see November 6, 2003 and December 10, 2002), and an older Iraqi man strangled to death while in US custody (see June 5, 2003). ACLU lawyer Amrit Singh says: “These documents present irrefutable evidence that US operatives tortured detainees to death during interrogations. The public has a right to know who authorized the use of torture techniques and why these deaths have been covered up.” (American Civil Liberties Union 10/24/2005)

The media learns that Vice President Dick Cheney and staffers from the Office of the Vice President (OVP) regularly interfered with the Senate Intelligence Committee’s 2004 report on the intelligence community’s failures to accurately assess Iraq’s WMD threat (see July 9, 2004). According to administration and Congressional sources, that interference was facilitated and encouraged by committee chairman Pat Roberts (R-KS). Cheney and the OVP members regularly intervened in the committee’s deliberations, and drastically limited the scope of the investigation.
Protecting the Bush Administration - Reporter Laura Rozen will later write, “In order to prevent the White House and the Office of the Vice President itself from ever coming under any Congressional oversight scrutiny, Cheney exerted ‘constant’ pressure on [Roberts] to stall an investigation into the Bush administration’s use of flawed intelligence on Iraq.” Cheney and the OVP also withheld key documents from the committee. Some of the withheld materials included portions of then-Secretary of State Colin Powell’s February 2003 address to the United Nations (see February 5, 2003) that were written by Cheney’s then-chief of staff, Lewis Libby, and documents that Libby used to make the administration’s case for war with Iraq. The OVP also withheld the Presidential Daily Briefing (PDB) documents: written intelligence summaries provided to President Bush by the CIA. The decision to withhold the documents was spearheaded by Cheney’s chief legal counsel and chief of staff David Addington. Much of the withheld material, and Cheney-OVP interference, was designed to keep the committee from looking into the Bush administration’s use of intelligence findings to promote the war. According to committee member John D. Rockefeller (D-WV), Cheney attended regular policy meetings in which he gave White House orders to Republican committee staffers. It is “not hearsay,” Rockefeller says, that Cheney pushed Roberts to, in reporter Jonathan Landay’s words, “drag out the probe of the administration’s use of prewar intelligence.” The committee chose to defer the second portion of its report, about the administration’s use of intelligence to propel the nation to war, until after the November 2004 elections. That portion of the report remains uncompleted.
Shifting the Blame to the White House - Reporter Murray Waas writes, “Had the withheld information been turned over, according to administration and Congressional sources, it likely would have shifted a portion of the blame away from the intelligence agencies to the Bush administration as to who was responsible for the erroneous information being presented to the American public, Congress, and the international community.” He continues: “When the [report] was made public, Bush, Cheney, and other administration officials cited it as proof that the administration acted in good faith on Iraq and relied on intelligence from the CIA and others that it did not know was flawed. But some Congressional sources say that had the committee received all the documents it requested from the White House the spotlight could have shifted to the heavy advocacy by Cheney’s office to go to war. Cheney had been the foremost administration advocate for war with Iraq, and Libby played a central staff role in coordinating the sale of the war to both the public and Congress.” (Waas 10/27/2005; Wilson 2007, pp. 381)

In light of the indictment of Lewis “Scooter” Libby (see October 28, 2005), the Center for American Progress (CAP) puts out an analysis of Libby’s role as Vice President Dick Cheney’s chief of staff, and the impact Libby has had on Bush administration policies. Libby, a powerful and influential neoconservative, “has been one of the most important men pulling the levers behind the Bush administration,” the article finds. “From the very beginning of the administration, Libby has essentially been Dick Cheney’s Dick Cheney.” But, the article goes on to note: “[w]hat few have realized at this historic moment is that for the past four and a half years, Libby has been ‘scooting’ from scandal to scandal. Libby has been at center stage for the other major national security scandals of the Bush administration, including the Iraq intelligence debacle, the secret meetings about Halliburton contracts, and doubtless others we have not heard of yet. It was Libby—along with Paul Wolfowitz, Doug Feith, and a handful of other top aides at the Pentagon and White House—who convinced the president that the US should go to war in Iraq. It was Libby who pushed Cheney to publicly argue that Saddam Hussein had ties to al-Qaeda and 9/11. It was also Libby who prodded former Secretary of State Colin Powell to include specious reports about an alleged meeting between 9/11 terrorist Mohamed Atta and an Iraqi intelligence official in Powell’s February 2003 speech to the United Nations” (see February 5, 2003). Libby co-authored the controversial Defense Planning Guidance document of 1988 (see February 18, 1992) that called on the US to essentially transform itself into an aggressive empire, using its military to stretch its power around the world. “This Planning Guidance document went a long way toward endearing Libby to Cheney,” the CAP article reads. There is also evidence that Libby helped steer no-bid Iraqi reconstruction contracts to Cheney’s former firm, Halliburton. The article concludes, “Given the depth of his influence in shaping the White House agenda over the past four and a half years, losing Libby today is not only a huge blow to the vice president, but to the entire Bush administration.” (Lyman 10/28/2005)

In an op-ed, the Wall Street Journal’s editorial staff accuses special counsel Patrick Fitzgerald of “criminalizing politics” in his investigation of the Plame Wilson leak. Fitzgerald’s investigation, the editorial reads, has taken two years, cost millions of dollars, jailed a reporter (see July 6, 2005), “and preoccupied some of the White House’s senior officials.” The investigation has culminated in the indictment of former White House official Lewis Libby (see October 28, 2005), not for leaking Valerie Plame Wilson’s identity to the press, but for what the Journal calls “contradictions between his testimony and the testimony of two or three reporters about what he told them, when he told them, and what words he used.” The Journal writes that there is no evidence, at least to the public’s knowledge, that Libby lied to anyone, be it the FBI (see October 14, 2003 and November 26, 2003), the grand jury (see March 5, 2004 and March 24, 2004), or anyone else. Nowhere has anyone alleged a motive for Libby’s alleged perjury, the Journal states (see June 2003, June 3, 2003, June 11, 2003, June 12, 2003, June 19 or 20, 2003, July 6, 2003, July 6-10, 2003, July 7, 2003 or Shortly After, 8:45 a.m. July 7, 2003, 9:22 a.m. July 7, 2003, July 7-8, 2003, July 11, 2003, (July 11, 2003), July 12, 2003, July 12, 2003, July 18, 2003, October 1, 2003, April 5, 2006, and April 9, 2006). And, the Journal notes, Libby was not a source for the column that actually outed Plame Wilson as a CIA official. The Journal questions the existence of any White House “conspiracy to silence administration critics,” and if there was, it writes, “it was more daft than deft.” Instead, the Journal writes, the Libby indictment “amounts to an allegation that one official lied about what he knew about an underlying ‘crime’ that wasn’t committed.” Fitzgerald is merely involving himself in what the Journal calls “a policy dispute between an elected administration and critics of the president’s approach to the war on terror, who included parts of the permanent bureaucracy of the State Department and CIA.” (Wall Street Journal 10/29/2005)

John Rizzo.John Rizzo. [Source: C-SPAN]Guidance is issued by CIA lawyers Robert Eatinger and Steven Hermes to the CIA’s National Clandestine Service (NCS) on the preservation of videotapes of detainee interrogations made by the CIA. (Mazzetti and Shane 12/19/2007) The guidance is apparently used as justification for the tapes’ destruction (see November 2005), but its content is unclear. According to one account, “Lawyers within the clandestine branch of the Central Intelligence Agency gave written approval in advance to the destruction in 2005 of hundreds of hours of videotapes documenting interrogations of two lieutenants from al-Qaeda.” (Mazzetti and Shane 12/11/2007) Another account supports this, saying the lawyers give “written guidance to [CIA manager Jose] Rodriguez that he had the authority to destroy the tapes and that the destruction would violate no laws.” (Mazzetti and Shane 12/19/2007) However, according to another account: “[The guidance] advises that there is no explicit legal reason why the Clandestine Service had to preserve the tapes… The document does not, however, directly authorize the tapes’ destruction or offer advice on the wisdom or folly of such a course of action.” (Isikoff and Hosenball 12/11/2007) Some CIA videotapes have been requested for court proceedings, meaning such tapes should not be destroyed, but it is unclear if the tapes that are destroyed in November 2005 have been requested by courts or not (see May 7-9, 2003 and November 3-14, 2005). The CIA’s top lawyer, John Rizzo, is not asked for an opinion, although he has been involved in discussions about what to do with the tapes for years and several high-ranking officials and legislators are of the opinion that the tapes should not be destroyed (see November 2005). (Mazzetti and Shane 12/11/2007) Eatinger and Hermes apparently inform Rizzo they have issued the guidance and expect Rodriguez will consult him before destroying the tapes, but Rodriguez does not do so. (Mazzetti and Shane 12/19/2007) The New York Times will comment, “It is unclear what weight an opinion from a lawyer within the clandestine service would have if it were not formally approved by Mr. Rizzo. But [an anonymous former official] said Mr. Rodriguez and others in the clandestine branch believed the legal judgment gave them the blessing to destroy the tapes.” The former official will also say they “didn’t need to ask Rizzo’s permission.” (Mazzetti and Shane 12/11/2007) A lawyer acting for Rodriguez will later say, “He had a green light to destroy them.” (Mazzetti and Shane 12/19/2007) However, other former CIA officers will express surprise that a lawyer junior to Rizzo would approve such a controversial decision without asking for his input. Former CIA lawyer John Radsan will say, “I’d be surprised that even the chief [NCS] lawyer made a decision of that magnitude without bringing the General Counsel’s front office into the loop.” He adds, “Although unlikely, it is conceivable that once a CIA officer got the answer he wanted from a [NCS] lawyer, he acted on that advice… But a streamlined process like that would have been risky for both the officer and the [NCS] lawyer.” (Mazzetti and Shane 12/11/2007)

The Central Intelligence Agency destroys videotapes of the interrogations of two high-ranking detainees, Abu Zubaida and Abd al-Rahim al-Nashiri, which were made in 2002 (see Spring-Late 2002). One anonymous senior intelligence official later claims that “Several hundred hours” of videotapes are destroyed. (Eggen and Pincus 12/18/2007) The tapes are destroyed at the CIA station in Thailand by station chief Michael Winograd, as Zubaida and al-Nashiri apparently were tortured at a secret CIA prison in that country. (Hosenball 6/28/2008; Goldman and Apuzzo 7/26/2010) The decision to destroy the tapes is apparently made by Jose Rodriguez, chief of the CIA’s Directorate of Operations, despite previous advice not to destroy them (see November 2005). However, some accounts will suggest that Rodriguez received clearance to destroy the tapes (see December 7, 2007). (Mazzetti 12/8/2007) The CIA’s treatment of detainees has recently come under increased scrutiny. As the Wall Street Journal will later remark, “the Abu Ghraib prison pictures were still fresh, the existence of secret CIA prisons had just been revealed, and politicians on Capitol Hill were talking about curtailing ‘extreme techniques,’ including the Central Intelligence Agency’s own interrogation tactics.” (Gorman 12/10/2007) Beginning on November 2, 2005, there are some pivotal articles revealing details about the CIA’s handling of detainees, suggesting that some of them were illegally tortured (see November 2-18, 2005). According to a 2007 statement by future CIA Director Michael Hayden, the tapes are destroyed “in the absence of any legal or internal reason to keep them” and because they apparently pose “a serious security risk”; if they were leaked, they could be used for retaliation by al-Qaeda and its sympathizers. (Central Intelligence Agency 12/6/2007) However, this rationale will be questioned when the destruction is revealed in late 2007 (see December 6, 2007). Senator Carl Levin (D-MI) will call this “a pathetic excuse.… You’d have to burn every document at the CIA that has the identity of an agent on it under that theory.” CBS News will offer an alternative explanation, saying that the tapes are destroyed “to protect CIA officers from criminal prosecution.” (CBS News 12/7/2007) CIA Director Porter Goss and the CIA’s top lawyer, John Rizzo, are allegedly not notified of the destruction in advance, and Rizzo will reportedly be angry at this failure. (Mazzetti 12/8/2007) But Newsweek will later claim that Goss and Rizzo were involved in extensive discussions with the White House over what to do with the tapes. Goss supposedly thought there was an understanding the tapes would be saved and is upset to learn they have been destroyed (see Between 2003-Late 2005 and Before November 2005). (Isikoff and Hosenball 12/11/2007) Congressional officials responsible for oversight are not informed for a year (see March 14, 2007). A White House spokeswoman will say that President Bush has “no recollection” of being made aware of the tapes’ destruction before 2007 (see December 11, 2007). It is also unclear whether the Justice Department is notified in advance or not. (Mazzetti 12/8/2007) The CIA still retains tapes of interrogations of at least one detainee (see September 19 and October 18, 2007).

Following a request that the CIA be exempted from a US ban on torture, claims about alleged CIA mistreatment of prisoners begin to appear in the media, apparently fueled by CIA employees unhappy with the practices the CIA is employing. On November 2, the Washington Post reveals information about the CIA’s network of secret prisons, including facilities in Europe, which is kept secret from “nearly all members of Congress charged with overseeing the CIA’s covert actions.” The rationale for the policy is that the CIA apparently needs to hold people without the restrictions imposed by the US legal system, in order to keep the country safe. Detainees are said to be tortured, and this is not only questionable under US law, but, in some cases, against the law of the host country. (Priest 11/2/2005) On November 9, the New York Times reveals that in 2004, the CIA’s Inspector General secretly concluded that the CIA’s aggressive interrogation techniques in use up until that time were likely in violation of a 1994 international treaty against torture signed by the US (see May 7, 2004). (Jehl 11/9/2005) After the network is revealed, there is much interest in what actually goes on in it and more important details are uncovered by ABC News on November 18. Apparently, the CIA’s interrogation techniques have led to the death of one detainee and include sleep deprivation, physical violence, waterboarding, and leaving prisoners in cold cells (see Mid-March 2002). The intelligence generated by these techniques is said to be questionable, and one source says: “This is the problem with using the waterboard. They get so desperate that they begin telling you what they think you want to hear.” (Ross and Esposito 11/18/2005) Some videotapes of CIA interrogations of detainees are destroyed this same month, although what date this happens exactly is unclear (see November 2005). The CIA is also so alarmed by these revelations that it immediately closes its secret prisons in Eastern Europe and opens a new one in a remote section of the Sahara desert (see November 2005).

On November 3, 2005, Leonie Brinkema, the judge in the Zacarias Moussaoui trial, asks the CIA about recordings of interrogations of detainees who are related to the Moussaoui case. Eleven days later, the CIA again incorrectly claims to prosecutors in that trial that it has no such recordings. The CIA made a similar claim in 2003 (see May 7-9, 2003), but in fact the CIA secretly videotaped detainee interrogations in 2002 (see Spring-Late 2002). Some of these videotapes are destroyed this month (see November 2005), however it is unknown if the destruction takes place before or after this date. In late 2007, the CIA will reveal that it did have some videotapes after all and prosecutors will finally be able to view some of them (see September 19 and October 18, 2007). But it will also be revealed that most of the videotapes were destroyed (see December 6, 2007). Prosecutors will later claim that neither the video nor the audio recordings contained material relevant to the Moussaoui trial, and some of the content of the interrogations was provided during discovery. (US District Court for the Eastern District of Virginia, Alexandria Division 7/31/2006; US District Court for the Eastern District of Virginia, Alexandria Division 10/25/2007 pdf file; Vicini 11/13/2007)

The US charges British citizen Binyam Ahmed Mohamed (see May-September, 2001), who has allegedly used the aliases Talha al-Kini, Foaud Zouaoui, Taha al-Nigeri, and John Samuel, with conspiracy to foment and carry out terrorist attacks against US targets. Mohamed, who was arrested in Pakistan in April 2002, is charged with “attacking civilians; attacking civilian objects; murder by an unprivileged belligerent; destruction of property by an unprivileged belligerent; and terrorism,” though the charge sheet is unclear whether Mohamed carried out any of these actions himself, or whether he was part of a larger conspiracy by the al-Qaeda terrorist organization. The charges allege links between Mohamed and “shoe bomber” Richard Reid (see December 22, 2001), radical Islamist Abu Zubaida, 9/11 plotter Khalid Shaikh Mohammed, and alleged “dirty bomber” Jose Padilla. Mohamed is alleged to have been part of the Padilla bomb plot. (US Defense Department 11/4/2005 pdf file) Much of the evidence against Mohamed comes from confessions he allegedly made while in US custody at the detention camp at Bagram Air Force Base (see January-September 2004), and in Guantanamo Bay (see September 2004 and After). He was also held in Pakistan (see April 10-May, 2002 and May 17 - July 21, 2002), and “rendered” to a secret prison in Morocco (see July 21, 2002 -- January 2004). Through his lawyers, Mohamed has claimed that he was tortured in all four detention sites. The British judiciary will later establish that British officials facilitated Mohamed’s interrogation in Pakistan, and had “full knowledge of the reported conditions of his detention and treatment” (see February 24, 2009). (Guardian 2/5/2009) As with Padilla, the charges relating to the “dirty bomb” plot will later be dropped due to lack of evidence, and all charges against Mohamed will eventually be dropped (see October-December 2008 and February 4, 2009).

Washington Post reporter Bob Woodward testifies under oath in a sworn deposition to special counsel Patrick Fitzgerald concerning his knowledge of the identity of outed CIA agent Valerie Plame Wilson (see December 30, 2003), and how he came upon that knowledge. Woodward testifies that he spoke “with three current or former Bush administration officials” in regards to his book Plan of Attack. He testifies for two hours under an agreement that he will only discuss matters specifically relevant to Fitzgerald’s investigation, and with written statements from each of the three administration officials waiving confidentiality “on the issues being investigated by Fitzgerald.” Woodward’s name came to Fitzgerald’s attention after one of the three officials, former Deputy Secretary of State Richard Armitage, told Fitzgerald that he had revealed Plame Wilson’s identity to Woodward (see June 13, 2003 and After October 28, 2005). In his story for the Post about his testimony, Woodward does not reveal Armitage’s identity, but it is soon disclosed by other sources (see March 14, 2006). Woodward spoke with a second administration official, whose identity he also does not disclose, and with Vice President Dick Cheney’s chief of staff, Lewis “Scooter” Libby, but says he did not discuss Plame Wilson with either Libby or the other official (see June 23, 2003). He testifies that he did not discuss Plame Wilson with any other government officials (see June 20, 2003) before Robert Novak publicly outed her on July 14 (see July 14, 2003). Woodward notes, “It was the first time in 35 years as a reporter that I have been asked to provide information to a grand jury.” (Woodward 11/16/2005; VandeHei and Leonnig 11/16/2005; Washington Post 7/3/2007) Investigative reporters for the progressive news Web site Raw Story identify National Security Adviser Stephen Hadley as Woodward’s source for Plame Wilson’s identity, a claim echoed by the Times of London. Hadley refuses to answer questions on the topic. (Alexandrovna and Leopold 11/16/2005; Smith and Baxter 11/20/2005) In 2006, the National Security Council will refuse to directly deny Hadley’s involvement, and will request that Raw Story attribute denials to the White House and not to itself.) (Alexandrovna 3/19/2006)
Woodward Told Second Reporter about Plame Wilson - Woodward testifies that he told another reporter about Plame Wilson: “I told Walter Pincus, a reporter at the Post, without naming my source, that I understood Wilson’s wife worked at the CIA as a WMD analyst.” Pincus says he has no memory of Woodward telling him anything about Plame Wilson, and says he would certainly have remembered such a conversation, especially since he was writing about Plame Wilson’s husband, war critic Joseph Wilson, at the time (see June 3, 2003, June 11, 2003, June 12, 2003, and (July 11, 2003)). “Are you kidding?” Pincus says. “I certainly would have remembered that.” Pincus believes Woodward is confused about the timing and the nature of their conversations; he remembers Woodward making a vague allusion to Plame Wilson in October 2003. That month, Pincus had written a story explaining how an administration source had contacted him about Wilson. Pincus recalls Woodward telling him that he was not the only person who had been contacted.
Libby Lawyer: Woodward's Testimony Undermines Case against Client - Lewis Libby’s lawyer, William Jeffress, says Woodward’s testimony undermines the case Fitzgerald is building against his client (see October 28, 2005). “If what Woodward says is so, will Mr. Fitzgerald now say he was wrong to say on TV that Scooter Libby was the first official to give this information to a reporter?” Jeffress says. “The second question I would have is: Why did Mr. Fitzgerald indict Mr. Libby before fully investigating what other reporters knew about Wilson’s wife?” (VandeHei and Leonnig 11/16/2005)
Plame Wilson 'Deeply Disappointed' in Woodward - In 2007, Plame Wilson will write, “I was deeply disappointed that [Woodward] had chosen to react as a journalist first and a responsible citizen only when his source ‘outed’ him to the special prosecutor.” (Wilson 2007, pp. 238)

David Smith, the legislative counsel for the Executive Office for US Attorneys, writes a response to Republican complaints about the performance of Southern California US Attorney Carol Lam (see October 20, 2005). Lam’s critics allege that she has been “lax” in prosecuting immigration cases. Smith writes: “At the close of Fiscal Year 2005, SDCA [the Southern District of California, Lam’s office] had 385 alien smuggling [illegal immigration] cases pending against 454 defendants, which is the highest annual number of cases that office has ever had.… [D]espite the fact that both the SDCA and the Department of Justice as a whole have numerous criminal priorities in addition to criminal aliens, from Fiscal Year 200 through Fiscal Year 2005, well over half of all criminal cases filed by SDCA were cases filed under just three statutes, the primary criminal alien statutes.” The actual letter on the subject is slated to be sent from the office of Assistant Attorney General William Moschella, but it is unclear if the letter is ever actually sent. (Thomas 2011)

McCain speaking against torture on Fox News.McCain speaking against torture on Fox News. [Source: Daily Gadfly (.com)]Senator John McCain (R-AZ), a former prisoner of war during the Vietnam War and a victim of torture, writes an impassioned op-ed for Newsweek exhorting the US not to resort to torture in its interrogations of terror suspects. He writes: “I do, respectfully, take issue with the position that the demands of this war require us to accord a lower station to the moral imperatives that should govern our conduct in war and peace when they come in conflict with the unyielding inhumanity of our vicious enemy.… We should not torture or treat inhumanely terrorists we have captured. The abuse of prisoners harms, not helps, our war effort.”
Produces False Information - He gives numerous reasons: abusing prisoners does not produce reliable information, but instead “often produces bad intelligence because under torture a person will say anything he thinks his captors want to hear—whether it is true or false—if he believes it will relieve his suffering.” McCain recounts his own example of providing false information under torture, giving his captors the names of the Green Bay Packers’ offensive line instead of the names of his flight squadron. “It seems probable to me that the terrorists we interrogate under less than humane standards of treatment are also likely to resort to deceptive answers that are perhaps less provably false than that which I once offered.”
Betrays America's 'Commitment to Basic Humanitarian Values' - Moreover, McCain writes, America’s “commitment to basic humanitarian values affects—in part—the willingness of other nations to do the same. Mistreatment of enemy prisoners endangers our own troops who might someday be held captive.” We cannot expect al-Qaeda and other such enemies to be “bound by the principle of reciprocity,” but “we should have concern for those Americans captured by more traditional enemies, if not in this war then in the next.” Global public criticism of North Vietnam’s brutality towards US prisoners resulted in a substantial decrease in their abuse of POWs. The war against terrorism is “a war of ideas,” he writes, “a struggle to advance freedom in the face of terror in places where oppressive rule has bred the malevolence that creates terrorists. Prisoner abuses exact a terrible toll on us in this war of ideas. They inevitably become public, and when they do they threaten our moral standing, and expose us to false but widely disseminated charges that democracies are no more inherently idealistic and moral than other regimes.” To defeat the idea of terrorism, “we must prevail in our defense of American political values as well. The mistreatment of prisoners greatly injures that effort.”
'We Are Different and Better than Our Enemies' - McCain writes that while he does not “mourn the loss of any terrorist’s life… [w]hat I do mourn is what we lose when by official policy or official neglect we allow, confuse, or encourage our soldiers to forget that best sense of ourselves, that which is our greatest strength—that we are different and better than our enemies, that we fight for an idea, not a tribe, not a land, not a king, not a twisted interpretation of an ancient religion, but for an idea that all men are created equal and endowed by their Creator with inalienable rights.”
Waterboarding Is Torture - McCain states flatly that any interrogation technique that simulates an execution, including waterboarding, is torture. “[I]f you gave people who have suffered abuse as prisoners a choice between a beating and a mock execution, many, including me, would choose a beating. The effects of most beatings heal. The memory of an execution will haunt someone for a very long time and damage his or her psyche in ways that may never heal. In my view, to make someone believe that you are killing him by drowning is no different than holding a pistol to his head and firing a blank. I believe that it is torture, very exquisite torture.”
Exceptions Do Not Require New Laws - There is always the extreme circumstance bandied about in discussions: what should be done with a terror suspect who holds critical information about an imminent terrorist attack? While such an extreme circumstance may well require extreme interrogation methods, McCain writes, “I don’t believe this scenario requires us to write into law an exception to our treaty and moral obligations that would permit cruel, inhumane, and degrading treatment. To carve out legal exemptions to this basic principle of human rights risks opening the door to abuse as a matter of course, rather than a standard violated truly in extremis. It is far better to embrace a standard that might be violated in extraordinary circumstances than to lower our standards to accommodate a remote contingency, confusing personnel in the field and sending precisely the wrong message abroad about America’s purposes and practices.” (McCain 11/21/2005)

Jose Padilla being escorted by federal agents in January 2006.Jose Padilla being escorted by federal agents in January 2006. [Source: Alan Diaz / Associated Press]Jose Padilla, a US citizen and “enemy combatant” alleged to be an al-Qaeda terrorist (see May 8, 2002) and held without charges for over three years (see October 9, 2005), is charged with being part of a North American terrorist cell that sent money and recruits overseas to, as the indictment reads, “murder, maim, and kidnap.” The indictment contains none of the sensational allegations that the US government has made against Padilla (see June 10, 2002), including his supposed plan to detonate a “dirty bomb” inside the US (see Early 2002) and his plans to blow up US hotel and apartment buildings (see March 2002). Nor does the indictment accuse Padilla of being a member of al-Qaeda. Attorney General Alberto Gonzales says, “The indictment alleges that Padilla traveled overseas to train as a terrorist (see September-October 2000) with the intention of fighting a violent jihad.” He refuses to say why the more serious charges were not filed. Some provisions of the Patriot Act helped the investigation, Gonzales adds: “By tearing down the artificial wall that would have prevented this kind of investigation in the past, we’re able to bring these terrorists to justice,” he says. The Padilla case has become a central part of the dispute over holding prisoners such as Padilla without charge; by charging Padilla with lesser crimes, the Bush administration avoids the possibility of the Supreme Court ruling that he and other “enemy combatants,” particularly American citizens, must either be tried or released. Law professor Eric Freedman says the Padilla indictment is an effort by the administration “to avoid an adverse decision of the Supreme Court.” Law professor Jenny Martinez, who represents Padilla, says: “There’s no guarantee the government won’t do this again to Mr. Padilla or others. The Supreme Court needs to review this case on the merits so the lower court decision is not left lying like a loaded gun for the government to use whenever it wants.” Padilla’s lawyers say the government’s case against their client is based on little more than “double and triple hearsay from secret witnesses, along with information allegedly obtained from Padilla himself during his two years of incommunicado interrogation.” Padilla will be transferred from military custody to the Justice Department, where he will await trial in a federal prison in Miami. He faces life in prison if convicted of conspiracy to murder, maim, and kidnap overseas. The lesser charges—providing material support to terrorists and conspiracy—carry maximum prison terms of 15 years each. (Associated Press 11/22/2005; Fox News 11/23/2005)
'Dirty Bomb' Allegations 'Not Credible,' Says Former FBI Agent - Retired FBI agent Jack Cloonan, an expert on al-Qaeda, later says: “The dirty bomb plot was simply not credible. The government would never have given up that case if there was any hint of credibility to it. Padilla didn’t stand trial for it, because there was no evidence to support it.” (Rose 12/16/2008)
Issue with CIA Videotapes - In 2002, captured al-Qaeda leader Abu Zubaida identified Padilla as an al-Qaeda operative (see Mid-April 2002) and the government cited Zubaida as a source of information about Padilla after Padilla’s arrest. Yet, sometime this same month, the CIA destroys the videotapes of Zubaida’s interrogations from the time period where he allegedly identified Padilla (see November 2005). The Nation’s Aziz Huq will later comment: “Given the [Bush] administration’s reliance on Zubaida’s statements as evidence of Padilla’s guilt, tapes of Zubaida’s interrogation were clearly relevant to the Padilla trial.… A federal criminal statute prevents the destruction of any record for a foreseeable proceeding, even if the evidence is not admissible.… [I]t seems almost certain that preservation of the tapes was legally required by the Jose Padilla prosecution.” (Huq 12/11/2007)

The US lifts an arms embargo on Indonesia. The US imposed a limited arms ban in 1991 after the Indonesian military massacred civilians in East Timor. The arms ban was strengthened in 1999 after the Indonesian military committed more massacres as East Timor voted for independence. The Bush administration had long desired closer ties with the Indonesian military, but was held back by Congress, which imposed conditions before military relations could be reestablished. In particular, the Indonesian military was required to account for some atrocities, especially the alleged killing of several US teachers by Indonesian soldiers in the province of West Papua in 2002 (see August 31, 2002). Indonesia had yet to fulfill these conditions, but earlier in the month Congress inserted a loophole in the law, allowing the restrictions to be waived by the Bush administration if it was found necessary for national security reasons. The Bush administration uses the loophole during Thanksgiving vacation while Congress is out of session, despite the lack of any new national security reason to do so. The lifting of restrictions still falls short of full military relations the US has with most other countries in the region. The US also renewed training and educational exchanges with the Indonesian military earlier in the year. (Gelling 11/24/2005) The killing of US teachers in Papua remains unresolved. In January 2006, the New York Times will report that Indonesian police have concluded that the Indonesian military committed the killings but are unwilling to officially report this because of diplomatic sensitivities between the US and Indonesia. (Perlez and Bonner 1/27/2006)

The Supreme Court declines, without comment, to hear the case (see August 4, 2005) brought by former FBI translator Sibel Edmonds. (Stout 11/28/2005; Vicini 11/28/2005) The decision puts an end to Edmonds’ legal efforts to hold the bureau accountable for its failure to address several security issues raised by Edmonds in late 2001 and early 2002 (see December 2, 2001 and Afternoon February 12, 2002, respectively). On August 4, Edmonds had filed a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urged the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. (In May, the federal appeals court had closed the courtroom to the public and media.) Had the Supreme Court had ruled in favor of Edmonds, she would have been able to return to the lower courts and start her case again. (Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all. 8/4/2005, pp. 2 pdf file; Strohm 8/8/2005)

Deputy Director of National Intelligence Michael Hayden learns that the CIA has videotaped some detainee interrogations (see Spring-Late 2002). Hayden will later say he finds this out towards the end of his time as deputy director of national intelligence, a position he leaves in May 2006. Although the tapes were destroyed several months previously (see November 2005), Hayden will later say he is not aware of their destruction at this point: “I did not personally know before they were destroyed, not at all… I was aware of the existence of the tapes but really didn’t become focused on it until the summer of ‘06.” It appears that Hayden does not inform any congressional oversight committees of the destruction until 2007 (see March 14, 2007 and December 7, 2007), even though he becomes CIA director in the summer of 2006 (see May 5, 2006). (Associated Press 12/12/2007; Fox News 12/13/2007)

According to an unnamed law enforcement official who works with the FBI and the National Counter Terrorism Center, the investigation into the SAAR network is still ongoing. However, only a small portion of the documents and computer files confiscated in a raid on the network in 2002 (see March 20, 2002) have been fully translated from Arabic into English. This official complains, “They don’t have the damn resources. They don’t have the language skills or computer forensic personnel to go through it all. And yet it’s a gold mine of information.” (Sperry 12/9/2005)

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” (White House 12/10/2005) Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. (Klein 2009, pp. 47-48)

The Army adopts a new, classified set of interrogation methods that some feel may change the nature of the debate over cruel and inhuman treatment of detainees in US custody. The Detainee Treatment Act (DTA—see December 30, 2005), which bases its definition of torture in part on Army standards, is currently wending its way through Congress. The new set of instructions are being added to the revised Army Field Manual, after they are approved by undersecretary of defense Stephen Cambone. The addendum provides exact details on what kinds of interrogation procedures can and cannot be used, and under what circumstances, pushing the legal limit of what interrogations can be used in ways that the Army has never done before. Some military observers believe that the new guidelines are an attempt by the Army to undercut the DTA, and many believe the bill’s sponsor, Senator John McCain (R-AZ) will be unhappy with the addendum. “This is a stick in McCain’s eye,” one official says. “It goes right up to the edge. He’s not going to be comfortable with this.” McCain has not yet been briefed on the contents of the new guidelines. McCain spokesman Mark Salter says, “This is politically obtuse and damaging. The Pentagon hasn’t done one molecule of political due diligence on this.” One Army officer says that the core of the definition of torture—what is and is not “cruel, inhumane, and degrading” treatment—“is at the crux of the problem, but we’ve never defined that.” The new Army Field Manual specifically prohibits such tactics as stress positioning, stripping prisoners, imposing dietary restrictions, using police dogs to intimidate prisoners, and sleep deprivation. The new manual is expected to be issued before the end of the year. (Schmitt 12/14/2005) The day after this is reported, President Bush agrees not to veto the DTA (see December 15, 2005).

The Bush administration relents in its opposition to the Detainee Treatment Act (DTA), which would ban torture of prisoners by US personnel (see July 24, 2005 and After and December 30, 2005). President Bush meets with the bill’s primary sponsor, Senator John McCain (R-AZ), and John Warner (R-VA), chairman of the Senate Armed Service Committee, in a press conference to praise the bill. McCain says after the conference that the bill “is a done deal.” The bill still faces some opposition from Congressional Republicans such as House Armed Services Committee chairman Duncan Hunter (R-CA), who says he won’t vote for the bill unless it can be amended to ensure that the nation’s ability to gather intelligence is not diminished. Both the House and Senate have voted by veto-proof margins to accept the bill, which is actually an amendment to a defense appropriations bill. McCain says after the conference with Bush and Warner, “We’ve sent a message to the world that the United States is not like the terrorists. We have no grief for them, but what we are is a nation that upholds values and standards of behavior and treatment of all people, no matter how evil or bad they are.” Bush says the ban “is to make it clear to the world that this government does not torture and that we adhere to the international convention of torture, whether it be here at home or abroad.” McCain has been the target of months of vilification and opposition from the White House over the bill, which argued that the bill would limit Bush’s authority to protect the US from terrorist attacks, and that the bill is unnecessary because US officials do not torture. (CNN 12/15/2005)
Loopholes - But the bill contains key loopholes that some experts believe significantly waters down the bill’s impact. Author Alfred McCoy, an expert on the CIA, notes that the bill as revised by White House officials does not give any real specifics. Attorney General Alberto Gonzales will assert that the only restrictions on prisoner interrogations are the ban on “severe” psychological or physical pain, “the same linguistic legerdemain that had allowed the administration to start torturing back in 2002” (see August 1, 2002). Gonzales also implies that practices such as waterboarding are not prohibited. (McCoy 2/8/2006)
Legal Cover - A provision of the bill inserted after negotiation with White House officials says that CIA and military officials accused of torture can claim legal protection by arguing that they were simply following the orders of their superiors, or they have a reasonable belief that they are carrying out their superiors’ wishes. McCain dropped the original provision that all military personnel must follow the stringent guidelines for interrogation laid out in the Army Field Manual; the bill now follows the Uniform Code of Military Justice, which says that anyone accused of violating interrogation rules can defend themselves if a “reasonable” person could conclude they were following a lawful order. McCain resisted pressure from the White House to include language that would afford interrogators accused of torture protection from civil or criminal lawsuits. (CNN 12/15/2005; Associated Press 12/15/2005)
Controversial Amendment - Perhaps even more troubling is an amendment to the bill that would essentially strip the judiciary’s ability to enforce the ban. The amendment, originally crafted by senators Lindsey Graham (R-SC) and Jon Kyl (R-AZ) and added to by Carl Levin (D-MI), denies Guantanamo detainees the right to bring legal action against US personnel who torture or abuse them—effectively denying them the fundamental legal right of habeas corpus. It also gives the Defense Department the implicit ability to consider evidence obtained through torture or inhumane treatment in assessing detainees’ status. Human Rights Watch (HRW) says that the DTA marks the first time in history that Congress would allow the use of evidence obtained through torture. HRW’s Tom Malinowski says, “With the McCain amendment, Congress has clearly said that anyone who authorizes or engages in cruel techniques like water boarding is violating the law. But the Graham-Levin amendment leaves Guantanamo detainees no legal recourse if they are, in fact, tortured or mistreated. The treatment of Guantanamo Bay detainees will be shrouded in secrecy, placing detainees at risk for future abuse.… If the McCain law demonstrates to the world that the United States really opposes torture, the Graham-Levin amendment risks telling the world the opposite.” (Human Rights Watch 12/16/2005) Geoffrey Corn, a retired Army lieutenant colonel and Judge Advocate General lawyer, agrees. In January 2006, he will write that the “recent compromise inclusion of an ‘obedience to orders’ defense… has effectively undermined the goal Senator John McCain fought so long to achieve. Instead of sending a clear message to US forces that cruel, inhumane, or degrading treatment of detainees is never permissible, the compromise has validated President Bush’s belief that the necessities of war provide the ultimate ‘trump card’ to justify ‘whatever it takes’ in the war on terror.” (Corn 1/6/2006)

After an NSA program to intercept telephone calls where one party is in the US and the other party is abroad is revealed (see December 15, 2005), President George Bush defends the program in a radio address. He justifies the program by implying that, if it had been in place before 9/11, it may have prevented the attacks: “As the 9/11 Commission pointed out, it was clear that terrorists inside the United States were communicating with terrorists abroad before the September the 11th attacks, and the commission criticized our nation’s inability to uncover links between terrorists here at home and terrorists abroad. Two of the terrorist hijackers who flew a jet into the Pentagon, Nawaf Alhazmi and Khalid Almihdhar, communicated while they were in the United States to other members of al-Qaeda who were overseas. But we didn’t know they were here until it was too late.” There are conflicting accounts of the circumstances of the hijackers’ calls and the NSA actually intercepted them, so it is unclear why they were not exploited to prevent the attacks (see Early 2000-Summer 2001, (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After). (Bush 12/17/2005; US President 12/26/2005 pdf file) It is unclear which statements of the 9/11 Commission the president thinks he is referring to. The Commission’s final report touches on the NSA intercepts of the hijackers’ calls from the US in two places; in one it says: “[T]he NSA was supposed to let the FBI know of any indication of crime, espionage, or ‘terrorist enterprise’ so that the FBI could obtain the appropriate warrant. Later in this story, we will learn that while the NSA had the technical capability to report on communications with suspected terrorist facilities in the Middle East, the NSA did not seek FISA Court warrants to collect communications between individuals in the United States and foreign countries, because it believed that this was an FBI role,” (note: we do not actually learn this later in the 9/11 Commission report, this is the only mention). The second passage refers to Almihdhar’s time in San Diego and does not actually mention that the NSA intercepted the relevant calls, “Almihdhar’s mind seems to have been with his family in Yemen, as evidenced by calls he made from the apartment telephone.” (9/11 Commission 7/24/2004, pp. 87-8, 222)

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” (Gellman and Linzer 12/18/2005) Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” (Eggen 12/16/2005)

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” (White House 12/19/2005) The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. (White House 9/18/2001)
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. (White House 12/19/2005)

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” (Stark 12/20/2005; Ars Technica 2007) Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. (TechTerms 2007) The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” (Stark 12/20/2005)

Federal appeals court judge J. Michael Luttig, widely considered to be such a reliably conservative supporter of the Bush administration that he is a potential Supreme Court nominee and the author of a highly favorable ruling in the Jose Padilla detention case (see October 9, 2005), is infuriated by the administration’s decision not to charge Padilla with the lurid array of terrorism-related charges it had alleged in Luttig’s courtroom (see November 22, 2005). Luttig believes that he and the rest of the appeals court judges were misled into making a ruling favorable to the administration. Luttig issues a supplementary opinion accusing the White House of manipulating the judicial process to ensure the Supreme Court could not review the precedent his opinion set. The Padilla indictment raises serious questions about the credibility of the government’s accusations against Padilla, and, Luttig writes, leaves “the impression that Padilla may have been held for these years, even justifiably, by mistake.” Luttig and his colleagues take the unusual step of blocking Padilla’s transfer from military custody into the hands of the Justice Department. The move is aimed at attempting to keep the possibility open of a Supreme Court hearing on the Padilla matter, and giving the Court the chance to reverse Luttig’s precedent. The Court will quickly overrule Luttig’s attempt to keep Padilla in military custody and will dismiss Padilla’s appeal because he is no longer classified as an enemy combatant. Author and reporter Charlie Savage will later write: “Just as Luttig had feared, the maneuver ensured that his precedent—written on the assumption that the administration was telling the truth when it said it had good evidence that Padilla was plotting attacks on US soil—was left intact.” Luttig’s move sours his relations with the White House and dooms whatever chance he may have had to be nominated for the high court. He will soon resign from his life-tenured position on the appeals court and take the position of general counsel for Boeing. (Savage 2007, pp. 200-201)

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” (Lichtblau and Risen 12/24/2005)

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” (Spaulding 12/25/2005)

Without the knowledge of many in Congress, Vice President Cheney and his allies in Congress manage to insert language into the Detainee Treatment Act (DTA—see December 30, 2005) that renders much of the bill nearly worthless. Some of the widest exceptions are inserted without the knowledge of all but a very few Congressmen. One is the exemption for the CIA, which instead of being bound by the interrogation techniques described in the US Army Field Manual, is only forbidden in general to employ “cruel” or “inhuman” methods. Those terms will be defined in light of US constitutional law. Because of the Supreme Court’s decision that cruelty is an act that “shocks the conscience,” Cheney’s chief lawyer, David Addington, has argued that harsh interrogations would be much less shocking if performed on detainees suspected of planning or taking part in mass casualty terrorist attacks. What “shocks the conscience” is to an extent “in the eye of the beholder,” Cheney has already said. (Gellman and Becker 6/25/2007)

After months of opposition and a recent, clandestine rewriting of the bill (see Before December 30, 2005), President Bush signs the Detainee Treatment Act (DTA) into law, effectively outlawing torture by government and military officials (see December 15, 2005). However, Bush also inserts a signing statement into the record reserving for himself the right to ignore the law under his powers as commander in chief if he judges that torturing a prisoner is in the interest of national security (see December 30, 2005). Signing statements have no legal status, but serve to inform the nation as to how the president interprets a particular law. In this case, Bush writes that he will waive the restrictions on torture if he feels it is necessary to protect national security. “We consider ourselves bound by the prohibition on cruel, unusual, and degrading treatment,” says a senior administration official, but under unusual circumstances—a “ticking time bomb” scenario, for example, where a detainee is believed to have information that could prevent an imminent terrorist attack, Bush’s responsibility to protect the nation will supersede the law. Law professor David Golove is critical of the White House’s position, saying: “The signing statement is saying ‘I will only comply with this law when I want to, and if something arises in the war on terrorism where I think it’s important to torture or engage in cruel, inhuman, and degrading conduct, I have the authority to do so and nothing in this law is going to stop me.’ They don’t want to come out and say it directly because it doesn’t sound very nice, but it’s unmistakable to anyone who has been following what’s going on.” Bush has issued numerous signing statements signaling his intent to flaunt the law in the areas of domestic surveillance, detaining terrorist suspects without due legal process, and previous legislation forbidding the torture of prisoners. Many legal and civil rights organizations believe that Bush’s signing statement is part of his push for a “unitary executive,” where the president has virtually unlimited powers in the areas of foreign policy and national security, and neither Congress nor the courts have the right to limit his powers (see April 30, 1986). Former Justice Department official and law professor Marty Lederman says: “The whole point of the McCain Amendment was to close every loophole. The president has re-opened the loophole by asserting the constitutional authority to act in violation of the statute where it would assist in the war on terrorism.” Human Rights Watch director Elisa Massamino calls the signing statement an “in-your-face affront” to both McCain and to Congress. “The basic civics lesson that there are three co-equal branches of government that provide checks and balances on each other is being fundamentally rejected by this executive branch. Congress is trying to flex its muscle to provide those checks [on detainee abuse], and it’s being told through the signing statement that it’s impotent. It’s quite a radical view.” (Savage 1/4/2006; Boston Globe 4/30/2006)

According to authors Joe and Susan Trento, writing in 2006, the CIA places employees undercover with both airlines and the Federal Air Marshal Service, as a part of a program to allow known terrorists to keep flying (see May 2006). The undercover employees allow the CIA to control arrangements when it wants a terrorist to fly openly without the airlines’ or Marshal Service’s knowledge. (Trento and Trento 2006, pp. 194) One example of this is travel in 2006 by Rayed Abdullah, an associate of alleged 9/11 pilot Hani Hanjour. Abdullah is allowed to fly to New Zealand for flight training in the hope he will meet al-Qaeda operatives, who will then be put under surveillance (see February-May 30, 2006).

Attorney General Alberto Gonzales testifies before the Senate Judiciary Committee that the new “reasonable belief” standard for wiretaps is just another term for “probable cause.” Gonzales’s claim is legally false. The difference between the two standards is significant: while administration officials must present relatively compelling evidence that a US citizen has ties to US-designated terrorist organizations or is involved in terror plots to meet the “probable cause” standard for authorizing electronic surveillance, the “reasonable belief” standard is far more lenient. Gonzales also repeats for the committee President Bush’s claims that the Foreign Intelligence Surveillance Court (FISC) isn’t “agile” or “nimble” enough to assist the Justice Department and the US intelligence community in finding and arresting terrorists, a claim that FISC judges find baffling. FISC routinely approves almost all warrant requests, and FISA allows the government to conduct surveillance for 72 hours before even applying for a warrant. Additionally, FISC has consistently worked with the government to expedite requests and streamline the warrant-issuance procedure. For example, in March 2002, when the FBI and Pakistani police arrested al-Qaeda operative Abu Zubaida, agents found that almost all of Zubaida’s contacts were already being monitored under FISA warrants or through international surveillance efforts (see March 28, 2002). One government official says that the Zubaida discovery gave them “some comfort” that surveillance efforts were working as needed. (Leonnig 2/9/2006)

Georgetown law professor Marty Lederman, a former Justice Department official under both the Bush and Clinton administrations, notes the recent signing statement from the White House that essentially states President Bush will ignore the newly authorized Detainee Treatment Act (see December 30, 2005). “So much for the president’s assent to the McCain Amendment” (see December 15, 2005), Lederman writes. Of Bush’s signing statement itself, he writes: “Translation: I reserve the constitutional right to waterboard when it will ‘assist’ in protecting the American people from terrorist attacks.… You didn’t think [Vice President] Cheney and [Cheney’s chief of staff David] Addington (see December 30, 2005) were going to go down quietly, did you?” (Marty Lederman 1/2/2006; Savage 2007, pp. 225)

The three Republican senators who co-sponsored the recently passed Detainee Treatment Act prohibiting torture (see December 15, 2005) criticize President Bush for his signing statement indicating that he would not follow the law if he sees fit (see December 30, 2005). Senators John McCain (R-AZ), the primary sponsor of the bill, and John Warner (R-VA) issue a statement rejecting Bush’s signing statement. “We believe the president understands Congress’s intent in passing, by very large majorities, legislation governing the treatment of detainees,” the senators write. “The Congress declined when asked by administration officials to include a presidential waiver of the restrictions included in our legislation. Our committee intends through strict oversight to monitor the administration’s implementation of the new law.” The third co-sponsor, Senator Lindsey Graham (R-SC), says he agrees with the letter, “and would go a little bit further.” Graham says: “I do not believe that any political figure in the country has the ability to set aside any… law of armed conflict that we have adopted or treaties that we have ratified. If we go down that road, it will cause great problems for our troops in future conflicts because [nothing] is to prevent other nations’ leaders from doing the same.” The White House refuses to respond to the senators’ comments. Law professor David Golove, a specialist in executive power issues, says the senators’ statements “mean that the battle lines are drawn” for an escalating fight over the balance of power between the two branches of government. “The president is pointing to his commander in chief power, claiming that it somehow gives him the power to dispense with the law when he’s conducting war,” Golove says. “The senators are saying: ‘Wait a minute, we’ve gone over this. This is a law Congress has passed by very large margins, and you are compelled and bound to comply with it.’” Elisa Massimino of Human Rights First says the senators’ statements should warn military and CIA interrogators that they could be subject to prosecution if they torture or abuse a detainee, regardless of Bush’s signing statement. “That power [to override the law] was explicitly sought by the White House, and it was considered and rejected by the Congress,” she says. “And any US official who relies on legal advice from a government lawyer saying there is a presidential override of a law passed by Congress does so at their peril. Cruel, inhuman, and degrading treatment is illegal.” Golove notes that it is highly unlikely that Attorney General Alberto Gonzales would prosecute anyone for performing actions Bush had authorized. (Savage 1/5/2006; Savage 2007, pp. 225-226)

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. (Congressional Research Service 1/5/2006 pdf file; Lichtblau and Shane 1/6/2006)

During the Senate hearings to confirm conservative jurist Samuel Alito to the Supreme Court, the questioning turns to Alito’s views on the “unitary executive” theory (January 1, 1992). The theory seems to have originated in the Reagan administration’s Justice Department (see April 30, 1986), where Alito worked in the Office of Legal Counsel.
Lawyer Testifies to Unitary Executive - Former Clinton White House counsel Beth Nolan testifies about the theory and its potential for dramatically revamping the power of the presidency: “‘Unitary executive’ is a small phrase with almost limitless import. At the very least, it embodies the concept of presidential control over all executive functions, including those that have traditionally been executed by ‘independent’ agencies and other actors not subject to the president’s direct control.… The phrase is also used to embrace expansive interpretations of the president’s substantive powers, and strong limits on the legislative and judicial branches.” Nolan cites a November 2000 speech by Alito to the Federalist Society, where Alito said in part, “the president is largely impervious to statutory law in the areas of foreign affairs, national security, and Congress is effectively powerless to act as a constraint against presidential aggrandizement in these areas.” (Dean 2007, pp. 100-106) During the questioning session, Alito denies ever discussing the idea of inherent presidential powers during that speech.
Evasive Answers in Hearings - Senator Richard Durbin (D-IL) says in his opening statement that he intends to press Alito on his support for what Durbin calls “a marginal theory at best… yet one you’ve said you believe.” Durbin notes that the Bush administration has repeatedly cited the theory to justify its most controversial policies and decisions, particularly in conducting its war on terror. Senator Charles Schumer (D-NY) adds: “The president is not a king, free to take any action he chooses without limitation, by law.… In the area of executive power, Judge Alito, you have embraced and endorsed the theory of the unitary executive. Your deferential and absolutist view of separation of powers raises questions. Under this view, in times of war the president would, for instance, seem to have inherent authority to wiretap American citizens without a warrant, to ignore Congressional acts at will, or to take any other action he saw fit under his inherent powers. We need to know, when a president goes too far, will you be a check on his power or will you issue him a blank check to exercise whatever power alone he thinks appropriate?” (Savage 2007, pp. 271-272) However, Alito refuses to address the issue in the hearings, giving what one journalist calls “either confused or less than candid” answers to questions concerning the subject.
Failure to Recall - During questioning, Alito turns aside inquiries about his avowed support for the unitary executive theory, saying he was merely talking about the idea that a president should have control over lesser executive branch officials, and was not referring to the usurpation of Congressional power by the executive. Further questions elicit nothing but a dry definition of the term. Asked about Supreme Court Justice Clarence Thomas’s stinging dissent in the 2004 Hamdi v. Rumsfeld case (see June 28, 2004), where Thomas wrote that the authors of the Constitution believed a unitary executive was essential to the implementation of US foreign policies, Alito says he does not recall Thomas’s mention of the phrase. Asked about Bush’s signing statement that attempted to invalidate the Detainee Treatment Act (see December 30, 2005), Alito merely recites the definition of a signing statement, and refuses to actually state his position on the issue (see February 6, 1986 and After). Senator Ted Kennedy (D-MA), disturbed by Alito’s refusal to address the subject, says he will vote against him in part because of Alito’s embrace of “the gospel of the unitary executive.” Kennedy cites one of the authors of the theory, law professor Steven Calabresi, one of the founders of the Federalist Society, who, Kennedy says, “acknowledged that, if the concept is implemented, it would produce a radical change in how the government operates.” (Dean 2007, pp. 100-106; Savage 2007, pp. 271-274)
ACLU Opposes Alito - The ACLU, for only the third time in its history, formally opposes Alito’s nomination, in part because of Alito’s embrace of the unitary executive theory of the presidency, citing Alito’s “expansive view of executive authority and a limited view of the judicial role in curbing abuses of that authority.” In its 86-year history, the ACLU has only opposed two other Court nominees: William Rehnquist and former Solicitor General Robert Bork. (American Civil Liberties Union 1/9/2006)
Opposition Fails - However, none of this is effective. Alito is sworn in less than a month later, after Democrats in the Senate fail to successfully mount a filibuster against his confirmation. (CNN 2/1/2006)

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). (Ross 1/10/2006; ABC 1/10/2006)

After Human Rights Watch, an organization which works to end torture of government detainees around the globe, claims that the Bush administration has made a “deliberate policy choice” to abuse detainees at Guantanamo Bay, Defense Secretary Donald Rumsfeld says, “What took place at Guantanamo is a matter of public record today, and the investigations turned up nothing that suggested that there was any policy in the department other than humane treatment.” In 2002, President Bush declared that detainees in US custody should be treated “humanely, and to the extent appropriate and consistent with military necessity, in a manner consistent with the principles” of the Geneva Conventions (see January 19, 2002). Shortly after Rumsfeld’s statement, White House press secretary Scott McClellan says that Human Rights Watch has damaged its own credibility by making such claims. (Mayer 2/27/2006)

In his column for the legal website FindLaw, former Nixon White House counsel John Dean writes: “Rather than veto laws passed by Congress, [George W.] Bush is using his signing statements to effectively nullify them as they relate to the executive branch. These statements, for him, function as directives to executive branch departments and agencies as to how they are to implement the relevant law.… Bush has quietly been using these statements to bolster presidential powers. It is a calculated, systematic scheme that has gone largely unnoticed.… It is as if no law had been passed on the matter at all.… Bush is using signing statements like line item vetoes.” Dean writes that Bush’s signing statement for the Detainee Treatment Act (see December 30, 2005) marks the first time that serious media attention has been focused on the statements. He writes, “Despite the McCain Amendment’s clear anti-torture stance, the military may feel free to use torture anyway, based on the President’s attempt to use a signing statement to wholly undercut the bill.” (Dean 1/13/2006)

It had been widely reported that the Saudi government began to crack down seriously on al-Qaeda and other radical militants after a 2003 al-Qaeda attack in Saudi Arabia (see May 12, 2003). However, the Los Angeles Times reports that US officials now claim that is not true. While Saudis have been very aggressive and cooperative in cracking down on militants within Saudi Arabia since that attack, they have done little outside the country. Millions of dollars continue to flow from wealthy Saudis through charity fronts to al-Qaeda and other suspected groups, and the Saudi government is doing next to nothing about it. In 2004, the Saudis promised to set up a government commission to police such groups, but they have yet to do so. The Saudi government has also done little to rein in influential radical religious leaders who openly encourage their followers to attack US interests in Iraq and elsewhere in the world. US officials claim that at least five organizations, including the Muslim World League (MWL), the International Islamic Relief Organization (IIRO), and the World Assembly of Muslim Youth (WML), “are headquartered in Saudi Arabia but continue to engage in highly suspect activity overseas.” A senior US counterterrorism official says that some known terrorist financiers continue to “operate and live comfortably in Saudi Arabia” despite US objections. (Meyer 1/15/2006)

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” (Congressional Quarterly 1/16/2006; American Constitutional Society 1/16/2006)

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” (Dean 2006, pp. 170-171; Marshall 1/17/2006)

A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” (US House of Representatives 1/4/2006; Congressional Research Service 1/18/2006 pdf file; Eggen 1/19/2006) The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. (Leonnig 1/20/2006) On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” (US Department of Justice 1/19/2006 pdf file; Glenn Greenwald 1/20/2006; Leonnig 1/20/2006)
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” (Leonnig 1/20/2006)
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” (Savage 2007, pp. 315)
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” (WIS-TV 1/20/2006; Savage 2007, pp. 203)

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. (Michael Hayden 1/23/2006)

Current and former National Security Agency (NSA) employees say that the agency often retaliates against whistleblowers by labeling them “delusional,” “paranoid,” or “psychotic.” They say such labeling protects powerful superiors who might be incriminated by potentially criminal evidence provided by such whistleblowers, and helps to keep employees in line through fear and intimidation. One NSA whistleblower, former intelligence analyst Russell Tice, is currently the victim of such agency allegations. Tice, along with three other former analysts, Diane Ring, Thomas Reinbold, and another analyst who wishes to remain anonymous, make the allegations of unfounded psychological labeling by the agency; their allegations are corroborated by a current NSA officer who also wishes to remain anonymous. (Gossett 1/25/2006)
Identifying a Potential Spy - Tice, a former signals intelligence (SIGINT) officer, is the first NSA whistleblower to capture the media’s attention, when in 2004, the Pentagon investigated possible NSA retaliation against him. In 2001, Tice reported that a co-worker at the Pentagon’s Defense Intelligence Agency (DIA) was possibly engaged in espionage for China, possibly connected to California Republican official and Chinese double agent Katrina Leung. (Goodman 1/3/2006; Gossett 1/25/2006) Tice says, “I saw all the classic signs” in the DIA employee. After transferring to the NSA in November 2002, he reported his concerns again, this time adding criticisms of incompetence for the FBI, who in Tice’s view failed to properly investigate his allegations. Instead, Tice was ordered by NSA Security to undergo psychiatric evaluation. He was labeled “paranoid” and “psychotic” by NSA forensic psychologist Dr. John Michael Schmidt; Tice lost his top-secret security clearance as a result. (Gossett 1/25/2006)
Fired - He was fired from the NSA in 2005 after spending his last years at the agency pumping gas and working in an agency warehouse. “I reported my suspicion and got blown off,” he says. “I pushed the issue and that ticked them off, the fact that I questioned their almighty wisdom.” (Carr 5/5/2005) Tice again made news on January 10, 2006 (see January 10, 2006), when he admitted to being a source for the New York Times’s article about a secret NSA electronic surveillance program against American citizens, a program carried out in the name of combating terrrorism. (Ross 1/10/2006)
No Evidence of Mental Instability - As for Tice’s own psychological evaluation by Schmidt, according to three other clinical psychologists, there is “no evidence” of either of the disorders in Tice’s mental makeup. And another NSA psychologist pronounced Tice mentally sound in 2002, though having a “somewhat rigid approach to situations.” Tice is described by five retired NSA and intelligence officials as “congenial,” “enthusiastic,” and “a scholar of high intellectual rigor [with] sound judgment [and] unparalleled professionalism.” Tice says of the NSA’s attempts to smear whistleblowers with apparently baseless psychological allegations, “This nonsense has to stop. It’s like Soviet-era torture. These people are vicious and sadistic. They’re destroying the lives of good people, and defrauding the public of good analysts and linguists.” But it has been effective in cowing others who were, in Tice’s words, “too afraid or ashamed to come forward.” (Gossett 1/25/2006)
Further Allegations - Another former analyst, now employed by another federal agency and who only allows himself to be identified as “J,” describes similar targeting by the NSA. J is fluent in an unusually high number of languages, and is described by former colleagues as “brilliant” and possessed of “amazing” critical skills. “I believe the abuse is very widespread,” J says. “The targeted person suddenly is described as ‘not being a team player,’ as ‘disgruntled,’ and then they’re accused of all sorts of bizarre things. Soon they’re sent to the psych people.” J himself was targeted in September 1993 (see September 11, 1993) when he and other analysts concluded that the United States was being targeted by Islamic terrorists, and then again in early 2001 after predicting a terrorist attack using planes as weapons (see May 2001).
NSA Like the 'Gestapo' - A third whistleblower, a current NSA officer who refuses to be identified, confirms the allegations and says that baseless psychiatric allegations as a form of retaliation are “commonplace” at the agency. He says, “A lot of people who work there are going through the same thing. People live in fear here. They run it like some kind of Gestapo.” Those identified as “problems” are “yelled at, badgered and abused.…These are really good people, who start to be labeled crazy, but they’re telling the truth.” The official adds that the NSA often plants false evidence in personnel files as part of the intimidation campaign. Tice says the NSA maintains what he calls a “dirt database” of inconsequential but potentially embarrassing information on employees, gathered during routine clearance investigations and used as a form of leverage. The current officer says that an “underground network” has developed to discuss these issues. “It’s like the Nazis have taken over,” he says. (Gossett 1/25/2006)
Personal Vendettas - Diane Ring is another former NSA official targeted by her superiors. Unlike Tice, a self-described conservative who believes President Bush should be impeached over the NSA’s illegal wiretapping program, Ring is a Bush supporter who believes the surveillance program is entirely proper. Ring, a former NSA computer scientist, says she was ordered to undergo psychiatric evaluations after coming into conflict with a colonel at the Pentagon. Ring is not a whistleblower per se like the others, but says she was targeted for retaliation because of a personal vendetta against her. The colonel “blew up” at Ring after she missed a meeting and explained that her branch chief had her working on a classified program that took priority over the meeting. Ring also was evaluated by Dr. Schmidt. When she complained about the apparent retaliation, her security clearance was, like Tice’s, revoked, and she was “red-badged,” or put on restricted access within the NSA offices. Ring says she received an excellent job evaluation just three months prior to the actions taken against her. She says her colleagues at the time were told not to talk to her, and she was restricted to working in a room filled with other red-badgers. She thinks she was isolated as part of an intentional campaign to force her to leave the agency. “They had these red-badgers spread out all over the place.” she recalls. “Some were sent to pump gas in the motor pool and chauffeur people around. In our room, some people brought sleeping bags in and slept all day long. Others read. I would think that would incense the taxpaying public.” Schmidt eventually reported that another doctor diagnosed Ring with a “personality disorder,” but Ring has a July 21, 2005 letter from that doctor, Lawrence Breslau, which reads in part, “On mental status examination including cognitive assessment she performs extremely well.” In the letter, Breslau says he never made such a diagnosis. She, like others in her position, went to the NSA Employee Assistance Service (EAS) for confidential counseling, but the current NSA officer says that though those sessions are supposed to be confidential, NSA officials can and do obtain “confidential” sessions for retaliatory purposes. “Their goal is to freak you out, to get inside your mind,” that officer says. Rice claims that NSA General Counsel Paul Caminos lied about her case before a judge, denying that he had sent an internal e-mail forbidding anyone from supporting Ring. Ring says she was “floored” by Caminos’s actions: “I served in Bosnia. We had mines going off all around us, all day long. That was nothing compared to this.” She is currently working on clearing her name with the NSA’s new director, Lieutenant General Keith Alexander. Ring believes that the problem at NSA involves a small number of people, “The whole lot of them is corrupt though. There is zero integrity in the process. And zero accountability.”
'Psychiatric Abuse' 'Very Widespread' - Like his fellow whistleblowers, former NSA officer Thomas Reinbold says the practice of “psychiatric abuse” inside the NSA is “very widespread.” Reinbold, who recelved 26 commendations and awards during his career at the NSA, including a medal for the intelligence he provided during the 1991 Gulf War, says, “They call it ‘doing a mental’ on someone.” Such practices have a “chilling effect” on other potential whistleblowers: “They fear for their careers because they fear someone will write up bad [psychological] fitness reports on them.” Reinhold was labeled “paranoid” and “delusional” by Schmidt after he complained to an inspector general on February 25, 1994, that the federal government was guilty of contract tampering; Schmidt’s evaluation contradicts a psychological evaluation he conducted on Reinbold eight months before that found he was mentally sound. At the time, Reinbold worked as a contracting officer representative for the Naval Security Group (NAVSECGRU) in Virginia. Reinbold had his high-level security clearance revoked, and was escorted off the grounds by armed security officers. Reinbold says NSA officials fabricated evidence in his personnel file to force him out; that evidence included allegations that he was a danger to himself and others, and that he had said “if [he] was going down, [he] would take everyone with him.” In September 1995, an administrative hearing found that the revocation of Reinbold’s security clearance was unjustified and recommended restoring his clearance, but did not allow the damaging information to be removed from his personnel file. He later sued the agency, and then retired because of diabetes. “I gave 29 years of my life to the intelligence community,” he recalls. “They couldn’t get me out the door fast enough. There are very good people, getting screwed and going through hell.”
Helping Those Who Come After - Some of the whistleblowers hope to gain the assistance of politicians to help their cases. But Tice is less optimistic. “Our time is over,” Tice says he told Ring. “But we can make a difference for those who come behind us.” The five whistleblowers have the support of the whistleblower advocacy group Integrity International. Its founder and director, Dr. Don Soeken, himself a whistleblower while he was with the US Public Health Service in the 1970s, says, “When this retaliation first starts, there’s a tendency by bosses to use code words like ‘delusional,’ ‘paranoid’ and ‘disgruntled’. Then they use psychiatric exams to destroy them. They kill the messenger and hope the PR spin will be bought by the public.” Tom Devine of the Government Accountability Project says that “psychiatric retaliation” is a knee-jerk reaction against whistleblowers: “It’s a classic way to implement the first rule of retaliation: shift the spotlight from the message to the messenger. We call it the ‘Smokescreen Syndrome.’” Superiors investigate and smear the whistleblower for anything from financial irregularities to family problems, sexual practices, bad driving records, or even failure to return library books, Devine says. “It’s a form of abuse of power.” The Whistleblower Protection Act was written to protect those like Tice, Ring, Reinbold, and Soeken, but, says Beth Daly of the Project on Government Oversight (POGO), the act has serious flaws. “You have to go through the inspector general or the director of the CIA to let them know if you’re going to Congress and what you’re going to disclose,” she says. “And inspector generals are notorious for revealing who whistleblowers are.”

President Bush says that the recently passed Detainee Treatment Act (DTA—see December 15, 2005) has no loopholes that would allow US interrogators to torture prisoners. “No American will be allowed to torture another human being anywhere in the world,” he says (see December 30, 2005 and January 2, 2006). (Ireland Online 1/26/2006)

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” (Arkin 1/31/2006; Klein 2009, pp. 40-41)

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” (Savage 2007, pp. 203-204)

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. (Klein 2009, pp. 57-60)

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” (Eggen 2/16/2006) The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Jaber Elbaneh.Jaber Elbaneh. [Source: Yahya Arhab / EPA / Corbi]Twenty-three suspected al-Qaeda operatives break out of a high-security prison in the Yemeni capital of Sana’a. Escapees include Jamal al-Badawi, wanted for a role in the bombing of the USS Cole (see October 12, 2000), and Jaber Elbaneh, a US citizen believed to be linked to the alleged al-Qaeda sleeper cell in Lackawanna, New York (see April-August 2001). The men allegedly tunnel their way from the prison to the bathroom of a neighboring mosque. However, the New York Times will later comment: “[T]hat account is viewed with great skepticism, both in the United States and in Yemen. Many in Yemen say the escape could not have taken place without assistance, whether from corrupt guards or through a higher-level plan.” (Worth 3/1/2008) The prison is located in the basement of the Political Security Organization (PSO), Yemen’s equivalent of the FBI. Several days later, a cable sent from the US embassy in Yemen notes “the lack of obvious security measures on the streets,” and concludes, “One thing is certain: PSO insiders must have been involved.” Newsweek comments: “[P]rivately, US officials say the plotters must have had serious—possibly high-level—help at the Political [Security Organization].…. [T]he head of the PSO, Ali Mutahar al-Qamish, is said to be under suspicion, according to two US officials.” (Hirsh, Hosenball, and Nordland 2/13/2006) Al-Badawi and nine others escaped a Yemeni prison in 2003 and then were recaptured one year later (see April 11, 2003-March 2004). Al-Badawi and Elbaneh turn themselves in to the Yemeni government in 2007 and then are freed (see October 17-29, 2007 and February 23, 2008).

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” (Gellman, Linzer, and Leonnig 2/5/2006)
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” (Klein 2009, pp. 48-49)

The White House twice convinces Congressional leaders to derail or water down upcoming Congressional hearings into its warrantless wiretapping program, dodging potentially embarrassing public revelations about its surveillance of US citizens. Some observers praise the Bush administration for accepting more Congressional oversight, but some lawmakers feel the concessions made by the White House in return for Congress’s back down from full hearings mean little. Privately, some Republicans say that the White House came far closer to suffering large public setbacks than is generally known, and that President Bush must be more forthcoming about the warrantless wiretapping program if he wants to retain the good will of Congress. On February 8, a day before the House Intelligence Committee is to begin its hearings on the program, some lawmakers are complaining that the administration is trying to dodge any real discussion of the program; two days before, Attorney General Alberto Gonzales had defended the program without providing any details, and the White House intended to send Gonzales and former NSA head Michael Hayden to the hearings to give the same limited briefing. Instead, the White House agrees to have Gonzales and Hayden provide more details about the program’s “procedural aspects,” the first time a full Congressional committee has received a briefing about the program (see January 4, 2006 and January 18, 2006). Many committee members are placated by the briefing. In return, committee leaders agree to stymie Democrats’ attempts to hold more expansive hearings into the program. On February 17, the Senate Intelligence Committee deals with a motion by ranking Democrat Jay Rockefeller (D-WV) to open a broad inquiry into the program. But White House chief of staff Andrew Card has, two days before, spoken with committee member Olympia Snowe (R-ME). Snowe had expressed her own concerns about the program’s legality, and its infringement on constitutional civil liberties, and she is, according to Senate sources briefed on the call, “taken aback” by Card’s intransigence about restricting Congressional oversight of the program. Snowe and fellow senator Chuck Hagel (R-NE), another Republican who has voiced his own doubts about the program, speak with committee chairman Pat Roberts (R-KS). Roberts thinks he has the votes to defeat Rockefeller’s motion, but he learns Snowe and Hagel will support it, thus ensuring its passage. Thus informed, Roberts blocks passage of the motion by arranging a party-line vote to adjourn the committee until March 9, a move that infuriates Rockefeller. “The White House has applied heavy pressure in recent weeks to prevent the committee from doing its job,” he says after the adjournment. Both Hagel and Snowe deny folding under administration pressure. The White House is supportive of a proposal by Senator Mike DeWine (R-OH) that would exempt the NSA program from FISA, while providing for limited congressional oversight. (Babington 2/19/2006)

During a speech defending his campaign against al-Qaeda, President Bush describes a previously obscure al-Qaeda plot to crash an airplane into the Library Tower (since renamed the US Bank tower) in Los Angeles in 2002 (see October 2001-February 2002). It is the tallest building on the West Coast of the US. The plot was first briefly mentioned in a Bush speech in October 2005 (see October 6, 2005), but Bush and his aides now provide new details. The plot was allegedly masterminded by Khalid Shaikh Mohammed, the mastermind of the 9/11 attacks, but was foiled when the four Asians recruited for the plot were arrested in Asia. Bush’s speech on the plot comes on the same day as a Senate hearing into the NSA’s illegal domestic wiretapping program. The Washington Post comments, “several US intelligence officials played down the relative importance of the alleged plot and attributed the timing of Bush’s speech to politics. The officials… said there is deep disagreement within the intelligence community over the seriousness of the Library Tower scheme and whether it was ever much more than talk.” One intelligence official “attributed the [speech on the plot] to the administration’s desire to justify its efforts in the face of criticism of the domestic surveillance program, which has no connection to the incident.” (Baker and Eggen 2/10/2006) The New York Times will similarly comment, “Bush’s speech came as Republicans are intent on establishing their record on national security as the pre-eminent issue in the 2006 midterm elections, and when the president is facing questions from members of both parties about a secret eavesdropping program that he describes as pivotal to fighting terrorism.” (Bumiller and Johnston 2/10/2006)

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” (PBS Frontline 5/15/2007; Klein 2009, pp. 59-62)

The online news site Raw Story publishes an article claiming that the exposure of covert CIA agent Valerie Plame Wilson (see June 13, 2003, June 23, 2003, July 7, 2003, 8:30 a.m. July 8, 2003, July 8, 2003, 11:00 a.m. July 11, 2003, 8:00 a.m. July 11, 2003, Late Afternoon, July 12, 2003, 1:26 p.m. July 12, 2003, July 12, 2003, and July 14, 2003) caused more damage to US national security than has previously been admitted, particularly in the area of containing foreign nuclear proliferation. Editor and reporter Larisa Alexandrovna sources the story from a number of anonymous current and former intelligence officials. Plame Wilson, the officials say, was an integral part of an operation tracking distribution and acquisition of weapons of mass destruction technology to and from Iran. Alexandrovna writes, “Their [the officials’] accounts suggest that Plame [Wilson]‘s outing was more serious than has previously been reported and carries grave implications for US national security and its ability to monitor Iran’s burgeoning nuclear program.” The officials say that while previous reports indicate Plame Wilson may have been involved in monitoring nuclear “black market” activities, particularly those involving Abdul Qadeer Khan (see Late February 1999), her real focus was Iran, though her team would have come into contact with Khan’s black market network during the course of its work on Iran’s nuclear program. Khan’s network is believed to have been the primary source of Iran’s nuclear weapons efforts. The officials refuse to identify the specifics of Plame Wilson’s work, but do say that her exposure resulted in “severe” damage to her team and significantly hampered the CIA’s ability to monitor nuclear proliferation. (Alexandrovna 2/13/2006) The officials also say that the CIA conducted an “aggressive” in-house assessment of the damage caused by Plame Wilson’s exposure shortly after the White House leaked her identity to the press, and found the damage done by the leak “severe” (see Before September 16, 2003).

Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). (United Press International 2/14/2006) Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” (Nelson 5/15/2006)

Attorney General Alberto Gonzales says he will sharply limit the testimony of former attorney general John Ashcroft and former deputy attorney general James Comey before the Senate Judiciary Committee. The committee is preparing for hearings on the warrantless wiretapping program authorized by President Bush several months after the 9/11 attacks (see Early 2002). Gonzales says that “privilege issues” will circumscribe both men’s testimony: “As a general matter, we would not be disclosing internal deliberations, internal recommendations. That’s not something we’d do as a general matter, whether or not you’re a current member of the administration or a former member of the administration.” He adds, “You have to wonder what could Messrs. Comey and Ashcroft add to the discussion.” Comey was an observer to the late-night visit by Gonzales and then-White House chief of staff Andrew Card to Ashcroft’s hospital room, where Gonzales and Card unsuccessfully attempted to persuade the heavily sedated Ashcroft to reauthorize the program after Comey, as acting attorney general, determined the program was likely illegal (see March 10-12, 2004). Committee chairman Arlen Specter (R-PA) says he has asked Gonzales for permission to call Comey and Ashcroft to testify, but has not yet received an answer. Specter says, “I’m not asking about internal memoranda or any internal discussions or any of those kind of documents which would have a chilling effect.” Specter will ask Ashcroft and Comey to talk about the legal issues at play in the case, including the events surrounding the hospital visit. In the House Judiciary Committee, Republicans block an attempt by Democrats to ask Gonzales to provide legal opinions and other documents related to the program. (Eggen 2/16/2006)

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. (Klein 2009, pp. 63-64)

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration (McCall 2/28/2006) over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). (Leonnig and Sheridan 3/2/2006; Leonnig 3/3/2006) Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. (Singel 3/5/2007)
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. (US Treasury Department 9/9/2004; Leonnig and Sheridan 3/2/2006) The United Nations has banned the organization, saying it has ties to the Taliban. (United Nations 7/27/2007)
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. (Associated Press 8/6/2007) The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. (Elias 8/5/2007)
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Rayed Abdullah.Rayed Abdullah. [Source: Scoop]Rayed Abdullah, an associate of hijacker pilot Hani Hanjour (see October 1996-December 1997 and October 1996-Late April 1999), enters New Zealand despite being on the watch list there and takes further pilot training. The New Zealand government claims it only ascertains his real identity after he has been in the country several months. Abdullah is then arrested and deported to Saudi Arabia, even though he was traveling on a Yemeni passport. (Associated Press 6/9/2006; Cumming 6/10/2006) However, FBI agents and CIA officers later say that the US released Abdullah after 9/11 in an attempt to use him to spy on al-Qaeda for Saudi Arabia’s intelligence agency. The CIA ensures he is allowed into New Zealand as a part of a joint operation. However, the New Zealanders get cold feet when Abdullah starts flight training again. A CIA official will say: “[W]e know if Rayed was part of the [9/11] plot, someone in al-Qaeda will reach out for him, and we have a chance of making that connection.” An FBI official will comment: “The amazing thing is the CIA convinced itself that by getting [Abdullah] tossed out of New Zealand, he would then be trusted and acceptable to Saudi intelligence and useful in al-Qaeda operations. For this tiny chance of success they put passengers at risk to enter into a partnership with Saudi intelligence.” (Trento and Trento 10/9/2006)

Zacarias Moussaoui.Zacarias Moussaoui. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui becomes the first and only person charged in direct connection with the 9/11 attacks to stand trial in the US. (Sniffen and Barakat 3/17/2006) He was preparing to hijack an aircraft and fly it into a target when he was arrested 26 days before 9/11 (see August 16, 2001 and April 22, 2005). Although there has been disagreement whether Moussaoui was to take part in the actual attack of 9/11 or a follow-up plot (see January 30, 2003), the prosecution alleges that Moussaoui had information related to the attacks (see August 16, 2001) and facilitated them by lying and not disclosing everything he knew to the FBI. He is charged with six counts, including conspiracy to commit acts of terrorism and conspiracy to commit aircraft piracy. (US District Court for the Eastern District of Virginia, Alexandria Division 12/11/2001 pdf file) The trial receives much media coverage and the highlights include the playing of United 93’s cockpit recorder (see April 12, 2006), a row over a government lawyer coaching witnesses (see March 13, 2006), and testimony by FBI agent Harry Samit (see March 9 and 20, 2006), former FBI assistant director Michael Rolince (see March 21, 2006), and Moussaoui himself (see March 27, 2006). Moussaoui is forced to wear a stun belt, controlled by one of the marshalls, under his jumpsuit. The belt is to be used if Moussaoui lunges at a trial participant. (Lewis 4/17/2006) He has already pleaded guilty (see April 22, 2005) and the trial is divided into two phases; in the first phase the jury decides that Moussaoui is eligible for the death penalty, but in the second phase it fails to achieve unanimity on whether Moussaoui should be executed (see May 3, 2006). (Barakat 4/3/2006; Lewis 4/17/2006)

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” (Klein and Savage 3/8/2006; Savage 2007, pp. 204)

FBI agent Harry Samit testifying at the Moussaoui trial.FBI agent Harry Samit testifying at the Moussaoui trial. [Source: Agence France-Presse]FBI agent Harry Samit testifies at the trial of Zacarias Moussaoui (see March 6-May 4, 2006). Samit was one of the main agents involved in Moussaoui’s arrest and bombarded his superiors with messages about the danger Moussaoui posed (see August 21, 2001 and August 21, 2001). Under direct examination he relates what happened in August 2001 (see August 22, 2001). The prosecutor asks Samit several times what he would have done if Moussaoui had told the truth, and Samit is usually allowed by the judge to say how it would have helped the investigation and made 9/11 less likely. (US District Court for the Eastern District of Virginia, Alexandria Division 3/9/2006) However, under cross examination Samit says he was not fooled by Moussaoui’s lies and that he immediately suspected him of preparing to hijack an airplane, but the investigation was thwarted by FBI headquarters, and the Radical Fundamentalist Unit in particular. He admits that he told the Justice Department’s Office of Inspector General that FBI headquarters was guilty of “obstructionism, criminal negligence, and careerism,” and that its opposition blocked “a serious opportunity to stop the 9/11 attacks.” (Sniffen 3/20/2006) Samit says he warned his supervisors more than 70 times that Moussaoui was an al-Qaeda operative who might be plotting to hijack an airplane and fly it into a building, and that he was regularly thwarted by two superiors, David Frasca and Michael Maltbie. Reporting Samit’s testimony, the London Times will conclude that “the FBI bungled the Moussaoui investigation.” (Reid 4/25/2006) Similar charges were made by one of Samit’s colleagues, Coleen Rowley, after 9/11 (see May 21, 2002). The Los Angeles Times will comment, “His testimony appeared to undermine the prosecution’s case for the death penalty.” (Serrano 3/20/2006)

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. (Files 3/12/2006; Associated Press 3/12/2006) Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” (Kellman 3/14/2006) Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. (Klein 2009, pp. 84)

Judge Leonie Brinkema halts the trial of Zacarias Moussaoui (see March 6-May 4, 2006) after it is discovered that Transportation Security Administration lawyer Carla J. Martin violated a court order prohibiting witnesses from following the trial. Martin e-mailed transcripts to seven witnesses and coached them on their testimony. Brinkema calls it “the most egregious violation of the court’s rules on witnesses [I have seen] in all the years I’ve been on the bench.” Even the prosecution says, “We frankly cannot fathom why she engaged in such conduct.” (Markon and Dwyer 3/14/2006; Sniffen and Barakat 3/17/2006) Brinkema allows the prosecution to continue to seek the death penalty, but initially removes the aviation security portion of evidence from its case. However, after the prosecution complains this makes the proceedings pointless, she reinstates some of it, allowing the trial to continue. (Sniffen 3/15/2006; Hirschkorn 3/16/2006; Sniffen and Barakat 3/17/2006) As a result of her actions, Martin is placed on paid leave. Additionally, Pennsylvania’s lawyer disciplinary board begins an investigation and federal prosecutors explore charges. (Markon 7/10/2006) Martin’s e-mails also reveal that she has been communicating with attorneys for United and American Airlines. This prompts seven victims’ relatives, who are suing the airlines for being negligent on 9/11, to file a civil action against her alleging that she is trying to help the airline industry avoid civil liability. (CBS News 4/7/2006; Hirschkorn 4/26/2006)

A court filing by Lewis Libby’s defense team lists the witnesses the lawyers say they intend to put on the stand in their client’s defense. The list includes:
bullet Former Deputy Secretary of State Richard Armitage (see June 13, 2003, After October 28, 2005, and November 14, 2005);
bullet Former White House press secretary Ari Fleischer (see July 7, 2003, 8:00 a.m. July 11, 2003, and 1:26 p.m. July 12, 2003);
bullet Former Undersecretary of State Marc Grossman (see June 10, 2003);
bullet Former Secretary of State Colin Powell (see July 16, 2004);
bullet White House political strategist Karl Rove (see July 8, 2003, July 8 or 9, 2003, and 11:00 a.m. July 11, 2003);
bullet Former CIA Director George Tenet (see June 11 or 12, 2003, July 11, 2003 and 3:09 p.m. July 11, 2003);
bullet Former US ambassador Joseph Wilson (see July 6, 2003);
bullet Former CIA covert operative Valerie Plame Wilson (see July 14, 2003);
bullet National Security Adviser Stephen Hadley (see July 21, 2003 and November 14, 2005);
bullet CIA briefers Craig Schmall (see 7:00 a.m. June 14, 2003), Peter Clement, and/or Matt Barrett;
bullet Former CIA officials Robert Grenier (see 4:30 p.m. June 10, 2003, 2:00 p.m. June 11, 2003, and 5:27 p.m. June 11, 2003) and/or John McLaughlin (see June 11 or 12, 2003);
bullet Former CIA spokesman Bill Harlow (see 5:27 p.m. June 11, 2003, (July 11, 2003), and Before July 14, 2003);
bullet Vice President Dick Cheney’s chief of staff David Addington (see July 8, 2003);
bullet Former Cheney press secretary Cathie Martin (see 5:27 p.m. June 11, 2003); and
bullet Cheney himself (see July 12, 2003 and Late September or Early October, 2003).
The defense also:
bullet Wants notes from a September 2003 White House briefing where Powell reportedly claimed that many people knew of Plame Wilson’s CIA identity before it became public knowledge;
bullet Implies that Grossman may not be an unbiased witness;
bullet Suspects Fleischer may have already cooperated with the investigation (see June 10, 2004);
bullet Intends to argue that Libby had no motive to lie to either the FBI (see October 14, 2003 and November 26, 2003) or the grand jury (see March 5, 2004 and March 24, 2004); and
bullet Intends to argue that columnist Robert Novak’s primary source for his column exposing Plame Wilson as a CIA official was not Libby, but “a source outside the White House” (see July 8, 2003). (US District Court for the District of Columbia 3/17/2006 pdf file; Jeralyn Merritt 3/18/2006)
Criminal defense attorney Jeralyn Merritt believes Libby’s team may be preparing to lay blame for the Plame Wilson leak on Grossman. She writes that, in her view, “Libby’s lawyers are publicly laying out how they intend to impeach him: by claiming he is not to be believed because (either or both) his true loyalty is to Richard Armitage rather than to the truth, or he is a self-aggrandizing government employee who thinks of himself a true patriot whose duty it is to save the integrity of the State Department.” (Jeralyn Merritt 4/4/2006) Libby’s lawyers indicate that they will challenge Plame Wilson’s significance as a covert CIA official (see Fall 1992 - 1996, April 2001 and After, Before September 16, 2003, October 3, 2003, October 11, 2003, October 22-24, 2003, October 23-24, 2003, and February 13, 2006). “The prosecution has an interest in continuing to overstate the significance of Ms. Wilson’s affiliation with the CIA,” the court filing states. They also intend to attempt to blame Armitage, Grossman, Grenier, McLaughlin, Schmall, and/or other officials outside the White House proper as the real sources for the Plame Wilson identity leak. (US District Court for the District of Columbia 3/17/2006 pdf file; Leopold 3/18/2006)

Michael Rolince, who headed the FBI’s International Terrorism Operations Section when Zacarias Moussaoui was arrested, testifies at Moussaoui’s trial (see March 6-May 4, 2006). He initially states that he was only informed of the Moussaoui case before 9/11 in two brief hallway conversations (see Late August 2001) and did not read a memo sent to him by the Minneapolis field office. However, under cross-examination he admits he also discussed a plan to deport Moussaoui to France, where his belongings could be searched (see (August 30-September 10, 2001)). (Barakat 3/21/2006; Sniffen 3/21/2006) According to Newsday, Rolince appears “red-faced and flustered” at the end of the cross-examination and makes the court burst out laughing when he says he did not approve a briefing to FBI field offices about bin Laden threats in the US (see Before April 13, 2001), even though the briefing states he approved it. He says one of his subordinates may have approved it. (Sniffen 3/21/2006; Riley 3/22/2006) Rolince is called by the prosecution, which wants him to give a list of steps the FBI would have taken if Moussaoui had confessed. However, Judge Brinkema states that, “Juries cannot decide cases on speculation… Nobody knows what would have happened.” (Sniffen 3/21/2006; Barakat 3/22/2006)

During the trial of Zacarias Moussaoui (see also March 6-May 4, 2006), the prosecution claims that if Zacarias Moussaoui had not lied when arrested and questioned (see August 16, 2001) and had provided information about the plot (see August 16, 2001), the FAA could have altered its security procedures to deal with the suicide hijacker threat. Prosecution witness Robert Cammaroto, an aviation security officer, says that security measures in effect before 9/11 were designed to cope with different types of threats, such as “the homesick Cuban,” rather than suicide hijackings. He says that if the FAA had more information about Moussaoui, its three dozen air marshals could have been moved from international to domestic flights, security checkpoints could have been tightened to detect short knives like the ones Moussaoui had, and flight crews could have been instructed to resist rather than cooperate with hijackers. Most of these steps could have been implemented within a matter of hours. However, Cammarato admits that the FAA was aware before 9/11 that terrorists considered flying a plane into the Eiffel Tower and that al-Qaeda has performed suicide operations on land and sea. (Sniffen 3/22/2006)

Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site.Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site. [Source: FBI]During the trial of Zacarias Moussaoui (see March 6-May 4, 2006), the Reporters Committee for Freedom of the Press publishes a significant portion of the exhibits used during the trial. (Reporters Committee for Freedom of the Press 12/4/2006) Previously, only a few items of the evidence linking the attacks to al-Qaeda were made public. For example, the 9/11 Commission’s Terrorist Travel Monograph contained 18 documents of the alleged hijackers and their associates. (9/11 Commission 8/21/2004, pp. 171-195 pdf file) The published exhibits include:
bullet Items belonging to the alleged hijackers that were recovered from the crash sites and Logan airport;
bullet Some details of the hijackers’ movements in the US;
bullet Graphic photos of dead victims and body parts in the Pentagon and WTC ruins;
bullet Substitutions for testimony from some of the main plotters such as Khalid Shaikh Mohammed;
bullet The missing chapter from the Justice Department’s Office of Inspector General’s review of the FBI’s performance before 9/11 (see June 9, 2005); and
bullet FBI and CIA documents. (Reporters Committee for Freedom of the Press 12/4/2006)
At the end of July, the US District Court for the Eastern District of Virginia, Alexandria Division, publishes more of the exhibits used in the trial. The additionally published exhibits include, for example:
bullet Documents of the hijackers found at the crash sites and Logan airport, such as Satam Al Suqami’s passport (see After 8:46 a.m. September 11, 2001), Ahmed Alnami’s youth hosteling card, and old correspondence between Mohamed Atta and the German authorities;
bullet Recordings of calls made by the passengers from the flights and recordings of the hijacker pilots talking to the passengers;
bullet Documents about the alleged hijackers prepared by the FBI such as a True Name Usage Chart for 2001 and chronologies for eleven of the hijackers from August 16-September 11, 2001;
bullet Documents from the hijackers’ flight schools;
bullet A small sample of the hijackers’ banking and phone records.
However, some of the exhibits are not disclosed. For example, the cockpit voice recording from United 93 is sealed and only a transcript is made available. (US District Court for the Eastern District of Virginia 7/31/2006)

Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11.Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11. [Source: Mirrorpix(.com)]Against the will of his defense attorneys, Zacarias Moussaoui takes the stand at his trial (see March 6-May 4, 2006) and claims that he was supposed to fly a fifth plane on 9/11. He says the plane would have targeted the White House and one of the muscle hijackers would have been shoe-bomber Richard Reid (see December 22, 2001). However, he claims not to have known the details of the other hijackings, only that the WTC would be hit. He does not mention any other collaborators aside from Reid, who has already been sentenced to a long prison term. When the prosecution asks him whether he lied to FBI investigators so the plan could go forward he replies, “That’s correct.” An Associated Press expert calls this, “a stunning revelation that would help prosecutors rather than him.” (Sniffen 3/27/2006) In what the New York Times calls a “bizarre moment,” the defense team, aware of the damage this admission could do, subject Moussaoui to tough questioning and the chief prosecutor objects that one of the defense attorneys is badgering his own client. (Lewis 4/17/2006)
Uncertainty over Fifth Jet - There is some dispute over whether Moussaoui was indeed to have flown a fifth plane (see January 30, 2003 and Before 2008). Following the testimony, the defense reads statements made by al-Qaeda leaders who are in custody, but are not permitted to testify at the trial (see May 14, 2003 and March 22, 2005). The statements say that Moussaoui was not part of 9/11, but a follow-up operation. (Associated Press 3/28/2006; US District Court for the Eastern District of Virginia 7/31/2006 pdf file) However, these statements were obtained using torture (see June 16, 2004). The government later concedes that there is no evidence linking Richard Reid to 9/11. (Barakat 4/20/2006)
"Complete Fabrication" - Moussaoui had denied being part of 9/11 before the trial (see April 22, 2005). By the end of the trial he will do so again, calling the confession he makes on this day “a complete fabrication.” (Sniffen 5/8/2006)

Four statements based on the CIA inspector general’s report on some aspects of the agency’s performance before 9/11 are introduced as evidence at the trial of Zacarias Moussaoui by the defense. The report was completed in 2004 (see June-November 2004), but rewritten and is still secret (see January 7, 2005). The four passages say:
bullet “Numerous” CIA officers accessed cables reporting that Khalid Almihdhar’s passport contained a US visa and Nawaf Alhazmi had flown from Thailand to Los Angeles (see Mid-January-March 2000); (US District Court for the Eastern District of Virginia, Alexandria District 3/28/2006 pdf file)
bullet FBI Director Louis Freeh was briefed about Almihdhar in January 2000, but not told that Almihdhar had a US visa (see January 6-9, 2000); (US District Court for the Eastern District of Virginia, Alexandria Division 3/28/2006 pdf file)
bullet Nobody at Alec Station, the CIA’s bin Laden unit, notified CIA personnel authorized to collect foreign intelligence in the US together with the FBI about Almihdhar’s US visa (see 9:30 a.m. - 4:00 p.m. January 5, 2000); (US District Court for the Eastern District of Virginia, Alexandria Division 3/28/2006 pdf file)
bullet The CIA was unaware of the Phoenix memo until after 9/11 (note: this may not actually be true—see (July 27, 2001)). (US District Court for the Eastern District of Virginia, Alexandria Division 3/28/2005 pdf file)
Two sections of the 9/11 Congressional Inquiry report are also introduced as evidence as substitutes for the CIA inspector general’s report. They cover the use of aircraft as weapons and US knowledge of bin Laden’s intentions to strike inside the US in the summer of 2001. (US District Court for the Eastern District of Virginia, Alexandria Division 3/28/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division 3/28/2006 pdf file)

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). (Klein 2009, pp. 49-50, 71) Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. (Klein 2009, pp. 71)

The Justice Department demands that it be allowed to review evidence obtained by the Electronic Frontier Foundation (EFF) from retired AT&T technician Mark Klein (see February 23-28, 2006). The EFF is preparing to submit the evidence under regular court seal to presiding Judge Vaughn Walker. Neither the Justice Department nor any other government agency is a named defendant in the EFF’s lawsuit against AT&T for its allegedly illegal behavior in working with the National Security Agency (NSA) to conduct warrantless surveillance against American citizens (see January 31, 2006). Even so, lawyers from the Justice Department say they want to see if Klein’s documentation contains classified information (it does not—see Late 2003), and if so, they intend to place Klein’s documentation into a “sensitive compartmented information facility,” which would mean it would not be kept at the courthouse but in the possession of government agents at a secure location. Such classification would make the legal proceedings more difficult for both Judge Walker and the EFF lawyers. However, the request piques the interest of the national media, and reporters begin “flooding” Klein and the EFF with requests for information and interviews. (Klein 2009, pp. 65-66) Ironically, two news outlets, the Los Angeles Times and New York Times, have all but shunned Klein before now (see February 11, 2006 and After and Mid-February - Late March, 2006). On April 4, after perusing the documents, the government lawyers return them to Walker with approval from senior Justice Department lawyer Anthony J. Coppolino to file them under ordinary court seal. Klein will later write that Coppolino’s acquiescence will undermine the government’s later efforts to have the lawsuit dismissed under the “state secrets” provision (see Late May, 2006). (Klein 2009, pp. 66) In June 2007, the online technical news site Wired News will publish the documents after they are released by the Electronic Frontier Foundation (see June 13, 2007) under the headline “AT&T ‘Spy Room’ Documents Unsealed; You’ve Already Seen Them.” Wired previously published them in May 2006 (see May 17, 2006), and PBS’s Frontline also published them as part of a televised documentary on Klein and the eavesdropping program. (Singel 6/13/2007)

Jeffrey Rapp, the director of the Joint Intelligence Task Force for Combating Terrorism at the Defense Intelligence Agency, provides a 16-page document supporting the government’s declaration that Ali Saleh Kahlah al-Marri is an enemy combatant (see December 12, 2001). Rapp gives the classified document, originally prepared in September 2004 and partially declassified for the court, to the trial judge presiding over the case, Henry Floyd (see April 6, 2006). The document, informally known as the “Rapp Declarations,” makes an array of charges against al-Marri, including alleging that he “met personally” with Osama bin Laden and was sent to the US to “explore computer-hacking methods to disrupt bank records and the US financial system.” Rapp claims that al-Marri was trained in the use of poisons and had detailed information about poisonous chemicals on his laptop computer, a claim verified by an FBI search. Additionally, Rapp says that al-Qaeda “instructed al-Marri to explore possibilities for hacking into the mainframe computers of banks with the objective of wreaking havoc on US banking records.” Rapp also says that al-Marri’s computer was loaded with “numerous computer programs typically utilized by computer hackers; ‘proxy’ computer software which can be utilized to hide a user’s origin or identity when connected to the Internet; and bookmarked lists of favorite Web sites apparently devoted to computer hacking.” Rapp refuses to cite any sources other than “specific intelligence sources” that are “highly classified.” (Jeffrey M. Rapp 9/9/2004 pdf file; McCullagh 9/22/2006) While this kind of evidence is routinely dismissed as hearsay evidence inadmissible in court, Floyd rules that because the Supreme Court ruled in Hamdi v. Rumsfeld that hearsay evidence can be used against alleged enemy combatants (see June 28, 2004), the “Rapp Declarations” would be considered. Floyd says that al-Marri’s lawyers will have to provide “more persuasive evidence” that counters the government’s case—a reversal of the usual burden of proof that places the responsibility of proving guilt on the prosecution and not the defense. (McCullagh 9/22/2006)

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). (Wired News 4/7/2006; Singel 4/7/2006; Klein 2009, pp. 66-67)

The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” (New York Times 4/7/2006; Klein 2009, pp. 70) A week later, the Times will publish a more in-depth article (see April 12, 2006).

Special counsel Patrick Fitzgerald accuses “multiple people in the White House” of engaging in a “concerted action” to smear the character of war critic Joseph Wilson (see June 2003, June 3, 2003, June 11, 2003, June 12, 2003, June 19 or 20, 2003, July 6, 2003, July 6-10, 2003, July 7, 2003 or Shortly After, 8:45 a.m. July 7, 2003, 9:22 a.m. July 7, 2003, July 7-8, 2003, July 11, 2003, (July 11, 2003), July 12, 2003, July 12, 2003, July 18, 2003, October 1, 2003, and April 5, 2006), using classified information (see April 5, 2006) to do so. Fitzgerald places Vice President Dick Cheney at the heart of the smear campaign. He uses grand jury testimony from Cheney’s former chief of staff, Lewis Libby (see March 5, 2004 and March 24, 2004), to substantiate his charges. Libby’s efforts to spread false rumors via classified information include his June 2003 meeting with Washington Post reporter Bob Woodward (see June 27, 2003), his two conversations with New York Times reporter Judith Miller (see 8:30 a.m. July 8, 2003 and Late Afternoon, July 12, 2003), and his conversation with Time reporter Matthew Cooper (see 2:24 p.m. July 12, 2003). Fitzgerald says that White House officials besides Cheney, Libby, and White House political strategist Karl Rove are involved in the Wilson smear campaign. According to Fitzgerald, the grand jury has collected so much testimony and so many documents that “it is hard to conceive of what evidence there could be that would disprove the existence of White House efforts to ‘punish’ Wilson.” (Gellman and Linzer 4/9/2006)

The Washington Post reports that leaked documents show the US military is conducting a propaganda campaign to exaggerate the role of Abu Musab al-Zarqawi, the alleged leader of al-Qaeda in Iraq. According to the Post, “The effort has raised his profile in a way that some military intelligence officials believe may have overstated his importance and helped the Bush administration tie the [Iraq] war to the organization responsible for the Sept. 11, 2001, attacks.” According to Col. Derek Harvey, who has been a top advisor on Iraq intelligence for the Joint Chiefs of Staff, although al-Zarqawi and other foreign insurgents in Iraq have conducted some deadly bombing attacks, they remain “a very small part of the actual numbers…. Our own focus on al-Zarqawi has enlarged his caricature, if you will—made him more important than he really is, in some ways.” Since at least 2004, the US military has manipulated the Iraq media’s coverage of Zarqawi in an effort to turn Iraqis against the insurgency. But leaked documents also explicitly list the “US Home Audience” as one of the targets of a broader propaganda campaign. Additionally, sections of leaked military briefings show that the US media was directly used to influence view of al-Zarqawi. For instance, one document notes that a “selective leak” about al-Zarqawi was made to New York Times reporter Dexter Filkins, which resulted in a 2004 front page story about a letter supposedly written by al-Zarqawi and boasting of suicide attacks in Iraq (see February 9, 2004). (Ricks 4/10/2006) The Daily Telegraph reported in 2004 that “senior diplomats in Baghdad claim that the letter was almost certainly a hoax.” The Telegraph also reported the US was buying extremely dubious intelligence that exaggerated al-Zarqawi’s role and was treating it as fact, even in policy decisions (see October 4, 2004). (Blomfield 10/4/2004) One US military briefing from 2004 states, “Villainize Zarqawi/leverage xenophobia response” and lists three methods: “Media operations,” “Special Ops (626)” (a reference to Task Force 626, an elite US military unit) and “PSYOP,” meaning psychological operations and propaganda. One internal US military briefing concluded that the “al-Zarqawi PSYOP program is the most successful information campaign to date… primarily for the Iraqi audience but also with the international audience.” It is supposedly US military policy not to aim psychological operations at Americans, but there appears to be no punishment for the violation of this policy in the wake of this media report. (Ricks 4/10/2006)

Mushin Musa Matwalli Atwah.Mushin Musa Matwalli Atwah. [Source: FBI]Mohsin Musa Matawalli Atwah, an Egyptian al-Qaeda operative, is killed in a remote village in the North Waziristan region of Pakistan. There was a $5 million bountry for Atwah, who was wanted for involvement in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Witnesses describe a missile strike followed by a Pakistani helicopter gunship attack. The attack is said to have killed nine people, including two young children. (Associated Press 4/13/2006; Schuster 10/24/2006)

Page 17 of 22 (2160 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22 | next

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike