!! History Commons Alert, Exciting News

Context of 'November 20-21, 1974: Freedom of Information Act Strengthened by Congressional Amendments'

This is a scalable context timeline. It contains events related to the event November 20-21, 1974: Freedom of Information Act Strengthened by Congressional Amendments. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 2 of 3 (217 events)
previous | 1, 2, 3 | next

Senior AT&T technician Mark Klein (see July 7, 2009), who is considering “blowing the whistle” on the National Security Agency’s secret data-mining operation being conducted with the complicity and participation of AT&T (see January 16, 2004), is troubleshooting a problem of “signal loss” caused by AT&T’s signals being routed through the NSA’s “splitter cabinet,” which “splits” part of the optical data flow from its normal route into the NSA’s computers, enabling the agency to monitor all of the Internet traffic going through Klein’s Folsom Street, San Francisco, facility (see October 2003). Klein learns from a fellow technician that AT&T is “getting the same problem in the other offices where splitters are going in.” Klein is stunned to learn that other AT&T facilities have NSA splitters. He learns from the other technician that the “other offices” are in, among other places, Atlanta, San Diego, San Jose, and Seattle. (Apparently neither Klein nor the other technician are aware of the NSA splitter at the central AT&T facility in Bridgeton, Missouri—see Late 2002-Early 2003). Klein will later write, “This thing was getting bigger and bigger.” Klein determines that the NSA splitter is causing the signal loss: “The company was degrading the signal quality of its network for the sake of the NSA.”
Visiting the Secret Room - Klein accompanies an AT&T field support specialist named Rick into the NSA’s “secret room” at the Folsom Street building, with the intention of repairing the splitter problem. Rick is one of the few AT&T technicians authorized to work in the room; he invites Klein to join him and Klein agrees. Klein watches Rick punch the entry code into the lock of Room 641A and follows him inside. Klein observes a large amount of hardware, most installed in what he will later call “standard cabinets used by the telecommunications industry,” along with a computer workstation and a set of storage lockers. Klein later says he spends no more than two minutes inside the secret room. He will recall: “[I]f I didn’t know that the NSA was involved, it would look like any other work space where telecom people work, with rows of cabinets with equipment inside them, humming.… [T]he odd thing about the whole room, of course, was that I couldn’t normally get in there, nor could any of the other union technicians. Only this one guy who had clearance from the NSA could get in there, so that changed the whole context of what this is about.” Shortly thereafter, Rick tells Klein and a group of employees that he has keys allowing him access to the other NSA secret rooms in AT&T’s offices in San Diego, San Jose, and Seattle. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 42-44]

Entity Tags: AT&T, “Rick” (AT&T field support specialist), Mark Klein, National Security Agency

Timeline Tags: Civil Liberties

The Supreme Court rules in the case of McConnell v. Federal Election Commission. The case addresses limitations on so-called “soft money,” or contributions to a political party not designated specifically for supporting a single candidate, that were imposed by the Bipartisan Campaign Reform Act of 2002 (BCRA), often known as the McCain-Feingold law after its two Senate sponsors (see March 27, 2002). A three-judge panel has already struck down some of McCain-Feingold’s restrictions on soft-money donations, a ruling that was stayed until the Court could weigh in. Generally, the Court rules that the “soft money” ban does not exceed Congress’s authority to regulate elections, and does not violate the First Amendment’s free speech clause. The ruling is a 5-4 split, with the majority opinion written by liberal Justice John Paul Stevens and his conservative colleague Sandra Day O’Connor. The opinion finds that the “minimal” restrictions on free speech are outweighed by the government’s interest in preventing “both the actual corruption threatened by large financial contributions and… the appearance of corruption” that might result from those contributions. “Money, like water, will always find an outlet,” the justices write, and the government must take steps to prevent corporate donors from finding ways to subvert the contribution limits. The majority is joined by liberal justices Stephen Breyer, Ruth Bader Ginsburg, and David Souter, and the four other conservatives on the court—Anthony Kennedy, William Rehnquist, Antonin Scalia, and Clarence Thomas—dissent. [Legal Information Institute, 12/2003; Oyez (.org), 2011] The case represents the consolidation of 11 separate lawsuits brought by members of Congress, political parties, unions, and advocacy groups; it is named for Senator Mitch McConnell, who sued the FEC on March 27, 2002, the same day the bill was signed into law. Due to the legal controversy expected to be generated by the law and the need to settle it prior to the next federal election, a provision was included in the BCRA that provided for the case to be heard first by a special three-judge panel and then appealed directly to the Supreme Court. This District of Columbia district court panel, comprised of two district court judges and one circuit court judge, was inundated with numerous amicus briefs, almost 1,700 pages of related briefs, and over 100,000 pages of witness testimony. The panel upheld the BCRA’s near-absolute ban on the usage of soft money in federal elections, and the Supreme Court agrees with that finding. However, the Court reverses some of the BCRA’s limitations on the usage of soft money for “generic party activities” such as voter registration and voter identification. The district court overturned the BCRA’s primary definition of “noncandidate expenditures,” but upheld the “backup” definition as provided by the law. Both courts allow the restrictions on corporate and union donations to stand, as well as the exception for nonprofit corporations. The Court upholds much of the BCRA’s provisions on disclosure and coordinated expenditures. The lower court rejected the so-called “millionaire provisions,” a rejection the Supreme Court upholds. A provision banning contributions by minors was overturned by the lower court, and the Court concurs. The lower court found the provision requiring broadcasters to collect and disclose records of broadcast time purchased for political activities unconstitutional, but the Court disagrees and reinstates the requirement. [Legal Information Institute, 12/2003] McConnell had asked lawyer James Bopp Jr., a veteran of anti-campaign finance lawsuits and the head of McConnell’s James Madison Center for Free Speech, to take part in the legal efforts of the McConnell case. However, before the case appeared before the Supreme Court, McConnell dropped Bopp from the legal team due to a dispute over tactics. [New York Times, 1/25/2010] The 2010 Citizens United decision will partially overturn McConnell (see January 21, 2010).

Entity Tags: Federal Election Commission, David Souter, Bipartisan Campaign Reform Act of 2002, Antonin Scalia, Anthony Kennedy, William Rehnquist, US Supreme Court, Stephen Breyer, Sandra Day O’Connor, National Rifle Association, Mitch McConnell, John Paul Stevens, Ruth Bader Ginsburg, James Bopp, Jr, Clarence Thomas

Timeline Tags: Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Police photo of Tom DeLay, after his 2005 indictment on election fraud charges.Police photo of Tom DeLay, after his 2005 indictment on election fraud charges. [Source: Mug Shot Alley]The co-founder and editor of the American Prospect, Robert Kuttner, subjects the 2002 House of Representatives to scrutiny, and concludes that under the rule of House Majority Leader Tom DeLay (R-TX), it is well on its way to becoming what he calls a “dictatorship.” Kuttner writes that such authoritarian rule in “the people’s chamber” of Congress puts the US “at risk of becoming an autocracy.” He explains: “First, Republican parliamentary gimmickry has emasculated legislative opposition in the House of Representatives (the Senate has other problems). [DeLay] has both intimidated moderate Republicans and reduced the minority party to window dressing.… Second, electoral rules have been rigged to make it increasingly difficult for the incumbent party to be ejected by the voters, absent a Depression-scale disaster, Watergate-class scandal, or Teddy Roosevelt-style ruling party split.… Third, the federal courts, which have slowed some executive branch efforts to destroy liberties, will be a complete rubber stamp if the right wins one more presidential election. Taken together, these several forces could well enable the Republicans to become the permanent party of autocratic government for at least a generation.” Kuttner elaborates on his rather sweeping warnings.
Legislative Dictatorship - The House, and to a lesser extent the Senate, used to have what was called a “de facto four-party system”: liberal Democrats; Southern “Dixiecrats” who, while maintaining their membership as Democrats largely due to lingering resentment of Republicans dating back to the Civil War, often vote with Republicans; conservative Republicans; and moderate-to-liberal “gypsy moth” Republicans, who might vote with either party. Rarely did one of the four elements gain long-term control of the House. Because of what Kuttner calls “shifting coalitions and weak party discipline,” the majority party was relatively respectful of the minority, with the minority free to call witnesses in hearings and offer amendments to legislation. In the House, that is no longer true. While the House leadership began centralizing under House Speaker Jim Wright (D-TX) between 1987 and 1989, the real coalescence of power began under Speaker Newt Gingrich (R-GA) between 1995 and 1999. The process, Kuttner asserts, has radically accelerated under DeLay and Speaker Dennis Hastert (R-IL).
Centralized Legislation - Under current practices, even most Republicans do not, as a rule, write legislation—that comes from DeLay and Hastert. Drastic revisions to bills are often rammed through late in the evening, with little or no debate. The Republican leadership has classified legislation as “emergency” measures 57 percent of the time, allowing them to be voted on with as little as 30 minutes of debate. Kuttner writes, “On several measures, members literally did not know what they were voting for.” Legislation written and proposed by Democrats rarely gets to the floor for debate. Amendments to legislation is also constrained, almost always coming from Hastert and DeLay. “[V]irtually all major bills now come to the floor with rules prohibiting amendments.” DeLay enforces rigid party loyalty, threatening Republican members who resist voting for the leadership’s bills with loss of committee assignments and critical campaign funds, and in some circumstances with DeLay’s sponsoring primary opponents to unseat the uncooperative member in the next election.
Democrats Shut out of Conferences - In the House, so-called “conference committees,” where members work to reconcile House and Senate versions of legislation, have become in essence one-party affairs. Only Democrats who might support the Republican version of the bill are allowed to attend. The conference committee then sends a non-amendable bill to the floor for a final vote.
No Hearings - The general assumption is that House members debate bills, sometimes to exhaustion, on the chamber floor. No more. Before DeLay, bills were almost never written in conference committees. Now, major legislation is often written in conference committee; House members often never see the legislation until it has been written in final, non-amendable form by DeLay and his chosen colleagues.
Abuse of Appropriations - Appropriations, or funding of events authorized by legislation, are ripe for use and misuse by the one-party leadership. Many appropriations bills must pass in order for Congress or other entities of the government to continue functioning. While “earmarks”—“pork-barrel” appropriations for individual members’ pet projects and such—are nothing new, under Gingrich and later Hastert/DeLay, the use of earmarks has skyrocketed. Huge earmarks are now routinely attached to mandatory appropriations bills. DeLay has perfected a technique known as “catch and release.” On close pending votes, the House Republican Whip Organization, made up of dozens of regional whips, will target the small but critical number of Republicans who might oppose the legislation. Head counts are taken; as members register (and change) their votes, some are forced to vote against their consciences (or their constituents) and others are allowed to vote no. Kuttner writes, “Basically, Republican moderates are allowed to take turns voting against bills they either oppose on principle or know to be unpopular in their districts.” This allows the member to save at least some face with their constituents. Under Wright, Republican members such as then-Representative Dick Cheney (R-WY) were outraged when Wright held a vote open for 15 minutes after voting was to end; Cheney called it “the most arrogant, heavy-handed abuse of power I’ve ever seen in the 10 years that I’ve been here.” It is not unusual for DeLay to hold votes open for up to three hours to get recalcitrant members in line. [American Prospect, 2/1/2004] In 2006, author John Dean will note that when the Republicans took control of the House in 1999, there were 1,439 earmarks in that year’s legislation. By the end of 2005, “there were a staggering 13,998 earmarked expenses, costing $27.3 billion.” Dean will write, “Needless to say, there is nothing conservative in those fiscal actions but there is much that is authoritarian about the wanton spending by those Republicans.” [Dean, 2006]
Lack of Opposition - Kuttner notes that Congressional Democrats have not mounted a systematic, organized denunciation of the DeLay operation. Kuttner believes that many Democrats believe voters are uninterested in what they call “process issues,” and that voters will dismiss complaints as “inside baseball,” of little relevance to their lives. Worse, such complaints “make… us look weak,” as one senior House staffer says. Kuttner writes that many Democrats believe such complaints sound “like losers whining.”
Permanent Republican Majority - If DeLay and his confreres in the White House have their way, there will be, in essence, a permanent Republican majority in the House and hopefully in the Senate as well. Bill Clinton routinely practiced what he called bipartisan “triangulation,” building ad hoc coalitions of Democrats and Republicans to pass his legislative initiatives, and in the process weakening the Democratic leadership. Kuttner writes, “Bush’s presidency, by contrast, has produced a near parliamentary government, based on intense party discipline both within Congress and between Congress and the White House.” Republicans have been busy reworking the district maps of various key states to ensure that Republicans keep their majorities, concentrating perceived Democratic voters to have overwhelming majorities in a few districts, and leaving the Republicans holding smaller majorities in the rest. Both parties have been guilty of such “gerrymandering” in the past, but with DeLay’s recent “super-gerrymandering” of his home state of Texas, the Republican makeup of the Texas House delegation is all but assured. DeLay and other House Republicans are working to redistrict other states in similar fashions. As of the 2004 midterm elections, of the 435 House seats, only around 25 are considered effectively contestable—over 90 percent of the House seats are “safe.” Democrats would have to win a disproportionate, and unlikely, number of those “swing” seats to take back control of the House. Kuttner writes: “The country may be narrowly divided, but precious few citizens can make their votes for Congress count. A slender majority, defying gravity (and democracy), is producing not moderation but a shift to the extremes.”
Control of Voting - Kuttner cites the advent of electronic voting machines and the Help America Vote Act (HAVA) as two reasons why Republicans will continue to have advantages at the voting booth. The three biggest manufacturers of electronic voting machines have deep financial ties to the Republican Party, and have joined with Republicans in opposing a so-called “verifiable paper trail” that could prove miscounts and possible fraudulent results. HAVA, written in response to the 2000 Florida debacle, requires that voters show government-issued IDs to be allowed to vote, a provision that Kuttner says is ripe for use in Republican voter-intimidation schemes. Republicans “have a long and sordid history of ‘ballot security’ programs intended to intimidate minority voters by threatening them with criminal prosecution if their papers are not technically in order,” he writes. “Many civil rights groups see the new federal ID provision of HAVA as an invitation to more such harassment.” The only recourse that voters have to such harassment is to file complaints with the Department of Justice, which, under the aegis of Attorney General John Ashcroft, has discouraged investigation of such claims.
Compliant Court System - Increasingly, federal courts with Republican-appointed judges on the bench have worked closely with Republicans in Congress and the White House to issue rulings favorable to the ruling party. Kuttner notes that if President Bush is re-elected: “a Republican president will have controlled judicial appointments for 20 of the 28 years from 1981 to 2008. And Bush, in contrast to both his father and Clinton, is appointing increasingly extremist judges. By the end of a second term, he would likely have appointed at least three more Supreme Court justices in the mold of Antonin Scalia and Clarence Thomas, and locked in militantly conservative majorities in every federal appellate circuit.” The Supreme Court is already close to becoming “a partisan rubber stamp for contested elections,” Kuttner writes; several more justices in the mold of Justices Antonin Scalia (see September 26, 1986) and Clarence Thomas (see October 13, 1991) would, Kuttner writes, “narrow rights and liberties, including the rights of criminal suspects, the right to vote, disability rights, and sexual privacy and reproductive choice. It would countenance an unprecedented expansion of police powers, and a reversal of the protection of the rights of women, gays, and racial, religious, and ethnic minorities. [It would] overturn countless protections of the environment, workers and consumers, as well as weaken guarantees of the separation of church and state, privacy, and the right of states or Congress to regulate in the public interest.” [American Prospect, 2/1/2004]

Entity Tags: George W. Bush, Democratic Party, Dennis Hastert, Clarence Thomas, Antonin Scalia, Tom DeLay, Robert Kuttner, William Jefferson (“Bill”) Clinton, Republican Party, John Ashcroft, Richard (“Dick”) Cheney, House Republican Whip Organization, James C. (‘Jim’) Wright, Jr., John Dean, Newt Gingrich, Help America Vote Act

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

At a speech in Hershey, Pennsylvania, supporting the USA Patriot Act (see October 26, 2001), President Bush tells listeners that all US surveillance efforts are done with warrants from the Foreign Intelligence Surveillance Act (FISA) Court: “For years, law enforcement used so-called roving wire taps to investigate organized crime. You see, what that meant is if you got a wire tap by court order—and, by the way, everything you hear about requires court order, requires there to be permission from a FISA court, for example.… See, with court approval, we have long used roving wire taps to lock up monsters—mobsters. Now [with the Patriot Act in effect] we have a chance to lock up monsters, terrorist monsters.” [White House, 4/19/2004] The next day, Bush makes a similar claim during another pro-Patriot Act speech in Buffalo. He tells listeners: “[T]here are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires—a wiretap requires a court order. Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so. It’s important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. But a roving wiretap means—it was primarily used for drug lords. A guy, a pretty intelligence drug lord would have a phone, and in old days they could just get a tap on that phone. So guess what he’d do? He’d get him another phone, particularly with the advent of the cell phones. And so he’d start changing cell phones, which made it hard for our DEA types to listen, to run down these guys polluting our streets. And that changed, the law changed on—roving wiretaps were available for chasing down drug lords. They weren’t available for chasing down terrorists, see? And that didn’t make any sense in the post-9/11 era. If we couldn’t use a tool that we’re using against mobsters on terrorists, something needed to happen. The Patriot Act changed that. So with court order, law enforcement officials can now use what’s called roving wiretaps, which will prevent a terrorist from switching cell phones in order to get a message out to one of his buddies.” [White House, 4/20/2004] Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48] Klein will call Bush’s description of the surveillance program “disingenuous,” and continue: “They present it as about phone calls. They’re just watching a few bad people who make phone calls to al-Qaeda and the Middle East, and you notice they don’t talk about the Internet hardly at all. That part of it hasn’t been revealed, because if they did, Americans would realize it’s not just a few people; it’s everybody, because the data they’re handing over is not selected out. When you run fiber optics through a splitter and you send all that data to a secret room, there’s no selecting going on there at all.… They have no way of sifting it out unless they look through it later. Now they can claim, ‘Oh, we are right as rain; we’re only doing the legal thing and selecting out a few people that we’re legally entitled to,’ but that’s only after they get all the data. The analogy I use: If the government claims: ‘Well, when you do your taxes, why don’t you just write me a blank check and we’ll fill in the amount? Don’t worry. We’ll do it legal. We’ll fill in the right amount,’ would you do that? Nobody would trust the government by writing a blank check to them. It’s the same thing with the data we’re giving them.… [T]he Fourth Amendment specifically bans general warrants. It calls for specific warrants in which the things to be seized and the persons to be seized are specifically named. There’s a reason for that. It’s to protect against arbitrary government power. And what they’ve done is to trample over the Fourth Amendment by basically instituting a general warrant on the Internet.” [PBS Frontline, 5/15/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Mark Klein, National Security Agency, George W. Bush

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Entity Tags: Mark Klein, AT&T

Timeline Tags: Civil Liberties

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

Judge Colleen Kollar-Kotelly, the presiding judge over the Foreign Intelligence Surveillance Court (FISC), warns the Justice Department that if it does not stop using evidence collected with warrantless wiretaps to obtain warrants to continue surveillance, her court will be more reluctant to grant warrants for surveillance. Kollar-Kotelly has complained about this before (see 2004). Though both Kollar-Kotelly and her predecessor, Judge Royce Lambeth, express concerns to senior officials that Bush’s warrantless wiretapping program is inherently unconstitutional, neither judge feels that they have the authority to rule on the president’s power to order such surveillance. Instead, they work to preserve the integrity of the FISA process. Eventually, the judges reach a compromise with government lawyers: any case using evidence from warrantless wiretaps that is to be presented to the judges for FISA warrants to continue monitoring the same suspects will be “tagged,” and that evidence will not be used to obtain warrants. Those cases, numbering less than ten a year, are to be presented only to the presiding judge. Lambeth and Kollar-Kotelly both feel that the process will work primarily because of the trust they have developed in James Baker, the Justice Department’s liaison to FISC. Part of the problem stems from contradictory statements and claims from the administration; after the wiretapping program began (see After September 11, 2001, NSA chief Michael Hayden and then-Attorney General John Ashcroft made it clear in private meetings with the judges that President Bush wanted to gain all possible information on any potential terrorist attacks, and that such information-gathering must by necessity go beyond the FISA court’s probable-cause requirement. But more recent assertions by Hayden and Ashcroft’s successor, Alberto Gonzales (see December 19, 2005, claiming that NSA analysts do not listen to domestic calls unless they already have some evidence that one of the parties to the call has links to terrorism, contradict earlier administration claims to the judges. Kollar-Kotelly suspects that the entire truth of the matter is not being presented to her and the FISC. Her suspicions are validated when her court is, in spite of administration reassurances, again presented with warrant applications based on illegally obtained evidence (see Late 2005). [Washington Post, 2/9/2006]

Entity Tags: Royce Lambeth, US Department of Justice, National Security Agency, John Ashcroft, Alberto R. Gonzales, Colleen Kollar-Kotelly, Foreign Intelligence Surveillance Court, George W. Bush, James Baker, Michael Hayden

Timeline Tags: Civil Liberties

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, AT&T, George W. Bush, USA Patriot Act, National Security Agency

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

During a press conference, President Bush is asked if he will order an investigation into the leak that revealed the NSA’s domestic surveillance program (see December 15, 2005). Bush says he has not directly ordered an investigation, presuming the Justice Department is handling the matter, but he calls the leak “a shameful act for someone to disclose this very important program in a time of war.” And he implies that the leak, and the New York Times’s decision to print the resulting article, is treason: “The fact that we’re discussing this program is helping the enemy.… But it is a shameful act by somebody who has got secrets of the United States government and feels like they need to disclose them publicly.” When asked why he “skip[ped] the basic safeguards of asking courts for permission for the intercepts,” he answers: “[R]ight after September the 11th, I knew we were fighting a different kind of war. And so I asked people in my administration to analyze how best for me and our government to do the job people expect us to do, which is to detect and prevent a possible attack. That’s what the American people want. We looked at the possible scenarios. And the people responsible for helping us protect and defend came forth with the current program, because it enables us to move faster and quicker. And that’s important. We’ve got to be fast on our feet, quick to detect and prevent. We use FISA still—you’re referring to the FISA court in your question—of course, we use FISAs. But FISA is for long-term monitoring. What is needed in order to protect the American people is the ability to move quickly to detect. Now, having suggested this idea, I then, obviously, went to the question, is it legal to do so? I am—I swore to uphold the laws. Do I have the legal authority to do this? And the answer is, absolutely.… [T]he legal authority is derived from the Constitution, as well as the authorization of force by the United States Congress” (see September 14-18, 2001). A reporter asks why “has your administration not sought to get changes in the law instead of bypassing it, as some of your critics have said?” Bush responds by reiterating the point that the program is “limited in nature to those that are known al-Qaeda ties and/or affiliates.” He then reiterates another point: he believes he has the authority to bypass the law. He “share[s] the same concerns” about civil liberties that members of Congress have expressed (see December 16, 2005).” However, his reassurances that domestic calls are not being monitored are not absolute. “[I]f you’re calling from Houston to [Los Angeles], that call is not monitored. And if there was ever any need to monitor, there would be a process to do that.” He is asked: “You say you have an obligation to protect us. Then why not monitor those calls between Houston and LA? If the threat is so great, and you use the same logic, why not monitor those calls? Americans thought they weren’t being spied on in calls overseas—why not within the country, if the threat is so great?” Bush replies: “We will, under current law, if we have to. We will monitor those calls. And that’s why there is a FISA law. We will apply for the right to do so. And there’s a difference—let me finish—there is a difference between detecting so we can prevent, and monitoring. And it’s important to know the distinction between the two.” He concludes, “I just want to assure the American people that, one, I’ve got the authority to do this; two, it is a necessary part of my job to protect you; and, three, we’re guarding your civil liberties.” [White House, 12/19/2005]

Entity Tags: US Department of Justice, George W. Bush, New York Times, National Security Agency

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005) and having prepared evidence to prove his knowledge of AT&T’s complicity with the NSA in setting in motion that operation (see December 31, 2005), begins searching for a civil liberties group that might be interested in his work. He quickly determines that two organizations, the Electronic Privacy Information Center (EPIC) and the Electronic Frontier Foundation (EFF), might be his best choices. Reluctant to use the telephone for fear of surveillance, he visits the EPIC offices, where he gives a lawyer a copy of the CD containing his evidence, printouts, and a disk copy of his PGP privacy key for public dissemination. He will later say that the lawyer on site is “polite” but shows little interest. When two weeks go by without any contact from EPIC, he journeys to San Francisco to the EFF offices with his documentation in hand. The reception at EFF is far different from the polite disinterest evidenced at EPIC. Executive director Shari Steele escorts him to speak with senior attorneys Kevin Bankston and Lee Tien. The EFF staffers tell Klein that their organization is already preparing a lawsuit against AT&T for illegally providing its customers’ telephone records to the government (see January 31, 2006), and his evidence will be very useful in the suit. Klein later writes, “I felt a sense of relief, that I had found the right place: a group that wanted to take on this fight.” EFF’s initial lawsuit does not include Klein’s material, but the organization will use it in the court proceedings. [Klein, 2009, pp. 55-56]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), Electronic Privacy Information Center, Kevin Bankston, Shari Steele, Lee Tien, Mark Klein

Timeline Tags: Civil Liberties

Fourteen law professors and former federal officials send a letter criticizing the Justice Department’s recent legal arguments supporting the legality of the secret NSA surveillance program (see December 19, 2005 and December 21-22, 2005). The letter is signed by law professors Curtis A. Bradley, a former State Department legal advisor; David Cole; Walter Dellinger, a former acting solicitor general and assistant attorney general; Ronald Dworkin; Richard Epstein; Harold Koh, a former assistant secretary of state and a former Justice Department official; Philip B. Heymann, a former deputy attorney general; Martin Lederman, a former Justice Department official; Beth Nolan, a former presidential counsel and a former Justice Department official; William S. Sessions, the former director of the FBI; Geoffrey R. Stone; Kathleen M. Sullivan; Laurence H. Tribe; and William Van Alstyne, a former Justice Department attorney. The letter is couched in legal language, but clearly states that the signees consider the NSA surveillance program entirely illegal: “[T]he program appears on its face to violate existing law.” The signees consider and reject the Justice Department’s argument that Congress “implicitly authorized the NSA program when it enacted the Authorization for Use of Military Force (AUMF) against al-Qaeda” in 2001 (see September 14-18, 2001), writing: “[T]he AUMF cannot reasonably be construed to implicitly authorize warrantless electronic surveillance in the United States during wartime, where Congress has expressly and specifically addressed that precise question in FISA and limited any such warrantless surveillance to the first 15 days of war.” The signees also reject the Justice Department’s argument that the president’s “inherent constitutional authority as commander in chief to collect ‘signals intelligence’” is not prohibited by FISA. The signees conclude that the Justice Department has failed “to offer a plausible legal defense of the NSA domestic spying program. If the administration felt that FISA was insufficient, the proper course was to seek legislative amendment, as it did with other aspects of FISA in the Patriot Act, and as Congress expressly contemplated when it enacted the wartime wiretap provision in FISA. One of the crucial features of a constitutional democracy is that it is always open to the president—or anyone else—to seek to change the law. But it is also beyond dispute that, in such a democracy, the president cannot simply violate criminal laws behind closed doors because he deems them obsolete or impracticable.” [Marty Lederman, 1/9/2006; Center for Democracy and Technology, 1/9/2006 pdf file]

Entity Tags: Harold Koh, William S. Sessions, William Van Alstyne, Curtis Bradley, Beth Nolan, Geoffrey Stone, US Department of Justice, Walter Dellinger, Richard Epstein, Martin (“Marty”) Lederman, Laurence Tribe, Kathleen M. Sullivan, Ronald Dworkin, National Security Agency, Philip Heymann, David D. Cole

Timeline Tags: Civil Liberties

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]

Entity Tags: National Security Agency, MCI, WorldCom, Al-Qaeda, AT&T, Verizon Wireless, Sprint/Nextel

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), is concerned that the New York Times will not publish a story featuring his allegations and evidence against AT&T and the National Security Agency (NSA). Klein was “outed” by Los Angeles Times editor Dean Baquet to the US intelligence apparatus after Klein approached a Los Angeles Times reporter about his story, and Klein is concerned that he lacks the protection that publicity would afford him (see February 11, 2006 and After). New York Times reporters James Risen and Eric Lichtblau fail to contact Klein for weeks during this time period, leaving Klein to wonder if the New York Times, like the Los Angeles Times before it, will fail to publish his story. Klein emails Risen and Lichtblau his full set of AT&T documents proving his allegations in mid-February (see December 31, 2005). Meanwhile, he sends emails containing selected documents to a number of Congressional members. Only one, House Representative Pete Stark (D-CA), responds, promising that he will present Klein’s information to the House Judiciary Committee, but, as Klein will write, “I never heard anything from the Judiciary Committee, or any other committee for that matter.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 63]

Entity Tags: James Risen, Dean Baquet, AT&T, Eric Lichtblau, House Judiciary Committee, Los Angeles Times, Mark Klein, New York Times, National Security Agency, Fortney Hillman (“Pete”) Stark, Jr

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, J. Scott Marcus

Timeline Tags: Civil Liberties

Lawmakers in Congress complain that restrictions on their discussion of upcoming appropriations bills make it almost impossible to conduct appropriate oversight on those bills. The House votes 327 to 96 to authorize an appropriations bill to fight the administration’s war on terror, but only about a dozen members have actually read the bill. Rules adopted by the Republican leadership of both houses in concert with the White House (see February 1, 2004) allow lawmakers to read the bills, but prohibit discussing the contents of those bills, even if that information has already been leaked to the press, under penalty of criminal prosecution and expulsion from Congress. “It’s a trap,” says Representative Russ Carnahan (D-MO), referring to the restrictions on discussing the bill. “Either way, you’re flying blind.” Carnahan’s colleague, Walter Jones (R-NC) agrees: “We ought to be doing a better job on oversight, [but] if you’re not going to be able to question it or challenge it, that makes it difficult.” [Savage, 2007, pp. 117]

Entity Tags: Walter Jones, Bush administration (43), Russ Carnahan

Timeline Tags: Civil Liberties

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” [New York Times, 4/7/2006; Klein, 2009, pp. 70] A week later, the Times will publish a more in-depth article (see April 12, 2006).

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, New York Times, National Security Agency

Timeline Tags: Civil Liberties

The New York Times does a more in-depth report on the allegations advanced by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The Times published a far briefer report five days earlier (see April 7, 2006). The article provides a brief synopsis of Klein’s allegations—that AT&T worked with the National Security Agency (NSA) to illegally monitor and record millions of Americans’ telephone and Internet communications and thus illegally invaded its customers’ privacy. It also notes, as did the first article, that Klein had provided some of his documentation “to reporters,” though neither article admits that the Times received the documents months beforehand (see Mid-February - Late March, 2006). The new information in the article is the conclusion of “four independent telecommunications and computer security experts” who examined Klein’s documents “at the request of The New York Times.” According to the four experts, the documents “describe equipment capable of monitoring a large quantity of email messages, Internet phone calls, and other Internet traffic. The equipment… was able to select messages that could be identified by keywords, Internet or email addresses, or country of origin and divert copies to another location for further analysis.” All four experts agreed that the documents proved “AT&T had an agreement with the federal government to systematically gather information flowing on the Internet through the company’s network. The gathering of such information, known as data mining, involves the use of sophisticated computer programs to detect patterns or glean useful intelligence from masses of information.” Brian Reid, the director of engineering at the Internet Systems Consortium, says of the AT&T/NSA project: “This took expert planning and hundreds of millions of dollars to build. This is the correct way to do high volume Internet snooping.” An expert who refuses to be named says the documents are “consistent” with Bush administration claims that the NSA only monitored foreign communications and communications between foreign and US locations, in part because of the location of the monitoring sites. (An expert witness, former AT&T and FCC employee J. Scott Marcus, has given testimony for EFF that flatly contradicts this expert’s assertions—see March 29, 2006). The article notes the Justice Department’s objections to Klein’s documents being filed with the court in the EFF lawsuit, and notes that the department withdrew its objections (see Late March - April 4, 2006). It also notes AT&T’s request for the court to order the EFF to return the documents because they are, the firm claimed, “proprietary” (see April 6-8, 2006). AT&T spokesman Walt Sharp says of Klein and the EFF lawsuit: “AT&T does follow all laws with respect to assistance offered to government agencies. However, we are not in a position to comment on matters of national security.” NSA spokesman Don Weber makes a similar statement: “It would be irresponsible of us to discuss actual or alleged operational issues as it would give those wishing to do harm to the United States the ability to adjust and potentially inflict harm.” [New York Times, 4/12/2006] Klein will write of the story, “Finally it was out there in a major newspaper, though I noticed that the New York Times did not show any images of the actual documents, and never called me back for an in-depth followup story.” [Klein, 2009, pp. 71]

Entity Tags: J. Scott Marcus, Brian Reid, AT&T, Bush administration (43), Electronic Frontier Foundation, National Security Agency, Walter Sharp, Mark Klein, Don Weber, New York Times, US Department of Justice

Timeline Tags: Civil Liberties

President George Bush issues a memo granting the Director of National Intelligence (DNI) the authority to authorize a corporation to conceal any of its activities related to national security under United States Code 15 USC 78m(b)(3)(A). [US Code Title 15,78m; George W. Bush, 5/5/2006] The memo follows recent allegations that telecommunications firms AT&T, BellSouth, and Verizon have all provided records of US citizens’ telephone communications to the National Security Agency as part of the NSA’s warrantless surveillance program (see October 2001 and February 5, 2006). Almost two months later, Representative Jan Schakowsky (D-IL) learns of the memo and demands an explanation from DNI John Negroponte. Schakowsky will write in part: “I am concerned about this new authority because under it, the DNI does not need to seek any permission from the president or Congress to issue such directives and there is minimal oversight once the directive is given. In fact, it is my understanding that since the DNI is only required to report on directives ‘active’ on the annual October 1st reporting date, the DNI could in fact cover up all directives by having them expire on September 30th of the reporting year. I believe that such expansive authority coupled with lax oversight could lead to the misuse of the power, the over-issuing of directives, and the hiding of activities that could be unconstitutional and violations of citizens’ civil liberties. For instance, I believe that such directives could have been issued to the major telecommunications firms concerning the sharing of phone call records with the National Security Agency without citizens’ knowledge or consent.” Schakowsky asks if there was “a particular corporate activity that the DNI or another believed warranted such protection from disclosure and liability,” how many such directives his office has issued since he was granted such authority, whether any such directives were retroactive, how it is determined that “national security” matters are at stake and who makes such determinations, and whether directives telecommunications firms provide citizens’ phone records without their knowledge or consent are being “covered up.” Negroponte’s reply to Schakowsky, if any, is not known. [Jan Schakowsky, 6/27/2006]

Entity Tags: National Security Agency, Verizon Communications, John Negroponte, George W. Bush, BellSouth, Jan Schakowsky, AT&T

Timeline Tags: Civil Liberties

Maurice Hinchey.Maurice Hinchey. [Source: Washington Post]A Justice Department investigation into the National Security Agency’s warrantless wiretapping program ends before it begins, because the NSA will not grant Justice Department lawyers routine security clearances. The investigation had been opened in February 2006 (see February 2, 2006) when Representative Maurice Hinchey (D-NY) asked the Justice Department’s Office of Professional Responsibility (OPR) to investigate the NSA’s warrantless surveillance of US citizens (see After September 11, 2001). Without security clearances, investigators could not examine NSA lawyers’ role in the program. OPR counsel H. Marshall Jarrett writes in a letter to Hinchey: “We have been unable to make any meaningful progress in our investigation because OPR has been denied security clearances for access to information about the NSA program. Without these clearances, we cannot investigate this matter and therefore have closed our investigation.” Jarrett and his office have made routine requests for security clearances since January, to no avail. The OPR’s investigation would have focused strictly on whether Justice Department lawyers violated ethical rules, and would not have examined the entire NSA program. Hinchey says, “This administration thinks they can just violate any law they want, and they’ve created a culture of fear to try to get away with that.” [Associated Press, 5/11/2006] Hinchey writes to Jarrett, regarding the failure to grant clearances: “We are perplexed and cannot make sense of your denial of these security clearances. Our request did not ask OPR to give us the intricate details of the NSA program; we understand that such a request would not even be within OPR’s jurisdiction. There appear to be no reasonable grounds for blocking this investigation. Not only does your denial of their request for a security clearance not make sense, it is unprecedented.” Hinchey will try, and fail, to get a bill through the Republican-controlled House Judiciary Committee to force the White House, Justice Department, and Defense Department to turn over to Congress all documents related to the closure of the OPR probe. He will write in a letter to President Bush, “If the NSA program is justified and legal, as you yourself have indicated, then there is no reason to prevent this investigation from continuing.” [US House of Representatives, 7/18/2006] In June 2006, it will be revealed that Bush personally made the decision not to grant the OPR investigators security clearances (see Late April 2006).

Entity Tags: Office of Professional Responsibility, Maurice Hinchey, US Department of Justice, George W. Bush, H. Marshall Jarrett, National Security Agency

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Two public interest lawyers sue Verizon Communications for $5 billion, claiming the telecommunications firm violated privacy laws by giving the phone records of its customers to the NSA for that agency’s secret, warrantless domestic surveillance program. Lawyers Bruce Afran and Carl Mayer are asking that Verizon stop turning over its records to the NSA without either a court order or the consent of the customer. Afran says of the NSA program, “This is the largest and most vast intrusion of civil liberties we’ve ever seen in the United States.” [CBS News, 5/12/2006] Days later, AT&T and BellSouth are added to the lawsuit. [CNN, 5/17/2006]
Verizon Helped Build an NSA Database? - The day before, the press reports that the NSA has built a database of millions of domestic phone records since shortly after the 9/11 attacks, using records from Verizon, BellSouth, and AT&T (see May 11, 2006). Former Qwest CEO Joe Nacchio, whose firm refused to cooperate with the NSA, says that he was approached months before the attacks to help set up such a program (see February 27, 2001). The NSA has the power, under President Bush’s interpretation of his wartime authority, to have the agency eavesdrop on international calls made to or from the US, but cannot legally eavesdrop on internal calls unless it has a court order. The lawsuit claims that the telecoms violated the Constitution and the Telecommunications Act by giving its records to the government without court authorization. The lawsuit seeks $1,000 for each violation of the Telecommunications Act, or $5 billion if the case is certified as a class-action suit. The lawyers are seeking documents detailing the origins of the NSA program, as well as Bush’s own role in authorizing the program. “Federal law prohibits the phone companies from giving records to the government without a warrant,” says Afran. “There was no warrant, nor was there any attempt to get warrants, which is in violation of the constitution and the Telecommunications Act.” [CBS News, 5/12/2006; CNET News, 5/15/2006] Afran says, “One of the purposes of this case is to, quite frankly, hold the threat of financial destruction over the heads of the phone companies to make them abandon this policy of cooperating with warrantless searches by the government.” [National Public Radio, 5/17/2006] The lawsuit alleges that Verizon constructed a dedicated fiber optic line from New Jersey to a large military base in Quantico, Virginia, that allowed government officials to gain access to all communications flowing through the carrier’s operations center. A former consultant who worked on internal security will later say he had tried numerous times to install safeguards on the line to prevent hacking on the system, as he was doing for other lines at the operations center, but he was prevented from doing so by a senior security official. One of the allegations against Verizon in the lawsuit is made by Philadelphia resident Norman LeBoon, who says after he read of the alleged surveillance of US citizens, he began asking Verizon if his landline communications were being shared. LeBoon says he eventually spoke with “Ellen” in Verizon customer service, who told him, “I can tell you, Mr. LeBoon, that your records have been shared with the government, but that’s between you and me.… They [Verizon] are going to deny it because of national security. The government is denying it and we have to deny it, too. Around here we are saying that Verizon has ‘plausible deniability.’” [Truthdig, 8/9/2007]
AT&T Grants Unlimited Access? - The lawsuit claims that in February 2001, days before Qwest was approached, NSA officials met with AT&T officials to discuss replicating an AT&t network center to give the agency access to all the global phone and e-mail traffic that ran through it (see February 2001).
Earlier Reporting Made Key Error - Earlier reporting of the NSA’s cooperation with the telecoms got a key detail wrong, says telecom analyst Scott Cleland: “What I think people got wrong with the original reporting, was that this was local phone companies tracking local phone calls. What is clear now is they were tracking long distance calls.” [National Public Radio, 5/17/2006]

Entity Tags: Norman LeBoon, Qwest, National Security Agency, George W. Bush, Joe Nacchio, Michael Hayden, Bruce Afran, Carl Mayer, Verizon Communications

Timeline Tags: Civil Liberties

The Justice Department files a brief with the US District Court of Northern California asking that the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T (see January 31, 2006) be dismissed on the grounds that it would breach “state secrets” vital to “national security.” The Justice Department publicly announced its intentions of asking that the lawsuit be dismissed on those grounds two weeks ago (see April 28, 2006). EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The lawsuit is Hepting, et al v. AT&T, often shortened in the media to Hepting v. AT&T. The government submits a number of secret documents to Judge Vaughn Walker as evidence, along with a heavily redacted document submitted for public perusal. Other documents include affidavits from the Director of National Intelligence, John Negroponte, and the head of the NSA, Lieutenant General Keith Alexander. Some observers believe that Walker, a conservative appointed to the bench by President George H.W. Bush, will quickly comply with the government’s request. However, as AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), will later write, Vaughn is independent-minded and possessed of a “strong libertarian bent,” and will not be so prone to do the government’s bidding as some believe. [Klein, 2009, pp. 72-73] Walker’s first hearing on the brief will be held four days later (see May 17, 2006).

Entity Tags: John Negroponte, AT&T, Electronic Frontier Foundation, Keith Alexander, Mark Klein, US Department of Justice, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

Wired News, the online technical news site, publishes a copy of AT&T whistleblower Mark Klein’s unclassified memo written in 2004 (see January 16, 2004). Klein has joined the Electronic Frontier Foundation (EFF) in its lawsuit against AT&T. Klein has evidence that AT&T colluded with the National Security Agency (NSA) to illegally wiretap Americans’ domestic telephone and Internet communications. [Wired News, 5/17/2006]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, Mark Klein, Wired News

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales says that the government has the right to prosecute journalists for publishing classified information. “There are some statutes on the book which, if you read the language carefully, would seem to indicate that that is a possibility,” he says during an ABC News interview. “That’s a policy judgment by the Congress in passing that kind of legislation. We have an obligation to enforce those laws. We have an obligation to ensure that our national security is protected.” Asked if he is considering prosecuting the New York Times for revealing the Bush administration’s warrantless wiretapping program (see December 15, 2005), Gonzales says the Justice Department is trying to determine “the appropriate course of action in that particular case.” He continues: “I’m not going to talk about it specifically. We have an obligation to enforce the law and to prosecute those who engage in criminal activity.” Experts believe that Gonzales is probably referring to the 1917 Espionage Act, which prohibits government officials from passing classified information to anyone without proper clearance; those same experts say that the Espionage Act was never intended to apply to the press. Furthermore, journalists are protected from such prosecution by the First Amendment. Gonzales says that while the Bush administration respects the right of freedom of the press, “it can’t be the case that that right trumps over the right that Americans would like to see, the ability of the federal government to go after criminal activity.” [New York Times, 5/22/2006] Thirty years ago, then-White House chief of staff Dick Cheney recommended such prosecution against a journalist who revealed the existence of a Cold War-era submarine program (see May 25, 1975). In 2007, reporter and author Charlie Savage will write that in 1975, the attorney general had scuttled the idea. Now, the attorney general is embracing the idea. [Savage, 2007, pp. 175-176]

Entity Tags: US Department of Justice, Alberto R. Gonzales, Bush administration (43), New York Times, Charlie Savage, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Wired News logo.Wired News logo. [Source: Delve Networks]Evan Hansen, the editor in chief of Wired News, an online technical news site, explains why the site published a set of documents from AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009). Klein is working with the Electronic Frontier Foundation (EFF) in that organization’s lawsuit against AT&T for invading its customers’ privacy by taking part in the National Security Agency’s warrantless domestic wiretap operation (see January 31, 2006). The presiding judge, Vaughn Walker, has denied requests from the EFF and a number of news organizations to unseal the documents and make them public. For its part, AT&T wants the documents to remain sealed, claiming they are proprietary and that it would suffer harm if they were disclosed (see April 6-8, 2006). Hansen and the Wired News senior staff disagree. “In addition,” Hansen writes, “we believe the public’s right to know the full facts in this case outweighs AT&T’s claims to secrecy.” Hansen erroneously says that the documents seem “to be excerpted from material that was later filed in the lawsuit under seal,” though “we can’t be entirely sure, because the protective order prevents us from comparing the two sets of documents.” Klein later writes that the Wired News staff “confused my 2004 memo (see January 16, 2004) with my court-sealed legal declaration” (see February 23-28, 2006); even so, Klein will write, “it was true that all of the AT&T documents were still under court seal.” Hansen says Wired News reporter Ryan Singel received the Klein documents from “an anonymous source close to the litigation.” Hansen also writes: “We are filing a motion to intervene in the case in order to request that the court unseal the evidence, joining other news and civil rights organizations that have already done so, including the EFF, the San Francisco Chronicle, the Los Angeles Times, the San Jose Mercury News, the Associated Press, and Bloomberg. Before publishing these documents we showed them to independent security experts, who agreed they pose no significant danger to AT&T. For example, they do not reveal information that hackers might use to easily attack the company’s systems.” Hansen writes that Wired’s publication of the documents does not violate Walker’s gag order concerning the documents’ publication, as the order specifically bars the EFF and its representatives—and no one else—from publishing or discussing them. “The court explicitly rejected AT&T’s motion to include Klein in the gag order and declined AT&T’s request to force the EFF to return the documents,” he notes (see May 17, 2006). [Wired News, 5/22/2006; Klein, 2009, pp. 75]

Entity Tags: Vaughn Walker, AT&T, Electronic Frontier Foundation, Evan Hansen, Mark Klein, Ryan Singel, Wired News, National Security Agency

Timeline Tags: Civil Liberties

AT&T lawyers accidentally release sensitive information in their defense of a lawsuit accusing AT&T and two other telecommunications firms of illegally cooperating with an NSA wiretapping program (see January 31, 2006). They release a 25-page legal brief, heavily redacted with thick black lines intended to obscure portions of three pages, in PDF (Portable Data File) format. But some software programs can read the text. The redacted information offers alternative reasons why AT&T has a secret room in its downtown San Francisco switching center designed to monitor Internet and telephone traffic (see February 2001). The Electronic Frontier Foundation, who filed the lawsuit, says the room is used by the NSA surveillance program. The redacted sections argue that the room could be used for “legitimate Internet monitoring systems, such as those used to detect viruses and stop hackers.” Another argument reads, “Although the plaintiffs ominously refer to the equipment as the ‘Surveillance Configuration,’ the same physical equipment could be utilized exclusively for other surveillance in full compliance with” the Foreign Intelligence Surveillance Act (FISA). The court filing is not classified, and no information relating to the actual operations of the NSA’s surveillance program is disclosed. [US District Court, Northern District of California, San Francisco Division, 5/24/2006 pdf file; US District Court, Northern District of California, San Francisco Division, 5/24/2006; CNET News, 5/26/2006]

Entity Tags: National Security Agency, Electronic Frontier Foundation, AT&T

Timeline Tags: Civil Liberties

Vinton Cerf.Vinton Cerf. [Source: Ipswitch.com]The Information Technology Association of America, an information technology (IT) trade association, presents a paper authored by Internet founder Vinton Cerf and others which notes that the new capabilities of electronic surveillance of Internet, cellular communications, and voice-over internet protocols (VoIP) by US government and law enforcement officials under CALEA (see January 1, 1995) is inherently dangerous for fundamental civil liberties as well as technological innovation. (CALEA mandates that US telecommunications providers such as AT&T give US law enforcement agencies and intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks.) Cerf and his colleagues write, “In order to extend authorized interception much beyond the easy scenario, it is necessary either to eliminate the flexibility that Internet communications allow, or else introduce serious security risks to domestic VoIP implementations. The former would have significant negative effects on US ability to innovate, while the latter is simply dangerous. The current FBI and FCC direction on CALEA applied to VoIP carries great risks.” In order to implement the mandates of CALEA, the authors write, the nation’s electronic communications systems will become inherently less secure from hackers and others seeking to eavesdrop or disrupt communications, innocent citizens will not be secure from possibly illegal surveillance by law enforcement or intelligence agencies, and the nation’s communications systems will face near-insurmountable technological hurdles that will make it difficult for US telecommunications and Internet providers to continue to innovate and improve services. They conclude, “The real cost of a poorly conceived ‘packet CALEA’ requirement would be the destruction of American leadership in the world of telecommunications and the services built on them. This would cause enormous and very serious national-security implications. Blindly applying CALEA to VoIP and realtime Internet communications is simply not worth this risk.” [Information Technology Association of America, 7/13/2006 pdf file]

Entity Tags: Information Technology Association of America, Federal Bureau of Investigation, Communications Assistance for Law Enforcement Act (CALEA), Vinton Cerf, Federal Communications Commission

Timeline Tags: Civil Liberties

In a follow-up hearing, Judge Vaughn Walker of the US District Court of Northern California hears arguments by AT&T and the Justice Department as to whether he should dismiss a lawsuit against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006). The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government asserts that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006). In today’s hearing, Justice Department lawyer Peter Keisler admits to Walker that the documents presented on behalf of the EFF by AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) and others are not classified. “None of the documents they (EFF) have submitted… implicate any privileged [classified] matters,” Keisler tells Walker. The judge says, “Including the Klein documents.” Keisler agrees, saying: “We have not asserted any privilege over the information that is in the Klein and Marcus (see March 29, 2006) documents.… Mr. Klein and Marcus never had access to any of the relevant classified information here, and with all respect to them, through no fault or failure of their own, they don’t know anything.” Klein will later write that Keisler’s admission is a crippling blow to the government’s assertion that the EFF documentation would compromise national security if made public or submitted in open court. [Klein, 2009, pp. 77]

Entity Tags: US Department of Justice, AT&T, Electronic Frontier Foundation, Mark Klein, Vaughn Walker, National Security Agency, Peter Keisler

Timeline Tags: Civil Liberties

Lawyers file court documents alleging that the National Security Agency (NSA) worked with AT&T to set up a domestic wiretapping site seven months before the 9/11 attacks. The papers are filed as part of a lawsuit, McMurray v. Verizon Communications, which cites as plaintiffs AT&T, Verizon, and BellSouth customers whose privacy was allegedly violated by the NSA warrantless wiretapping program (see May 12, 2006); it also alleges that the firms, along with the NSA and President Bush, violated the Telecommunications Act of 1934 and the US Constitution. AT&T, Verizon, and BellSouth have been accused of working with the NSA to set up domestic call monitoring sites (see October 2001). Evidence that the NSA set up domestic surveillance operations at least seven months before the 9/11 attacks is at the core of the lawsuit (see Spring 2001). The suit is similar to one filed against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006) and other such lawsuits. A lawyer for the plaintiffs in McMurray, Carl Mayer, says: “The Bush administration asserted this [the warrantless wiretapping program] became necessary after 9/11. This undermines that assertion.” AT&T spokesman Dave Pacholczyk responds, “The US Department of Justice has stated that AT&T may neither confirm nor deny AT&T’s participation in the alleged NSA program because doing so would cause ‘exceptionally grave harm to national security’ and would violate both civil and criminal statutes.” Verizon has denied being asked by the NSA for its customer phone records, and has refused to confirm or deny “whether it has any relationship to the classified NSA program.” BellSouth spokesman Jeff Battcher says: “We never turned over any records to the NSA. We’ve been clear all along that they’ve never contacted us. Nobody in our company has ever had any contact with the NSA.” The NSA domestic wiretapping program is known as “Pioneer Groundbreaker,” a part of the larger “Project Groundbreaker” (see February 2001). According to Mayer and his fellow lawyer Bruce Afran, an unnamed former employee of AT&T provided them with information about NSA’s approach to AT&T. (That former employee will later be revealed as retired technician Mark Klein—see Late 2002, July 7, 2009, December 15-31, 2005, and April 6, 2006). The lawsuit is on a temporary hiatus while a judicial panel rules on a government request to assign all of the telecommunications lawsuits to a single judge. [Bloomberg, 6/30/2006]

Entity Tags: Verizon Wireless, US Department of Justice, National Security Agency, George W. Bush, Jeff Battcher, Bruce Afran, BellSouth, AT&T, Mark Klein, Carl Mayer, Electronic Frontier Foundation, Dave Pacholczyk

Timeline Tags: Civil Liberties

Salim Ahmed Hamdan in 1999.Salim Ahmed Hamdan in 1999. [Source: Pubic domain via the New York Times]In the Hamdan v. Rumsfeld case, the Supreme Court rules 5-3 to strike down the Bush administration’s plans to try Guantanamo detainees before military commissions. Ruling in favor of detainee Salim Ahmed Hamdan (see November 8, 2004), the Court rules that the commissions are unauthorized by federal statutes and violate international law. Writing for the majority, Justice John Paul Stevens says, “The executive is bound to comply with the rule of law that prevails in this jurisdiction.” The opinion throws out each of the administration’s arguments in favor of the commissions, including its assertion that Congress had stripped the Supreme Court of the jurisdiction to decide the case. One of the major flaws in the commissions, the Court rules, is that President Bush unilaterally established them without the authorization of Congress. [New York Times, 6/30/2006] During the oral arguments three months before, Hamdan’s lawyer, Neal Katyal, told the Court: “The whole point of this [proceeding] is to say we’re challenging the lawfulness of the tribunal [the military commissions] itself. This isn’t a challenge to some decision that a court makes. This is a challenge to the court itself, and that’s why it’s different than the ordinary criminal context that you’re positing.” [Savage, 2007, pp. 274-275]
Major Defeat for Bush Administration - Civil libertarian and human rights organizations consider the ruling a shattering defeat for the administration, particularly in its assertions of expansive, unfettered presidential authority. Bush says in light of the decision, he will work with Congress to “find a way forward” to implement the commissions. “The ruling destroys one of the key pillars of the Guantanamo system,” says Gerald Staberock, a director of the International Commission of Jurists. “Guantanamo was built on the idea that prisoners there have limited rights. There is no longer that legal black hole.” The ruling also says that prisoners held as “enemy combatants” must be afforded rights under the Geneva Conventions, specifically those requiring humane treatment for detainees and the right to free and open trials in the US legal system. While some form of military trials may be permissible, the ruling states that defendants must be given basic rights such as the ability to attend the trial and the right to see and challenge evidence submitted by the prosecution. Stevens writes that the historical origin of military commissions was in their use as a “tribunal of necessity” under wartime conditions. “Exigency lent the commission its legitimacy, but did not further justify the wholesale jettisoning of procedural protections.” [New York Times, 6/30/2006] In 2007, author and reporter Charlie Savage will write, “Five justices on the Supreme Court said Bush had broken the law.” [Savage, 2007, pp. 275]
Hardline Conservative Justices Dissent - Stevens is joined by Justices David Souter, Stephen Breyer, and Ruth Bader Ginsburg. Justice Anthony Kennedy issues a concurring opinion. Dissenting are Justices Samuel Alito, Antonin Scalia, and Clarence Thomas. Thomas, in a dissent signed by Scalia and Alito, calls the decision “untenable” and “dangerous.” Chief Justice John Roberts recused himself from the case because of his participation in a federal appeals court that ruled in favor of the administration (see November 8, 2004).
Not Charged for Three Years - Hamdan is a Guantanamo detainee from Yemen, captured in Afghanistan in November 2001 and taken to Guantanamo in June 2002. He is accused of being a member of al-Qaeda, in his function as driver and bodyguard for Osama bin Laden. He was not charged with a crime—conspiracy—until mid-2004. [New York Times, 6/30/2006]

Entity Tags: Samuel Alito, US Supreme Court, Salim Ahmed Hamdan, Stephen Breyer, Ruth Bader Ginsburg, John G. Roberts, Jr, Al-Qaeda, Antonin Scalia, Bush administration (43), Center for Constitutional Rights, Anthony Kennedy, John Paul Stevens, David Souter, International Commission of Jurists, Gerald Staberock, Geneva Conventions, Clarence Thomas

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]

Entity Tags: Geneva Conventions, Barack Obama, Bush administration (43), Foreign Intelligence Surveillance Act, Glenn Greenwald, US Department of Justice, US Supreme Court, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Judge Vaughn Walker of the US District Court of Northern California rejects a request by the Justice Department to dismiss a lawsuit by the Electronic Frontier Foundation (EFF—see January 31, 2006) against AT&T. The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government has asserted that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006 and June 23, 2006). According to AT&T whistleblower Mark Klein, working with the EFF in the lawsuit, Walker “ridicule[s]” the government’s request for dismissal on state secrets grounds, finding that “[t]he government has opened the door for judicial inquiry by publicly confirming and denying material information about its monitoring of communications content.… AT&T and the government have for all practical purposes already disclosed that AT&T assists the government in monitoring communication content. [T]he government has publicly admitted the existence of a ‘terrorist surveillance program’ (see After September 11, 2001, After September 11, 2001, October 2001, and September 2002).… Considering the ubiquity of AT&T telecommunications services, it is unclear whether this program could even exist without AT&T’s acquiescence and cooperation.” EFF had given Walker the ammunition for his finding by providing him with a raft of media stories about AT&T’s involvement in the NSA surveillance program, as well as media coverage of Klein’s assertions (see April 12, 2006 and May 17, 2006). “The very subject matter of this action is hardly a secret” any longer, Walker finds (see May 24, 2006). “[D]ismissing this case at the outset would sacrifice liberty for no apparent enhancement of security.” Walker also rejects a separate motion to dismiss by AT&T, which had argued that its relationship with the government made it immune from prosecution. Marc Rotenberg of the Electronic Privacy Information Center (EPIC) says: “This cases arises against the backdrop of the accountability of the government as it pursues its surveillance program. This is a significant victory for the principle of government accountability.” AT&T spokesman Walt Sharp refuses to give a direct comment about the ruling, but says that AT&T has always protected its customers’ privacy (see February 2001 and Beyond, February 2001, and Late 2002-Early 2003). The government will obtain a stay of Walker’s ruling while it files an appeal, preventing the EFF documents from being publicly disseminated. [New York Times, 7/21/2006; Klein, 2009, pp. 78-79]

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, Marc Rotenberg, US Department of Justice, Walter Sharp, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

Federal district court judge Anna Diggs Taylor rules that the NSA’s warrantless wiretapping program (see Early 2002) is unconstitutional and orders it ended. She amends her ruling to allow the program to continue while the Justice Department appeals her decision. The decision is a result of a lawsuit filed by the American Civil Liberties Union (ACLU) and other civil liberties groups. Taylor rules that the NSA program violates US citizens’ rights to privacy and free speech, the Constitutional separation of powers among the three branches of government, and the Foreign Intelligence Surveillance Act (see 1978). Taylor writes: “It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. There are no hereditary Kings in America and no powers not created by the Constitution. So all ‘inherent powers’ must derive from that Constitution.” [Verdict in ACLU et al v. NSA et al, 8/17/2006 pdf file; Washington Post, 8/18/2006] The program “violates the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth amendments to the United States Constitution, the FISA and Title III,” Taylor writes, and adds, “[T]he president of the United States… has undisputedly violated the Fourth in failing to procure judicial orders.” [CNN, 8/17/2006]
Judge Lets One Portion Stand - Taylor rejects one part of the lawsuit that seeks information about the NSA’s data mining program (see October 2001), accepting the government’s argument that to allow that portion of the case to proceed would reveal state secrets (see March 9, 1953). Other lawsuits challenging the program are still pending. Some legal scholars regard Taylor’s decision as poorly reasoned: national security law specialist Bobby Chesney says: “Regardless of what your position is on the merits of the issue, there’s no question that it’s a poorly reasoned decision. The opinion kind of reads like an outline of possible grounds to strike down the program, without analysis to fill it in.” The White House and its Republican supporters quickly attack Taylor, who was appointed to the bench by then-President Jimmy Carter, as a “liberal judge” who is trying to advance the agenda of Congressional Democrats and “weaken national security.” For instance, Senator Mike DeWine (R-OH) says that halting the program “would hamper our ability to foil terrorist plots.” [Washington Post, 8/18/2006]
Democrats, Civil Libertarians Celebrate Ruling - But Democrats defend the ruling. For instance, Senator John Kerry (D-MA) says the ruling provides a much-needed check on the unfettered power of the Bush White House. “[N]o one is above the law,” says Kerry. [Washington Post, 8/18/2006] Lawyers for some of the other cases against the NSA and the Bush administration laud the decision as giving them vital legal backing for their own court proceedings. “We now have a ruling on the books that upholds what we’ve been saying all along: that this wiretapping program violates the Constitution,” says Kevin Bankston, who represents the Electronic Frontier Foundation (EFF) in its class-action case against AT&T for its role in the NSA’s surveillance program (see January 31, 2006). [Washington Post, 8/18/2006] Legal expert and liberal commentator Glenn Greenwald writes that Taylor’s ruling “does not, of course, prohibit eavesdropping on terrorists; it merely prohibits illegal eavesdropping in violation of FISA. Thus, even under the court’s order, the Bush administration is free to continue to do all the eavesdropping on terrorists it wants to do. It just has to cease doing so using its own secretive parameters, and instead do so with the oversight of the FISA court—just as all administrations have done since 1978, just as the law requires, and just as it did very recently when using surveillance with regard to the [British] terror plot. Eavesdropping on terrorists can continue in full force. But it must comply with the law.” Greenwald writes: “[T]he political significance of this decision cannot be denied. The first federal court ever to rule on the administration’s NSA program has ruled that it violates the constitutional rights of Americans in several respects, and that it violates criminal law. And in so holding, the court eloquently and powerfully rejected the Bush administration’s claims of unchecked executive power in the area of national security.” [Salon, 8/17/2006]
White House Refuses to Comply - The Bush administration refuses to comply with Taylor’s ruling, asserting that the program is indeed legal and a “vital tool” in the “war on terrorism.” It will quickly file an appeal, and law professors on both sides of the issue predict that Taylor’s ruling will be overturned. [Savage, 2007, pp. 206]
Lawsuit Ends with White House 'Compromise' - The lawsuit will end when the White House announces a “compromise” between the wiretapping program and FISC (see January 17, 2007).

Entity Tags: John Kerry, Kevin Bankston, Mike DeWine, US Department of Justice, Peter Hoekstra, Glenn Greenwald, National Security Agency, George W. Bush, James Earl “Jimmy” Carter, Jr., Foreign Intelligence Surveillance Act, Alberto R. Gonzales, American Civil Liberties Union, AT&T, Anna Diggs Taylor, Bush administration (43), Bobby Chesney, Foreign Intelligence Surveillance Court, Electronic Frontier Foundation

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), gives an interview for CBS’s flagship news program 60 Minutes. The interview is conducted by Steve Kroft. Klein later describes the interview as “good [and] solid,” and says it should make for a “blockbuster news story.” Klein has agreed to give CBS an “exclusive,” so he gives no interviews for the next four months while CBS fails to run the story. “I was silent during the entire 2006 election period,” Klein will write. Klein’s lead attorney, civil rights lawyer Jim Brosnahan, is astonished at CBS’s failure to run the segment, telling Klein the network has “no good reason” for not broadcasting it. CBS will never air the segment featuring Klein. Klein will later write, “It seems obvious to me that someone higher up at CBS had killed the story for political reasons, but could not tell us that, so they put us off without explanation.” Klein will later grant interviews to ABC and PBS; those interviews will be aired. [Klein, 2009, pp. 62-63]

Entity Tags: Public Broadcasting System, ABC News, AT&T, CBS News, Steve Kroft, James Brosnahan, Mark Klein

Timeline Tags: Civil Liberties

The Director of National Intelligence, John Negroponte, and NSA Director Keith Alexander try to get a lawsuit dismissed that alleges the NSA illegally wiretapped a Saudi charitable organization (see February 28, 2006). The organization, the Al Haramain Islamic Foundation, is presenting a classified US document as proof of the illegal wiretapping.
Invoking 'State Secrets' Privilege - In late 2006, Negroponte and Alexander tell the presiding judge, US District Judge Garr King, that in order to defend itself, the government would have to disclose “state secrets” (see March 9, 1953) that would expose US anti-terrorism efforts. This same argument will be reiterated in July 2007, when government lawyers say, “Whether plaintiffs were subjected to surveillance is a state secret, and information tending to confirm or deny that fact is privileged.” The judge will hear arguments for and against dismissing the case on August 15, 2007. [Associated Press, 8/5/2007]
Judicial Examination - King, in Portland, Oregon, examined the document for himself, and read classified briefs supplied by the Justice Department. Upon reading the briefs, King met with government lawyers to discuss turning over yet more documents in discovery—a decision unlikely to have been taken had King not believed the evidence did not show that the Al Haramain plaintiffs were, in fact, monitored. And, under FISA, had the surveillance been lawful and court-ordered, King would have been legally constrained to dismiss the lawsuit, since according to that law, plaintiffs can only sue if no warrant was ever issued for the alleged surveillance. “If there was a FISA warrant, the whole case would have crumbled on the first day,” says plaintiff attorney Thomas Nelson, “It’s pretty obvious from the government’s conduct in the case, there was no warrant.”
'Inherent Authority' of President - Justice Department lawyers rely on the argument that the president has the inherent authority to order surveillance of suspected terrorists with or without warrants, and that to judge the president’s decision would reveal national secrets that would alert terrorists to government anti-terrorist actions, thereby mandating that this and other lawsuits be dismissed.
Consolidation of Lawsuits - An August 2006 court ruling ordering that the Al Haramain case be consolidated with 54 other NSA-related lawsuits, under US District Court Judge Vaughn Walker, damaged the government’s argument that it cannot be sued in court. Walker has presided over the year-old class-action lawsuit brought before his court by the Electronic Frontier Foundation against AT&T for the telecom firm’s cooperation with the NSA program (see January 31, 2006); Walker ruled in July 2006 that the case would proceed, against government requests that it be thrown out because of national security requirements. Walker ruled that because the government had already admitted to the existence of the program, the state secrets privilege does not apply. (The Justice Department is appealing Walker’s decision.) As for Al Haramain, its lawyers want that case to be adjudicated separately, because the court has sufficient evidence to decide on the case without waiting for the appellate court decision. Another lawyer for the plaintiffs, Jon Eisenberg, tells Walker in February 2007, “You need only read the statutes to decide, ‘Does the president have the right to do this without a warrant?’” Walker has yet to rule on that request. [Wired News, 3/5/2007]

Entity Tags: Thomas Nelson, Vaughn Walker, National Security Agency, US Department of Justice, Jon Eisenberg, John Negroponte, AT&T, Al Haramain Islamic Foundation (Oregon branch), Garr King, Keith Alexander, Electronic Frontier Foundation

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales sends a letter to the Senate Judiciary Committee informing it that the lawsuit against the administration’s warrantless wiretapping program (see August 17, 2006) is moot—the National Security Agency will now operate under the aegis of the Foreign Intelligence Surveillance Court (FISC) in its wiretaps. One of the FISC judges, Gonzales writes, has issued an “innovative” and “complex” order that allows the NSA to continue doing what it had been doing with the overall approval of the court, or at least the approval of the single FISC judge. Gonzales does not go into detail about the judge’s ruling, but the administration intensifies its attack on the lawsuit, asking an appeals court to set the previous ruling aside in light of the new FISC protocol, and even to erase the ruling from judicial history as a matter of “public interest.” The appeals court votes 2-1 to set aside the previous ruling; the majority opinion finds that the state secrets privilege prevents the courts from learning whether the plaintiffs in the case had the standing to sue. [Savage, 2007, pp. 207]

Entity Tags: Alberto R. Gonzales, Senate Judiciary Committee, National Security Agency, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

Former Los Angeles Times editor Dean Baquet says his newspaper did not bow to government pressure in choosing not to run a story about allegations by AT&T whistleblower Mark Klein (see July 7, 2009, December 15-31, 2005, and February 11, 2006 and After). In an ABC News report on Klein’s allegations of AT&T’s complicity with the National Security Agency (NSA) to illegally conduct warrantless electronic surveillance against American citizens, Klein says that the Times bowed to government pressure from the then-Director of National Intelligence John Negroponte and the then-Director of the NSA Michael Hayden. Baquet, now the Washington bureau chief of the New York Times, says that while he spoke to both Negroponte and Hayden about the story, “government pressure played no role in my decision not to run the story.” Instead, Baquet says he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” based on Klein’s highly technical documents. Baquet says Times reporter Joseph Menn disagreed with his decision, “and was very disappointed.” Klein’s story was published in the New York Times in April 2006 (see April 7, 2006 and April 12, 2006). [ABC News, 3/26/2007] Klein will later write that Baquet’s explanation is an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [Klein, 2009, pp. 62]

Entity Tags: Joseph Menn, Dean Baquet, AT&T, Douglas Frantz, John Negroponte, Mark Klein, National Security Agency, Michael Hayden, Los Angeles Times

Timeline Tags: Civil Liberties

Microsoft logo.Microsoft logo. [Source: Your Logo Collection (.com)]The National Security Agency (NSA) reveals plans to build an enormous new data center in San Antonio, Texas, three months after Microsoft announced plans to build a $550 million data center in the same area. [National Security Agency, 4/19/2007] The NSA previously acknowledged building a similar data storage facility in Colorado (see January 30, 2006). Reporter and author James Bamford will later write in his book The Shadow Factory that “[t]he timing of the move was interesting,” because the NSA had leased a building in San Antonio in 2005, but had not done anything further. The NSA only announces plans to move forward with the data center after Microsoft revealed plans to build a 470,000 square foot cloud data center that would handle Internet search data, emails, and instant messages. Bamford will quote Bexar County judge Nelson Wolff’s statement to the San Antonio Express-News, “We told [the NSA] we were going to get Microsoft, and that really opened up their eyes,” and write, “For an agency heavily involved in data harvesting, there were many advantages to having their miners next door to the mother lode of data centers” (see 1997, February 27, 2000, February 2001), Spring 2001, April 4, 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, and December 15, 2005). Microsoft’s operation will be largely automated and employ only 75 people. In contrast, the NSA’s facility is to be the same size, but employ 1,500. Bamford will write that this is “far more than was needed to babysit a warehouse of routers and servers but enough to analyze the data passing across them.” [Data Center Knowledge, 1/19/2007; San Antonio Express-News, 4/18/2007; Bamford, 2008, pp. 317-318] Former senior AT&T technician and warrantless surveillance whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) will reference Bamford’s book and agree that this “suggests a massive data mining operation.” [Klein, 2009, pp. 41]

Entity Tags: James Bamford, Microsoft Corporation, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The Electronic Frontier Foundation (EFF) publishes a set of three non-classified documents secured from telecommunications giant AT&T by former AT&T technician and current whistleblower Mark Klein. Klein has used the documents to prove his assertions that AT&T colluded with the National Security Agency to illegally eavesdrop on Americans’ telephone and Internet communications (see December 15-31, 2005 and July 7, 2009). The EFF has sued AT&T for violating its customers’ privacy, and Klein and the documents are key elements of its case (see February 23-28, 2006). After years of opposing their public disclosure and attempting to force their return (see April 6-8, 2006), AT&T acquiesced to the documents’ disclosure earlier this week after the EFF threatened to take the corporation to a federal appeals court. The documents were released in part by Wired News over a year ago against AT&T’s wishes (see May 17, 2006), and PBS also made them public as a part of a Frontline documentary. The Justice Department considered classifying the documents, then rejected the idea (see Late March - April 4, 2006). According to EFF’s Cindy Cohn, AT&T agreed to the disclosure of those portions to escape the embarrassment of arguing that documents available on the Internet for more than a year were secret. Wired’s Ryan Singel writes: “There are no surprises in the AT&T documentation… which consist of a subset of the pages already published by Wired News. They include AT&T wiring diagrams, equipment lists, and task orders that appear to show the company tapping into fiber-optic cables at the point where its backbone network connects to other ISPs at a San Francisco switching office. The documents appear to show the company siphoning off the traffic to a room packed with Internet-monitoring gear.” The EFF also releases a formerly sealed, signed declaration by Klein (see February 23-28, 2006) and a written analysis of the documentation by Internet expert J. Scott Marcus (see March 29, 2006). Marcus’s analysis, which had previously remained largely under court-ordered seal, is “the most interesting” of the releases, Singel writes. Marcus said the AT&T technical configuration allowed the NSA to conduct “surveillance and analysis of Internet content on a massive scale, including both overseas and purely domestic traffic,” and found it probable that AT&T had “15 or 20” secret facilities around the country, not just the few facilities of which Klein was aware. AT&T, with the Justice Department, is trying to prevent EFF’s lawsuit from continuing, insisting that such a trial would expose “state secrets” (see April 28, 2006 and May 13, 2006). Judge Vaughn Walker has already considered and dismissed that claim (see July 20, 2006); AT&T and the government hope an appeals court will find in their favor. Cohn tells Singel she hopes the documents will show the public that their case is based in fact and not speculation, and that the government’s claim of a national security risk is overblown: “It really paints them into a corner, how unreasonable their claims of state secrets are. I’m hoping [the document release] demonstrates we are right and know what we are talking about and that we don’t need much more to win our case. We are much closer than people think.” [Wired News, 6/13/2007]

Entity Tags: J. Scott Marcus, Cindy Cohn, AT&T, Electronic Frontier Foundation, Mark Klein, National Security Agency, Wired News, Ryan Singel, US Department of Justice, Vaughn Walker

Timeline Tags: Civil Liberties

The Supreme Court, ruling in the Wisconsin Right to Life v. Federal Election Commission case, finds that some political advertisements can be exempted from the “electioneering communications” provision of the McCain-Feingold campaign reform act (see March 27, 2002). The case stems from attempts by an anti-abortion advocacy group, Wisconsin Right to Life (WRTL), to run ads asking viewers to contact their senators and urge them to oppose filibusters of judicial nominees. WRTL tried to run its ads during the 30 and 60-day “blackout” periods before the upcoming 2004 elections, but because it accepted corporate contributions and was itself incorporated, the McCain-Feingold restrictions prevented the ads from running. WRTL argued that the ads were not targeting candidates, but were strictly issue-related (see Mid-2004 and After). The case was initially dismissed, but the Supreme Court reversed that decision and remanded the case back to the lower courts. The Federal Election Commission (FEC) argued that the ads were intended to influence US Senate elections in Wisconsin, and thusly should be regulated by McCain-Feingold. A district court disagreed, ruling against the FEC and finding that the ads were “protected speech” (see January 30, 1976), though it limited its findings solely to the WRTL ads and specified that its ruling was not to apply to other cases. The FEC appealed the case to the US Supreme Court, which in a 5-4 decision finds that the district court’s ruling is valid. Chief Justice John Roberts writes the majority opinion, which establishes broad exemptions for advertisements that could be “reasonably” interpreted as being about legislative issues and not directed on behalf of, or against, a particular candidate. As long as “issue ads” do not contain the “functional equivalent” of express advocacy for or against a candidate, the Roberts opinion holds, and the advertisements are legal. The ads involve “core political speech” that is protected by the First Amendment, Roberts finds: “We give the benefit of the doubt to speech, not censorship.” Justice David Souter writes the dissenting opinion. Justices Antonin Scalia and Clarence Thomas write a concurring opinion that joins them with Roberts and the other two conservative justices, but in their concurrence, they say they would overturn the McCain-Feingold law in its entirety. [Connecticut Network, 2006 pdf file; Los Angeles Times, 6/26/2007; FindLaw, 2011; National Public Radio, 2012; Oyez (.org), 7/1/2012] Roberts is careful in the language of his majority opinion, writing that “the First Amendment requires us to err on the side of protecting political speech rather than suppressing it.” He does not directly advocate for the overturning of the McCain-Feingold law, but referring to the 2003 McConnell decision that upheld the law (see December 10, 2003), he writes, “We have no occasion to revisit that determination today.” In 2012, reporter Jeffrey Toobin will write of Roberts’s use of the word “today,” “To those who know the language of the Court, the Chief Justice was all but announcing that five justices would soon declare the McCain-Feingold law unconstitutional.” [New Yorker, 5/21/2012] Toobin is referring to the 2010 Citizens United decision that will overturn most of the law (see January 21, 2010).

Entity Tags: John G. Roberts, Jr, Clarence Thomas, David Souter, Antonin Scalia, Federal Election Commission, Wisconsin Right to Life, US Supreme Court, Jeffrey Toobin

Timeline Tags: Civil Liberties

Most of the lawsuits filed against the US government and against a number of private telecommunications firms alleging illegal wiretapping of US citizens and foreign organizations (see January 31, 2006) are hampered by what legal experts call a “Catch 22” process: lawyers for the Justice Department and for the firms that are alleged to have cooperated with the government in wiretapping citizens and organizations argue that the lawsuits have no merits because the plaintiffs cannot prove that they were direct victims of government surveillance. At the same time, the lawyers argue that the government cannot reveal if any individuals were or were not monitored because the “state secrets privilege” (see March 9, 1953) allows it to withhold information if it might damage national security. Lawyer Shayana Kadidal, who is representing the Center for Constitutional Rights in another lawsuit on behalf of Guantanamo Bay detainees, says, “The government’s line is that if you don’t have evidence of actual surveillance, you lose on standing.”
One Lawsuit Has Evidence of Surveillance - But the lawsuit filed by Saudi charitable organization the Al Haramain Islamic Foundation (see February 28, 2006) is different, because the plaintiffs have an actual classified US document that they say proves their allegations. Kadidal says that because of that document, “[T]his is the only one with evidence of actual surveillance” and therefore has a much stronger chance of going forward. The Justice Department will not confirm, or deny, if anyone from Al Haramain was monitored either under the Terrorist Surveillance Program or any other government operation, but plaintiff lawyer Jon Eisenberg tells a judge in July 2007: “We know how many times [my client has] been surveilled. There is nothing left for this court to do except hear oral arguments on the legality of the program.”
Extraordinary Measures to Keep Document 'Secure' - Though the Justice Department has repeatedly argued that the Treasury Department document at the heart of the case is harmless and unrelated to NSA surveillance, it is taking extraordinary measures to keep it secure—it is held under strict government seal and remains classified as top secret. Even the plaintiff’s lawyers are no longer allowed to see the document, and have been forced to file briefs with the court based on their memories of the document. [Wired News, 3/5/2007]
Expert: Government Cannot Stop Case - The government probably does not have enough to derail the Al Haramain case, according to law professor Curtis Bradley. In August 2007, Bradley observes, “The biggest obstacle this litigation has faced is the problem showing someone was actually subjected to surveillance,” but the lawsuit “has a very good chance to proceed farther than the other cases because it’s impossible for the government to erase [the lawyers’] memories of the document.” [Associated Press, 8/5/2007]

Entity Tags: US Department of Justice, Terrorist Surveillance Program, Shayana Kadidal, Jon Eisenberg, Curtis Bradley, Al Haramain Islamic Foundation (Oregon branch), National Security Agency, Center for Constitutional Rights

Timeline Tags: Civil Liberties

The Protect America Act (PAA) (see August 5, 2007), an amendment to the Foreign Intelligence Surveillance Act (FISA—see 1978), is introduced in Congress. With limited debate and no committee hearings, it passes both houses with substantial majorities. [US Senate, 8/5/2007; Boston Globe, 8/6/2007; House Judiciary Committee, 9/18/2007 pdf file] Congressional Democrats quickly capitulate on the bill, submitting to what the Washington Post later calls “a high-pressure campaign by the White House to change the nation’s wiretap law, in which the administration capitalized on Democrats’ fears of being branded weak on terrorism and on Congress’s desire to act on the issue before its August recess.” [Washington Post, 8/5/2007] Indeed, one Republican senator, Trent Lott, warns during the initial debate that lawmakers should pass the law quickly and get out of Washington before they could be killed in a terrorist attack (see August 2, 2007). McConnell tells the Senate, “Al-Qaeda is not going on vacation this month.” And Democrat Joseph Lieberman (D-CT), a supporter of the bill, told his colleagues: “We’re at war. The enemy wants to attack us. This is not the time to strive for legislative perfection.” [Slate, 8/6/2007]
Some Democrats Unhappy - One Democratic lawmaker responds angrily: “There are a lot of people who felt we had to pass something. It was tantamount to being railroaded.” Many House Democrats feel betrayed by the White House; Democratic leaders had reached what they believed was a deal on the bill with the Director of National Intelligence, Mike McConnell, only to have the White House throw out the deal and present a new list of conditions at the last minute. Both McConnell and the White House deny that any such deal was reached. Jan Schakowsky (D-IL), a member of the House Intelligence Committee, says, “I think the White House didn’t want to take ‘yes’ for an answer from the Democrats.” Representative Jerrold Nadler (R-NY) says lawmakers were “stampeded by fear-mongering and deception” into voting for the bill. Fellow House Democrat Jane Harman (D-CA) warns that the PAA will lead to “potential unprecedented abuse of innocent Americans’ privacy.” [Washington Post, 8/5/2007] The ACLU’s Caroline Fredrickson has a succinct explanation of why the Democrats folded so quickly: “Whenever the president says the word terrorism, they roll over and play dead.” [Slate, 8/6/2007]
AT&T Whistleblower: Democratic Leadership Colluded in Passing PAA - AT&T whistleblower Mark Klein (see July 7, 2009 and December 15-31, 2005) will later write that the Democrats played a far more active role in getting the PAA passed than others acknowledge. He will quote a 2008 column by liberal civil liberties advocate Glenn Greenwald, who will write: “[I]n 2006, when the Congress was controlled by [then-Senate Majority Leader] Bill Frist [R-TN] and [then-House Speaker] Denny Hastert [R-IL], the administration tried to get a bill passed legalizing warrantless eavesdropping and telecom amnesty, but was unable. They had to wait until the Congress was controlled by [House Majority Leader] Steny Hoyer [D-MD], [House Speaker] Nancy Pelosi [D-CA], and [Senate Majority Leader] Harry Reid [D-NV] to accomplish that.” According to Klein, once the Democrats took control of Congress in January 2007, they engaged in “pure theater, posturing as opponents of the illegal NSA program while seeking a way to protect the president.” The few principled Democrats to actively oppose the legislation, such as Senator Christopher Dodd (D-CT), were, Klein will write, “hamstrung by their own leadership.” The PAA passage was accompanied by refusals from the Democratic leaders of “the relevant Intelligence and Judiciary Committees, which were now led by Democrats such as [John D.] Rockefeller, [Dianne] Feinstein (see February 1-6, 2006), and [Patrick] Leahy in the Senate, and John Conyers and Sylvestre Reyes in the House,” who “quickly decided not to launch any serious investigations into the NSA spying.” Klein will later add that at the time of the PAA passage, he was unaware of how thoroughly Democrats had been briefed on the NSA program (see October 1, 2001, October 11, 2001, October 25, 2001 and November 14, 2001, July 17, 2003, and March 10, 2004), “and thus were in on the secret but took no action to stop it.” [Salon, 6/19/2008; Klein, 2009, pp. 86-87]

Entity Tags: Trent Lott, Mike McConnell, Protect America Act, Joseph Lieberman, Mitch McConnell, Jane Harman, Jerrold Nadler, Caroline Fredrickson, Bush administration (43), Jan Schakowsky, House Intelligence Committee

Timeline Tags: Civil Liberties

During the Senate debate over the controversial Protect America Act (see August 5, 2007), Minority Leader Trent Lott (R-MS) says that the threat from terrorism is so dire, and so imminent, that lawmakers should pass the law and then get out of Washington as soon as they can to save their own lives. (Congress goes into recess in a few days.) Lott says that Congress needs to pass the PAA, otherwise, “the disaster could be on our doorstep.” He continues, “I think it would be good to leave town in August, and it would probably be good to stay out until September the 12th.” Lott provides no information about any predictions of an imminent terrorist attack on Washington or anywhere else. [Roll Call, 8/2/2007]

Entity Tags: Protect America Act, Trent Lott

Timeline Tags: Civil Liberties

Congressional Democrats attempt to short-circuit the Protect America Act (see August 5, 2007) currently under debate. They introduce their own bill, the Improving Foreign Intelligence Surveillance to Defend the Nation and the Constitution Act, that would address the administration’s concerns that the Foreign Intelligence Surveillance Act imposed unwieldy limitations on the NSA’s ability to electronically monitor foreign communications that were transmitted through communications networks inside the US. The Democrats’ bill redefines “electronic surveillance” to allow the NSA to monitor such communications without a FISA warrant if it “reasonably believes” the targets of those communications to be outside the US. This would give the NSA new surveillance powers, so the Democrats’ bill provides for oversight by the FISA Court, audits by the Justice Department’s Inspector General, and restrictions on domestic surveillance. However, the Bush administration does not want the bill to become law. President Bush announces that he opposes the bill, and threatens to hold Congress in session past its August adjournment date until he can get the Protect America Act passed. The Democrats’ bill dies before ever coming up for a full vote in Congress. [US House of Representatives, 8/3/2007 pdf file; Slate, 8/6/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Bush administration (43), Foreign Intelligence Surveillance Act, US Department of Justice, National Security Agency, Protect America Act, George W. Bush

Timeline Tags: Civil Liberties

Mitch McConnell.Mitch McConnell. [Source: US Senate]President Bush signs the controversial Protect America Act (PAA) into law. The bill, which drastically modifies the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978), was sponsored by two Senate Republicans, Mitch McConnell (R-KY) and Christopher Bond (R-MO), but written by the Bush administration’s intelligence advisers. [US Senate, 8/5/2007; Washington Post, 8/5/2007] It passed both houses of Congress with little debate and no hearings (see August 1-4, 2007). “This more or less legalizes the NSA [domestic surveillance] program,” says Kate Martin, director of the Center for National Security Studies. [New York Times, 8/6/2007] Slate’s Patrick Radden Keefe adds ominously, “The Foreign Intelligence Surveillance Act is now dead, and it’s never coming back.” [Slate, 8/6/2007] The PAA expires in six months, the only real concession Congressional Democrats were able to secure. Though the Bush administration and its allies in Congress insist that the law gives the government “the essential tools it needs” to conduct necessary surveillance of foreign-based terrorists while protecting Americans’ civil liberties, many Democrats and civil liberties organizations say the bill allows the government to wiretap US residents in communication with overseas parties without judiciary or Congressional oversight. Bush calls the bill “a temporary, narrowly focused statute to deal with the most immediate shortcomings in the law” that needs to be expanded and made permanent by subsequent legislation. The administration says that the lack of judiciary oversight in the new law will be adequately covered by “internal bureaucratic controls” at the National Security Agency. [Associated Press, 8/5/2007; Washington Post, 8/5/2007]
Reining in FISA - The PAA allows FISA to return “to its original focus on protecting the rights of Americans, while not acting as an obstacle to conducting foreign intelligence surveillance on foreign targets located overseas.” Before the PAA, the White House says, FISA created unnecessary obstacles in allowing US intelligence to “gain real-time information about the intent of our enemies overseas,” and “diverted scarce resources that would be better spent safeguarding the civil liberties of people in the United States, not foreign terrorists who wish to do us harm.” The PAA no longer requires the government to obtain FISA warrants to monitor “foreign intelligence targets located in foreign countries” who are contacting, or being contacted by, US citizens inside US borders. FISA will continue to review the procedures used by US intelligence officials in monitoring US citizens and foreign contacts by having the attorney general inform the FISA Court of the procedures used by the intelligence community to determine surveillance targets are outside the United States.”
Allows Third Parties to Assist in Surveillance, Grants Immunity - The PAA also allows the director of national intelligence and the attorney general to secure the cooperation of “third parties,” particularly telecommunications firms and phone carriers, to “provide the information, facilities, and assistance necessary to conduct surveillance of foreign intelligence targets located overseas.” It provides these firms with immunity from any civil lawsuits engendered by such cooperation.
Short Term Legislation - The White House says that Congress must pass further legislation to give telecommunications firms permanent and retroactive immunity against civil lawsuits arising from their cooperation with the government’s domestic surveillance program. [White House, 8/6/2006]
Temporary Suspension of the Constitution? - Representative Rush Holt (D-NJ), a member of the House Intelligence Committee, says: “I’m not comfortable suspending the Constitution even temporarily. The countries we detest around the world are the ones that spy on their own people. Usually they say they do it for the sake of public safety and security.” [Washington Post, 8/5/2007]

Entity Tags: Christopher (“Kit”) Bond, National Security Agency, Foreign Intelligence Surveillance Act, George W. Bush, Foreign Intelligence Surveillance Court, Mitch McConnell, Al-Qaeda, Terrorist Surveillance Program, Kate Martin, Patrick Radden Keefe, Rush Holt, Protect America Act

Timeline Tags: Civil Liberties

Ryan Singel.Ryan Singel. [Source: Wired]According to Ryan Singel of Wired, the new Protect America Act (PAA—see August 5, 2007) gives the Bush administration “the power to order the nation’s communication service providers—which range from Gmail, AOL IM, Twitter, Skype, traditional phone companies, ISPs, internet backbone providers, Federal Express, and social networks—to create possibly permanent spying outposts for the federal government.” He adds: “These outposts need only to have a ‘significant’ purpose of spying on foreigners, would be nearly immune to challenge by lawsuit, and have no court supervision over their extent or implementation. Abuses of the outposts will be monitored only by the Justice Department, which has already been found to have underreported abuses of other surveillance powers to Congress.” In addition, Singel says the PAA redefines any monitoring of US citizens’ telephone and Internet communications “reasonably believed” to be outside the country as not surveillance, allows telecommunications firms to target both foreign and domestic parties for surveillance, and forces those firms to give assistance in secret, without informing Congress or the targeted parties. [Wired News, 8/6/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Bush administration (43), US Department of Justice, Ryan Singel, Terrorist Surveillance Program, Protect America Act

Timeline Tags: Civil Liberties

Aziz Huq.Aziz Huq. [Source: American Prospect]Aziz Huq, an author and the director of the Brennan Center for Justice at New York University, writes that the Protect America Act (PAA-see August 5, 2007) came about as a result of what he calls “the most recent example of the national security waltz, a three-step administration maneuver for taking defeat and turning it into victory.” Step one is a court defeat for the administration, for example regarding detainees at Guantanamo (see June 28, 2004), or the overruling of military commissions in 2006 (see June 30, 2006). The second step, which comes weeks or months later, is an announcement that the ruling has created a security crisis and must be “remedied” through immediate legislation. The third and final step is the administration pushing legislation through Congress, such as the Detainee Treatment Act (see December 15, 2005) or the Military Commissions Act, that, Huq writes, “not only undoes the good court decision but also inflicts substantial damage to the infrastructure of accountability.”
Step One: FISC Refuses to Approve NSA's Surveillance Program - In January 2007, the administration announced that it was submitting the NSA’s domestic surveillance program to the Foreign Intelligence Surveillance Court (FISC), the secret court that issues FISA warrants for surveillance (see May 1, 2007). This was due to pending court cases threatening to rule the program in violation of FISA and the Fourth Amendment; the administration wanted to forestall, or at least sidestep, those upcoming rulings. In June, FISC refused to approve parts of the NSA program that involved monitoring overseas communications that passed through US telecom switches. Since a tremendous amount of overseas communications are routed through US networks, this ruling jeopardized the NSA’s previous ability to wiretap such communications virtually at will without a warrant. The administration objected to the NSA having to secure such warrants.
Step Two: The Drumbeat Begins - Months later, the drumbeat for new legislation to give the NSA untrammeled rights to monitor “overseas” communications, which not only traveled through US networks, but often began or ended with US citizens, began with appearances in the right-wing media by administration supporters, where they insisted that the FISC ruling was seriously hampering the NSA’s ability to garner much-needed intelligence on terrorist plots against the US. The White House and Congressional Republicans drafted legislation giving the NSA what it wanted, and presented it during the last week of the Congressional session, minimizing the time needed for scrutiny of the legislation as well as reducing the time available for meaningful debate.
Step Three: Passing a Law With Hidden Teeth - The legislation that would become the Protect America Act was carefully written by Bush officials, and would go much farther than giving the NSA the leeway it needed to wiretap US citizens. Instead, as Huq writes, “the Protect America Act is a dramatic, across-the-board expansion of government authority to collect information without judicial oversight.” Democrats believed they had negotiated a deal with the administration’s Director of National Intelligence, Mike McConnell, to limit the law to addressing foreign surveillance wiretaps, but, Huq writes, “the White House torpedoed that deal and won a far broader law.” The law removes any real accountability over domestic surveillance by either Congress or the judiciary. Former CIA officer Philip Giraldi says that the PAA provides “unlimited access to currently protected personal information that is already accessible through an oversight procedure.” The law is part of the administration’s continual attempts to “eviscerat[e]” the checks and balances that form the foundation of US democracy.
Ramifications - The law includes the provision that warrantless surveillance can be “directed at a person reasonably believed to be located outside of the United States.” Huq writes that this is a tremendously broad and vague standard that allows “freewheeling surveillance of Americans’ international calls and e-mails.” He adds: “The problem lies in the words ‘directed at.’ Under this language, the NSA could decide to ‘direct’ its surveillance at Peshawar, Pakistan—and seize all US calls going to and from there.… Simply put, the law is an open-ended invitation to collect Americans’ international calls and e-mails.” The law does not impose any restrictions on the reason for surveillance. National security concerns are no longer the standard for implementing surveillance of communications. And the phrase “reasonably believe” is uncertain. The provisions for oversight are, Huq writes, “risibly weak.” Surveillance need only be explained by presentations by the Director of National Intelligence and the Attorney General to FISC, which has little room to invalidate any surveillance, and furthermore will not be informed of any specific cases of surveillance. As for Congress, the Attorney General only need inform that body of “incidents of noncompliance” as reported by the administration. Congress must rely on the administration to police itself; it cannot demand particulars or examine documentation for itself. The law expires in six months, but, Huq notes, that deadline comes up in the middle of the 2008 presidential campaign, with all the pressures that entails. And the law allows “the NSA to continue wielding its new surveillance powers for up to a year afterward.” The law, Huq writes, “does not enhance security-related surveillance powers. Rather, it allows the government to spy when there is no security justification. And it abandons all but the pretense of oversight.” [Nation, 8/7/2007]

Entity Tags: Mike McConnell, Detainee Treatment Act, Bush administration (43), Aziz Huq, Foreign Intelligence Surveillance Court, Military Commissions Act, National Security Agency, US Supreme Court, Philip Giraldi, Protect America Act

Timeline Tags: Civil Liberties

Former Nixon White House counsel John Dean considers the newly passed Protect America Act (PAA—see August 5, 2007) a dire threat to American civil liberties. Dean writes that the ire of rank-and-file Democrats with their Congressional leadership is well earned, that the Democrats meekly lined up and voted it into law after some pro forma protestations. Dean notes that editorialists from around the country, and organizations as politically disparate as the ACLU (see August 6, 2007), the Cato Institute, and the John Birch Society (see March 10, 1961 and December 2011) all agree that the new law is a serious threat to civil liberties. They all agree that the law violates the Fourth Amendment while at the same time hides its operations under the rubric of national security secrecy. Dean notes, “Congress was not even certain about the full extent of what it has authorized because President Bush and Vice President Cheney refused to reveal it.”
Executive Power Grab - Dean writes that as much of a threat as the PAA is to citizens’ privacy, it is more threatening because it is another step in the Bush administration’s push for enhancing the powers of the executive branch at the expense of the legislative and judiciary branches, a move towards a so-called “unitary executive.” Bush and Cheney have worked relentlessly “to weaken or eliminate all checks and balances constraining the executive,” Dean writes, pointing to “countless laws enacted by the Republican-controlled Congresses during the first six years of the administration, and in countless signing statements added by the president interpreting away any constraints on the Executive.” The new law “utterly fails to maintain any real check on the president’s power to undertake electronic surveillance of literally millions of Americans. This is an invitation to abuse, especially for a president like the current incumbent.”
Repairing the Damage - Dean is guardedly optimistic about the Democrats’ stated intentions to craft a new law that will supersede the PAA, which expires in February 2008, and restore some of the protections the PAA voids. Any such legislation may be quickly challenged by the Bush administration, which wants retroactive legislative immunity from prosecution for both US telecommunications firms cooperating with the government in monitoring Americans’ communications, and for government officials who may have violated the law in implementing domestic surveillance. Dean writes: “[B]efore Congress caved and gave Bush power to conduct this surveillance, he and telecommunication companies simply opted to do so illegally. Now, Bush will claim, with some justification, that because Congress has now made legal actions that were previously illegal, it should retroactively clear up this nasty problem facing all those who broke the law at his command.” Dean writes that Democrats need only do one thing to “fix [this] dangerous law: [add] meaningful accountability.” He continues: “They must do so, or face the consequences. No one wants to deny the intelligence community all the tools it needs. But regardless of who sits in the Oval Office, no Congress should trust any president with unbridled powers of surveillance over Americans. It is not the way our system is supposed to work.” [FindLaw, 8/10/2007]

Entity Tags: John Birch Society, Richard (“Dick”) Cheney, Protect America Act, Cato Institute, American Civil Liberties Union, John Dean, George W. Bush

Timeline Tags: Civil Liberties

AT&T attorney Michael Kellogg enters the courtroom.AT&T attorney Michael Kellogg enters the courtroom. [Source: Wired News]The Ninth Circuit Court of Appeals in San Francisco hears two related cases: one a government appeal to dismiss a case brought against AT&T for its involvement in the National Security Agency (NSA)‘s domestic wiretapping program (see July 20, 2006), and the other a challenge to the government’s authority to wiretap overseas phone calls brought on behalf of a now-defunct Islamic charity, Al Haramain (see February 28, 2006). The AT&T lawsuit is brought by the Electronic Frontier Foundation (see January 31, 2006). Among the onlookers is AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who has provided key documentation for the EFF lawsuit (see Early January 2006).
Government Lawyer: Court Should Grant 'Utmost Deference' to Bush Administration - Deputy Solicitor General Gregory Garre, arguing on behalf of the US government, tells Judge Harry Pregerson, one of the three judges presiding over the court, that allowing the EFF lawsuit against AT&T to go forward would result in “exceptionally grave harm to national security in the United States,” even though a previous judge has ruled otherwise (see July 20, 2006) and the government itself has admitted that none of the material to be used by EFF is classified as any sort of state secret (see June 23, 2006). Pregerson says that granting such a request would essentially make his court a “rubber stamp” for the government, to which Garre argues that Pregerson should grant the “utmost deference” to the Bush administration. Pregerson retorts: “What does utmost deference mean? Bow to it?” [Wired News, 8/15/2007] Klein will later accuse Garre of using “scare tactics” to attempt to intimidate the judges into finding in favor of AT&T and the government. [Klein, 2009, pp. 79]
Government Refuses to Swear that Domestic Surveillance Program Operates under Warrant - Garre says that the goverment’s domestic surveillance program operates entirely under judicial warrant; he says the government is not willing to sign a sworn affidavit to that effect. Reporter Kevin Poulsen, writing for Wired News, says that Garre’s admission of the government’s reluctance to swear that its domestic surveillance program operates with warrants troubles all three judges. AT&T attorney Michael Kellogg argues that AT&T customers have no proof that their communications are being given over to the government without warrants, and therefore the EFF lawsuit should be dismissed. “The government has said that whatever AT&T is doing with the government is a state secret,” Kellogg says. “As a consequence, no evidence can come in whether the individuals’ communications were ever accepted or whether we played any role in it.” EFF attorney Robert Fram argues that the Foreign Intelligence Surveillance Act (FISA) allows citizens to challenge electronic surveillance by permitting courts to hear government evidence in chambers. He is careful, Poulsen writes, to note that EFF does not want specific information on the NSA’s sources and methods, and says that EFF already has enough evidence to prove its assertion that AT&T compromised its customers’ privacy by colluding with the NSA’s domestic surveillance program.
Government Mocks Whistleblower's AT&T Documentation - Garre mocks Klein’s AT&T documents, saying that all they prove is that the NSA’s secret room in AT&T’s San Francisco facility (see Late 2002-Early 2003, January 2003, and October 2003) “has a leaky air conditioner and some loose cables in the room.” Fram counters that Klein’s documentation is specific and damning. It proves that the NSA housed a splitter cabinet in that secret room that “split” data signals, allowing the NSA to wiretap literally millions of domestic communications without the knowledge of AT&T customers (see February 2003, Fall 2003, Late 2003, and Late 2003). Fram says Klein’s documents, along with other non-classified documentation EFF has presented, proves “the privacy violation on the handover of the Internet traffic at the splitter into the secret room, which room has limited access to NSA-cleared employees. What is not part of our claim is what happens inside that room.” Klein’s documentation proves the collusion between AT&T and the NSA, Fram states, but Judge M. Margaret McKeown questions this conclusion. According to Poulsen, McKeown seems more willing to grant the government the argument that it must protect “state secrets” than Pregerson.
Government Argues for Dismissal of Al Haramain Case - As in the AT&T portion of the appeal hearing, the government, represented by Assistant US Attorney General Thomas Brody, argues for the Al Haramain lawsuit’s dismissal, saying, “The state secrets privilege requires dismissal of this case.” Even the determination as to whether Al Haramain was spied upon, he argues, “is itself a state secret.” The Top Secret government document that Al Haramain is using as the foundation of its case is too secret to be used in court, Brody argues, even though the government itself accidentally provided the charity with the document. Even the plaintiff’s memories of the document constitute “state secrets” and should be disallowed, Brody continues. “This document is totally non-redactable and non-segregable and cannot even be meaningfully described,” he says. A disconcerted Judge McKeown says, “I feel like I’m in Alice and Wonderland.” Brody concludes that it is possible the Al Haramain attorneys “think or believe or claim they were surveilled. It’s entirely possible that everything they think they know is entirely false.” [Wired News, 8/15/2007]
No Rulings Issued - The appeals court declines to rule on either case at this time. Klein will later write, “It was clear to everyone that this panel would, if they ever issued a ruling, deny the ‘state secrets’ claim and give the green light for the EFF lawsuit to go forward.” [Klein, 2009, pp. 79-81] Wired News’s Ryan Singel writes that the panel seems far more sympathetic to the EFF case than the Al Haramain case. The judges seem dismayed that the government fails to prove that no domestic surveillance program actually exists in the EFF matter. However, they seem far more willing to listen to the government’s case in the Al Haramain matter, even though McKeown says that the government’s argument has an “Alice in Wonderland” feel to it. Singel believes the government is likely to throw out the secret document Al Haramain uses as the foundation of its case. However, he writes, “all three judges seemed to believe that the government could confirm or deny a secret intelligence relationship with the nation’s largest telecom, without disclosing secrets to the world.… So seemingly, in the eyes of today’s panel of judges, in the collision between secret documents and the state secrets privilege, ‘totally secret’ documents are not allowed to play, but sort-of-secret documents—the AT&T documents—may be able to trump the power of kings to do as they will.” [Wired News, 8/15/2007] Wired News’s David Kravets notes that whichever way the court eventually rules, the losing side will continue the appeals process, probably all the way to the US Supreme Court. The biggest question, he says, is whether the NSA is still spying on millions of Americans. [Wired News, 8/15/2007]

Entity Tags: Foreign Intelligence Surveillance Act, US Supreme Court, Electronic Frontier Foundation, Bush administration (43), Al Haramain Islamic Foundation, AT&T, David Kravets, Ryan Singel, Thomas Brody, National Security Agency, Mark Klein, Kevin Poulsen, M. Margaret McKeown, Gregory Garre, Harry Pregerson, Robert Fram, Michael Kellogg

Timeline Tags: Civil Liberties

Room 641A, the NSA’s secret room at AT&T’s Folsom Street facility.Room 641A, the NSA’s secret room at AT&T’s Folsom Street facility. [Source: Wired]Former AT&T network technician Mark Klein (see December 15-31, 2005 and July 7, 2009) gives a press conference with the Electronic Frontier Foundation (EFF) in Washington, DC, in an effort to lobby Congress and prevent an immunity bill for the telecoms from passing. The next day, Klein appears in the audience during a Senate Judiciary Committee meeting as part of his lobbying effort in Washington to reveal his knowledge of a secret NSA electronic surveillance operation at AT&T’s San Francisco operations center (see January 2003). The NSA has monitored an enormous volume of telephone and Internet traffic through this secret operation. “I have first-hand knowledge of the clandestine collaboration between one giant telecommunications company, AT&T, and the National Security Agency to facilitate the most comprehensive illegal domestic spying program in history,” Klein tells reporters. “I think they committed a massive violation not only of the law but of the Constitution. That’s not the way the Fourth Amendment is supposed to work.” [New York Times, 11/6/2007; BetaNews, 11/8/2007; Democracy Now!, 7/7/2008] Klein states his four main points of information: that AT&T provided the NSA with all varieties of electronic communications, from telephone conversations to emails, text messages, Web browsing activities, and more; AT&T provided the NSA with billions of purely domestic communications; the program involved everyone using the Internet and not just AT&T customers, because of the interconnected nature of the Internet; and AT&T had 15 to 20 NSA “spy rooms” in facilities across the nation. Brian Reid, a telecommunications and data networking expert who served as one of the New York Times’s experts on the NSA allegations (see April 12, 2006), appears with Klein at the press conference. Reid told Klein in the days before the conference, “My job is to make people believe you.” Reid tells reporters, “The most likely use of this [AT&T/NSA] infrastructure is wholesale, untargeted surveillance of ordinary Americans at the behest of the NSA.” Hours after the press conference, Klein appears as a guest on MSNBC’s political talk show Countdown, where host Keith Olbermann asks him if his experience “felt like finding yourself in a scene from the sci-fi flick Invasion of the Body Snatchers—did it have that sort of horror quality to it?” Klein replies, “My thought was George Orwell’s 1984 and here I am being forced to connect the Big Brother machine.” [Klein, 2009, pp. 93-100]
Key Witness - Klein is a key witness in the lawsuit against AT&T by the EFF (see January 31, 2006 and Early January 2006). He is offering to testify against efforts by the Bush administration and its Congressional Republican allies to amend the Foreign Intelligence Surveillance Act to grant immunity to telecom companies like AT&T from prosecution for surveillance acts. Such an immunity grant would likely result in the dismissal of such lawsuits. But no committee of Congress invites him to testify. [New York Times, 11/6/2007; BetaNews, 11/8/2007; Democracy Now!, 7/7/2008]
NSA Secure Room - Part of Klein’s information is from a deposition that was entered into evidence in the lawsuit, and is now made available to individual members of Congress (see February 23-28, 2006, June 26, 2006, and June 13, 2007). Klein relates that during a tour of the AT&T-controlled floors of the Folsom Street facility of what was then SBC Communications, he saw Room 641A, categorized as the “SG3Secure Room” (see October 2003 and Late 2003). That fall, when he was hired to work at the facility, he saw an NSA agent who came to interview a field support specialist for clearance to be able to work in the Secure Room. “To my knowledge, only employees cleared by the NSA were permitted to enter the SG3 Secure Room,” Klein says. “To gain entry to the SG3 Secure Room required both a physical key for the cylinder lock and a combination code number to be entered into an electronic keypad on the door. To my knowledge, only [two field support specialists] had both the key and the combination code.” Klein installed new circuits to a fiber-optic “splitter cabinet” that had only one purpose: to duplicate Internet traffic from WorldNet’s service into SG3, thereby allowing the NSA access to all traffic on that circuit. “What I saw is that everything’s flowing across the Internet to this government-controlled room,” he now says. [New York Times, 11/6/2007; BetaNews, 11/8/2007]
EFF Lobbyists - The EFF secures the services of two professional lobbyists, Adam Eisgrau and former Congressman Thomas Downey (D-NY), who escort Klein and EFF officials Cindy Cohn and Kevin Bankston around Capitol Hill during the two-day period. EFF also works with a professional media company to prepare the media for the November 7 press conference. After the conference, Klein is introduced to a number of Democratic lawmakers, though he says only a few are truly interested in his evidence; he names Senator Barbara Boxer (D-CA) and Representative Rush Holt (D-NJ), a former physicist who had actually worked with some of the technology Klein cites in his statements, as two of those willing to give him more than a handshake and a quick photo opportunity. Klein later regrets being unable to meet with Senator Christopher Dodd (D-CT), whom he considers to be one of the few real champions of civil liberties in Congress. Dodd cited Klein’s evidence, and Klein by name, in his unsuccessful filibuster of the FISA amendment bill (see July 10, 2008). [Klein, 2009, pp. 91-95] The lobbyists are able to gain access for Klein to the Congressional hearings. Some media outlets later report, mistakenly, that Klein actually testifies before the panel. [Klein, 2009, pp. 100-101]

Entity Tags: Foreign Intelligence Surveillance Act, Electronic Frontier Foundation, AT&T, Mark Klein, Bush administration (43), Senate Judiciary Committee

Timeline Tags: Civil Liberties

A federal appellate court bars an Islamic charity accused of assisting terrorists from using a US government document to prove that it had been illegally spied upon (see February 28, 2006). The charity, the now-defunct Al Haramain Islamic Foundation (see Late May, 2004), has been accused by the government and the UN Security Council of being affiliated with al-Qaeda; the charity’s officials deny the charges. In its finding, the three-judge panel rules in favor of the government’s argument that protecting “state secrets” (see March 9, 1953) is of overriding importance in the case. Other courts have ruled that the Bush administration can refuse to disclose information if “there is a reasonable danger” it would affect national security. Al Haramain’s lawyers argued that the document is necessary to prove that it was illegally monitored. According to the ruling, the judges accept “the need to defer to the executive on matters of foreign and national security and surely cannot legitimately find ourselves second-guessing the executive in this arena.”
Reaction Divided - Opinion is divided on the ruling. Constitutional law professor Erwin Chemerinsky of Duke University says the court’s deference to the “executive branch in situations like this [is] very troubling.” Another constitutional law professor, Douglas Kmiec of Pepperdine, says “the opinion is consistent with” an earlier ruling that struck down a challenge to the government’s surveillance program filed by the American Civil Liberties Union; Kmiec says the rulings indicate that “federal courts recognize that the essential aspects of the Terrorist Surveillance Program both remain secret and are important to preserve as such.”
Mixed Results - The appellate court does not give the government everything it asked for. It rejects the Justice Department’s argument that “the very subject matter of the litigation is a state secret.” That finding may prove important in the other surveillance cases where the government is arguing that even to consider legal challenges to warrantless wiretapping endangers national security. The appeals court sends the case back to a lower court to consider whether or not the Foreign Intelligence Surveillance Act, which requires approval by a special court for domestic surveillance, preempts the state secrets privilege. The court also severs the Al Haramain case from other, similar lawsuits challenging the government’s secret surveillance program. [Los Angeles Times, 11/17/2007]

Entity Tags: United Nations Security Council, US Department of Justice, Erwin Chemerinsky, Foreign Intelligence Surveillance Act, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Douglas Kmiec, Bush administration (43), Terrorist Surveillance Program

Timeline Tags: Civil Liberties

Michael McConnell, the director of national intelligence, writes an op-ed for the New York Times pushing for Congressional immunity for US telecommunications firms over their cooperation with the NSA’s warrantless wiretapping program. Under August’s Protect America Act, McConnell writes, the country is “safer” from terrorist attacks while the privacy of US citizens is protected (see August 5, 2007). The government has “greater understanding of international [al-]Qaeda networks, and the law has allowed us to obtain significant insight into terrorist planning.” But the Act expires in two months, and McConnell wants it re-enacted and significantly expanded “if we are to stay ahead of terrorists who are determined to attack the United States.” Echoing the arguments of Bush administration officials, McConnell attacks the “outdated” Foreign Intelligence Surveillance Act as significantly hindering the government’s “ability to collect timely foreign intelligence.” McConnell complains: “Our experts were diverted from tracking foreign threats to writing lengthy justifications to collect information from a person in a foreign country, simply to satisfy an outdated statute that did not reflect the ways our adversaries communicate. The judicial process intended to protect the privacy and civil liberties of Americans was applied instead to foreign intelligence targets in foreign countries. This made little sense, and the Protect America Act eliminated this problem.” McConnell calls for new legislation that would obviate the need for intelligence agencies such as the NSA to seek warrants to monitor US citizens’ telephone and e-mail communications: “The intelligence community should spend its time protecting our nation, not providing privacy protections to foreign terrorists and other diffuse international threats.” He also calls for retroactive immunity for “private parties”—i.e. the US telecommunications companies—that are subject to lawsuits over their cooperation with the NSA in monitoring US communications. “The intelligence community cannot go it alone,” he writes. “Those in the private sector who stand by us in times of national security emergencies deserve thanks, not lawsuits.” Two days later, new Attorney General Michael Mukasey will write a virtually identical op-ed for the Los Angeles Times (see December 12, 2007). [New York Times, 12/10/2007]

Entity Tags: Foreign Intelligence Surveillance Act, Bush administration (43), Mike McConnell, New York Times, Protect America Act

Timeline Tags: Civil Liberties

A poster promoting ‘Hillary: The Movie.’A poster promoting ‘Hillary: The Movie.’ [Source: New York Times]The conservative lobbying group Citizens United (CU—see May 1998 and (May 11, 2004)) releases a film entitled Hillary: The Movie. The film is a lengthy diatribe attacking the character and career of Senator Hillary Clinton (D-NY), a leading candidate for the Democratic presidential nomination. Large portions of the film are comprised of conservative critics launching attacks against the personalities and character of Clinton and her husband, former President Clinton. CU president David Bossie (see May 1998) says he based his film on a documentary, Fahrenheit 9/11, released in 2004 by liberal filmmaker Michael Moore (see August 6, 2004), and calls it “a rigorously researched critical biography” comparable to the material presented on political talk shows such as Meet the Press. [Washington Post, 3/15/2009; Moneyocracy, 2/2012] Bossie intended for the film to be released in late 2007 and impact the 2008 race in the same way that he believes Fahrenheit 9/11 impacted the 2004 race. A cable company made the film, at a cost of $1.2 million, available for free to viewers on “video on demand.” Bossie also scheduled a small theater run for the film, but his primary focus was always cable television and the accompanying television advertisements. Knowing the film will probably run afoul of campaign law, he hired lawyers, first James Bopp Jr. (a former member of the far-right Young Americans for Freedom—YAF—and the former general counsel for the National Right to Life Committee—see November 1980 and After) [New Yorker, 5/21/2012] and later Theodore B. Olson, the former solicitor general under the Bush administration. Olson will later say the film is “a critical biographical assessment” that provides “historical information about the candidate and, perhaps, some measure of entertainment as well.” The New York Times calls it “a scathingly hostile look at Mrs. Clinton” replete with “ripe voice-overs, shadowy re-enactments, and spooky mood music.” The film also contains interviews and material from mainstream media reporters, and interviews with figures such as former CIA agent Gary Aldrich, who wrote a “tell-all” book about the Clinton administration, and with Kathleen Willey, who has claimed that Bill Clinton once made an unwelcome sexual advance towards her. Reviewer Megan Carpentier of Radar Online will trounce the movie, saying that it “scrolls through more than a decade of press clippings and a treasure trove of unflattering pictures in its one-sided romp” and will advise potential viewers to watch it “while inebriated in the manner of your choosing, and only if you don’t pay $10 for the privilege.” [New York Times, 3/5/2009] Bossie claims the movie has nothing to do with the impending primary elections. CU intends to show the movie in a small number of theaters but primarily on “video on demand” cable broadcasts, with accompanying television advertisements. In return for a $1.2 million fee, a cable television consortium has agreed to make the movie freely available to its customers as part of what CU calls its “Election ‘08” series. (CU has another negative documentary on Clinton’s Democratic challenger Barack Obama in the works—see October 28-30, 2008—but apparently has no plans to air any documentaries on Republican candidate John McCain or any other Republican presidential candidates.) However, the Federal Election Commission (FEC) refuses to allow the film to be aired on cable channels, or advertised for theater release, because the FEC considers the film “electioneering” and thus subject to campaign finance law (see March 27, 2002) restrictions. Moreover, the film and its planned distribution are funded by corporate donations. [United States District Court for the District Of Columbia, 1/15/2008; Richard Hasen, 1/15/2008; New Yorker, 5/21/2012] Bossie claims the film takes no position on Clinton’s candidacy, and says that if he had to vote between Hillary Clinton and Barack Obama, he would vote for Clinton. [New York Times, 3/5/2009]
Court Fight - Bopp, CU’s original lawyer, decides to pursue the same general aggressive course that he took in a recent successful Supreme Court campaign finance case, the Wisconsin Right to Life (WRTL) decision (see Mid-2004 and After). The Hillary film was envisioned from the outset to serve multiple purposes: to advance conservative ideology, damage Clinton’s presidential chances (despite Bossie’s claims), and generate profits. Bopp knows that the FEC would likely classify the film as a political advertisement and not a work of journalism or entertainment (see August 6, 2004), and therefore would fall under campaign law restrictions. Before the film is officially released, Bopp takes the film to the FEC for a ruling, and when the FEC, as expected, rules the film to be “electioneering communication” that comes under campaign law restrictions, Bopp files a lawsuit with the Washington, DC, federal district court. The court rules in favor of the FEC judgment, denying CU its request for a preliminary injunction against the FEC’s ruling. The court specifically finds that the WRTL decision does not apply in this case. “[I]f the speech cannot be interpreted as anything other than an appeal to vote for or against a candidate, it will not be considered genuine issue speech even if it does not expressly advocate the candidate’s election or defeat,” the court states. The court also questions CU’s statement that the film “does not focus on legislative issues.… The movie references the election and Senator Clinton’s candidacy, and it takes a position on her character, qualifications, and fitness for office.” Film commentator Dick Morris has said of the film that it will “give people the flavor and an understanding of why she should not be president.” The court rules, “The movie is susceptible of no other interpretation than to inform the electorate that Senator Clinton is unfit for office, that the United States would be a dangerous place in a President Hillary Clinton world, and that viewers should vote against her.” (During arguments, Bopp says that the film is much like what a viewer would see on CBS’s evening news show 60 Minutes, and Judge Royce Lamberth laughs aloud, saying: “You can’t compare this to 60 Minutes. Did you read this transcript?” Other judges find it problematic that one of the film’s central “issues” is its assertion that Clinton is, in Bopp’s words, “a European socialist,” but still claims not to be overtly partisan.) [Mother Jones, 1/13/2008; United States District Court for the District Of Columbia, 1/15/2008; Richard Hasen, 1/15/2008; New Yorker, 5/21/2012]
Supreme Court Appeal - CU appeals the court’s decision directly to the Supreme Court. Bossie soon decides to replace Bopp with Olson, a far more prominent figure in conservative legal circles. Toobin will write: “Ted Olson had argued and won Bush v. Gore (see 9:54 p.m. December 12, 2000), and was rewarded by President Bush with an appointment as solicitor general. Olson had argued before the Supreme Court dozens of times, and he had a great deal of credibility with the justices. He knew how to win.” [Richard Hasen, 1/15/2008; New Yorker, 5/21/2012]
Previous Attempt - In September 2004, Bossie and CU attempted, without success, to release a similar “documentary” supporting President Bush and attacking Democratic presidential candidate John Kerry (D-MA) on television, just weeks before the presidential election. The FEC turned down the group’s request. The FEC did allow the film to be shown in theaters (see September 8, 2004 and September 27-30, 2004).
'Ten-Year Plan' - Bopp will later reveal that the lawsuit is part of what he will call a “10-year plan” to push the boundaries of campaign finance law, and that he urged Bossie and other CU officials to use the documentary as a “test case” for overturning the body of law (see January 25, 2010).

Entity Tags: William Jefferson (“Bill”) Clinton, Kathleen Willey, Megan Carpentier, Theodore (“Ted”) Olson, New York Times, Michael Moore, John McCain, Royce Lamberth, James Bopp, Jr, Dick Morris, Gary Aldrich, Barack Obama, Bush administration (43), Hillary Clinton, Citizens United, David Bossie, Federal Election Commission, Clinton administration

Timeline Tags: Civil Liberties, 2008 Elections

Director of National Intelligence Michael McConnell says that the 9/11 hijackers could not be monitored in the US because they did not commit any crimes. He says in a speech: “[I]f Mohamed Atta had been in Pakistan and we were tracking him, some way to track him—he went to Turkey, went to Europe, got over to Canada, we’d track him as foreign intelligence target, and he crosses into the United States, he’s now a US person; he gets all of the rights and privileges that you get. He’s invisible to your intelligence community. As long as he doesn’t break the law, law enforcement can’t conduct surveillance because they don’t have a probable cause. Al-Qaeda recognized that and that is why 9/11 happened in my view.” [Director of National Intelligence, 1/17/2008 pdf file] The 9/11 hijackers committed various offenses for which they could have been arrested in the US, such as lying on visa application forms (see August 29, 2001), overstaying their visas (see January 18, 2001, May 20, 2001 and January 10, 2001), driving without a license (note: a warrant for Mohamed Atta’s arrest was even issued in the summer of 2001—see June 4, 2001), and having a known role in blowing up the USS Cole, thereby murdering 17 US servicemen (see Around October 12, 2000). The Foreign Intelligence Surveillance Act was also specifically designed so that the FBI and other agencies could monitor agents of foreign powers in the US even if they did not commit a crime (see 1978).

Entity Tags: Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Mike McConnell, Mohamed Atta, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The House of Representatives votes to hold White House Chief of Staff Joshua Bolten and former White House counsel Harriet Miers in contempt of Congress. Bolten and Miers have refused to testify to a House committee investigating the firing of several US attorneys. Many House Republicans walk off the House floor before the vote is cast, ostensibly because they want to work on reauthorizing the Protect America Act (see August 5, 2007) rather than deal with the contempt citation. Minority Leader John Boehner complains, “We have space on the calendar today for a politically charged fishing expedition, but no space for a bill that would protect the American people from terrorists who want to kill us.” [Associated Press, 2/14/2008] “We will not stand for this, and we will not stay for this. And I would ask my House Republican colleagues and those who believe we should be protecting the American people, to not vote on this bill. Let’s just get up and leave.” [Think Progress, 2/14/2008] (Before they walk out, Lincoln Diaz-Balart (R-FL) attempts to disrupt the memorial service for the recently deceased Tom Lantos (D-CA), taking place in Statuary Hall just a few steps from the House chambers, by calling for a procedural vote during the memorial service. An MSNBC reporter says Diaz-Balart’s action is apparently the result of “pique.”) [MSNBC, 2/14/2008] The contempt citation will be forwarded to the US Attorney for the District of Columbia. The two resolutions passed hold Bolten and Miers in contempt, and allow for the House to file a civil suit against the Bush administration to compel the aides’ testimony. “I hope this administration will realize this Congress is serious about its constitutional role of oversight,” says House Speaker Nancy Pelosi (D-CA). Pelosi says she “had hoped that this day would never have come,” and adds that if the White House instructs Justice Department attorneys not to prosecute the contempt citations, “we will have power to go to federal court and seek civil enforcement of our subpoenas.” [The Hill, 2/14/2008; Associated Press, 2/14/2008]
White House Conditions 'Beyond Arrogance' - The White House has already said it will not allow the Justice Department to pursue the contempt charges, claiming that the information is off-limits because of executive privilege, and that Bolten and Miers are immune from prosecution. House Democrats such as Judiciary Committee chairman John Conyers (D-MI) had tried for months to work with the White House to win its approval for the aides’ testimony, but were unwilling to accept the White House’s restrictive conditions—investigators would not have been allowed to make transcripts of the testimony, to copy documents presented in the testimony, or to seek any more information after the single session. Pelosi said of the White House’s conditions, “This is beyond arrogance. It’s hubris taken to the ultimate degree.”
Republicans Say Testimony Would 'Undermine' Power of Executive Branch - Republicans such as David Dreier (R-CA) warn that such a case might “undermine the power of the first [executive] branch of government.” [The Hill, 2/14/2008; Associated Press, 2/14/2008]
Miller: Bush Attempting to 'Decide by Decree' - Representative Brad Miller (D-NC) says during the deliberations, “The president cannot decide by decree. The president cannot announce with absolute unreviewable authority what information the administration will provide or withhold. The framers of our Constitution had just fought a war against an autocratic king. It is inconceivable that they intended to create an executive branch with the power the Bush administration now claims and that the minority now supports.” [Speaker of the House, 2/14/2008]

Entity Tags: Harriet E. Miers, Bush administration (43), John Boehner, Joshua Bolten, Brad Miller, US Department of Justice, Tom Lantos, Nancy Pelosi

Timeline Tags: Civil Liberties

Admiral Mike McConnell, the director of national intelligence, admits during a radio interview that the main issue over the renewal of the Protect America Act (PAA) (see August 5, 2007) is not the security and safety of the nation, but the need to extend liability immunity to the nation’s telecommunications firms. In recent days, President Bush has said that unnamed terrorists are planning attacks on the US that will make 9/11 “pale by comparison,” and the only way to stop those attacks is to renew the PAA with new provisions that will grant telecommunications firms such as BellSouth, Verizon, and AT&T retroactive immunity from prosecution. Those firms are accused of illegally aiding the government in electronically monitoring the telephone and e-mail conversations of US citizens (see February 5, 2006). The PAA expires on February 16, but the government can operate under its provisions for another year. McConnell tells a National Public Radio reporter that the biggest issue surrounding the legislation is liability protection for the telecom firms. “We can’t do this mission without their help,” he says. “Currently there is no retroactive liability protection for them. They’re being sued for billions of dollars.” They did not break the law, McConnell asserts, but the lawsuits are curtailing their willingness to cooperate with the government. “The Senate committee that passed the bill examined the activities of the telecom companies and concluded they were not violating the law,” he says. By not extending retroactive immunity, McConnell says, “we’d lose the capability to protect the country.” [National Public Radio, 2/15/2008] Two days later, McConnell echoes his unusually frank admission. Interviewed on Fox News, he says: “Let me make one other point just—very important. The entire issue here is liability protection for the carriers. And so the old law and extended law are an expired law if we don’t have retroactive liability protection for the carriers. They are less inclined to help us, and so their support.… And therefore, we do not have the agility and the speed that we had before to be able to move and try to capture [terrorists’] communications to thwart their planning.” He also implies that the argument against granting immunity—if the telecoms’ actions were legal in the first place then they wouldn’t need immunity—is valid. Interviewer Chris Wallace says: “Isn’t the central issue here that you’ve lost your power to compel telecommunications companies to cooperate with you and also your ability to offer them legal immunity? Again, the Democrats would say, ‘Look, if the cooperation is legal, they don’t need legal immunity.’” McConnell replies: “Exactly right. The issue now is there’s uncertainty because the law has expired and the law of August, the Protect America Act, allowed us to compel—compel—support from a private carrier. That’s now expired.… [T]he private sector, although willingly helped us [sic] in the past, are now saying, ‘You can’t protect me. Why should I help you?’” Interestingly, after all of the talk of imminent terror attacks, when Wallace asks, “Do you believe al-Qaeda is more of a threat now than any time since 9/11?” McConnell says flatly: “No. Following 9/11, al-Qaeda’s leadership and operatives were degraded probably two-thirds or three-quarters.” House Majority Leader Steny Hoyer (D-MD) responds that the administration’s attempt to tie the renewal of the PAA into the threat of future terrorist attacks is “wrong, divisive and nothing but fear-mongering.” Senator Edward Kennedy (D-MA) adds that McConnell’s “latest comments show yet again the shamelessness of the administration’s tactics.” [Fox News, 2/17/2008]

Entity Tags: Protect America Act, BellSouth, Al-Qaeda, AT&T, Chris Wallace, George W. Bush, Edward M. (“Ted”) Kennedy, Verizon Communications, Steny Hoyer, Mike McConnell

Timeline Tags: Civil Liberties

The Protect America Act (PAA—see August 5, 2007) expires today. Congress has refused to pass a reauthorization of the legislation that contains a provision to grant retroactive immunity to US telecommunications firms to protect them from lawsuits arising from their previous cooperation with government eavesdroppers (see February 5, 2006). President Bush has warned for days that by refusing to reauthorize the bill, Congress is leaving the US “more in danger of attack.” The surveillance elements of the PAA will continue in force for another year after its passage even as the PAA itself expires, so the government’s capability to use electronic surveillance against suspected terrorists and citizens alike continues unabated through August 2008.
Republican Reaction - House Minority Leader John Boehner (R-OH) warns, “This is a grave problem, and the Democrat leaders ought to be held accountable for their inaction.” Senate Minority Leader Mitch McConnell (R-KY) says, “The companies have been waiting for six months for retroactive liability” protection. “They are under pressure from their directors, pressure from their shareholders, and you’re jeopardizing the entire existence of the company by continuing to do this.”
Democratic Reaction - But House Democrats seem to be in no mood to give in to Bush’s rhetoric. Speaker of the House Nancy Pelosi (D-CA) says Bush is “misrepresenting the facts on our nation’s electronic-surveillance capabilities.” “There is no risk the program will go dark,” says Silvestre Reyes (D-TX), chairman of the House Intelligence Committee. Many Democrats accuse the administration of putting the interests of telecom firms over national security—accusations that intensify after Bush’s Director of National Intelligence, Mike McConnell, admitted that the real issue behind the reauthorization is the immunity for telecoms (see February 15-17, 2008). Senator Edward Kennedy (D-MA) says that the entire argument is “nothing more than a scare tactic designed to avoid legal and political accountability and keep Americans in the dark about the administration’s massive lawbreaking.” House member Tim Walz (D-MN) says, “Coming from a military background, I sure don’t downplay that there are threats out there, but the president’s demagoguery on this is the equivalent of the boy crying wolf.” And Rahm Emanuel (D-IL), the head of the House Democratic Caucus, says bluntly: “This is not about protecting Americans. The president just wants to protect American telephone companies.”
Previous Depiction - When the law was signed into effect August 5, 2007, it was portrayed by the White House as “a temporary, narrowly focused statute to deal with the most immediate needs of the intelligence community to protect the country.” Now it is being portrayed by Bush officials as the cornerstone of the nation’s terrorist-surveillance program. The issue is sure to resurface when Congress returns from a week-long break in late February. [Associated Press, 2/14/2008; Washington Post, 2/16/2008]

Entity Tags: Nancy Pelosi, Mike McConnell, John Boehner, George W. Bush, Edward M. (“Ted”) Kennedy, Mitch McConnell, Protect America Act, Rahm Emanuel, Silvestre Reyes, Tim Walz

Timeline Tags: Civil Liberties

Director of National Intelligence Mike McConnell and Attorney General Michael Mukasey pen a letter to Silvestre Reyes (D-TX, the chairman of the House Intelligence Committee, claiming that because the Democratically led Congress has allowed the Protect America Act (PAA) to expire (see February 16, 2008), the government is losing critically needed intelligence on potential terrorist threats. McConnell and Mukasey do not include any evidence of the claim in their letter. In the six days since the PAA expired, the two write, some of the government’s “partners” in intelligence operations—US telecommunications firms—have “reduced [their] cooperation” in the government’s warrantless wiretapping program. The two officials do not name which firms they say have cut back on their cooperation. The telecom firms are more reluctant to continue their cooperation with the government because they do not have retroactive legal immunity from civil and criminal charges for their cooperation in the past. The Bush administration and Congressional Republicans allowed the PAA to expire rather than approve an extension of the law that did not include an immunity clause (see February 23, 2008). In their letter, McConnell and Mukasey claim that since the Protect America Act lapsed, telecom firms “have delayed or refused compliance with our requests to initiate new surveillances of terrorist and other foreign intelligence targets under existing directives issued pursuant to the Protect America Act.” They add, “Although most partners intend to cooperate for the time being, they have expressed deep misgivings about doing so in light of the uncertainty and have indicated that they may well cease to cooperate if the uncertainty persists.” McConnell and Mukasey write that if Congress does not extend immunity to the telecom firms, the firms will continue to be reluctant to cooperate with the surveillance program: “This uncertainty may well continue to cause us to miss information that we otherwise would be collecting.” A day later, the two retract their claim (see February 23, 2008). Reyes and other Democrats have accused the administration of exaggerating the claims of threats to national security because of their refusal to grant the telecoms immunity; some have accused the administration of “fearmongering” and employing “scare tactics.” [Newsweek, 2/22/2008; Newsweek, 2/22/2008; Politico, 2/22/2008]
Democrats Take 'Strong Offense' to Charges - In a joint statement, Reyes, Senator John D. Rockefeller (D-WV), and other Democrats respond to McConnell and Mukasey’s letter: “Further politicizing the debate, the administration today announced that they believe there have been gaps in security since the Protect America Act expired. They cannot have it both ways; if it is true that the expiration of the PAA has caused gaps in intelligence, then it was irresponsible for the president and congressional Republicans to openly oppose an extension of the law. Accordingly, they should join Democrats in extending it until we can resolve our differences.” [Newsweek, 2/22/2008] Reyes says: “President Bush has just been spoiled dealing with the Republican-controlled Congress before. I take strong offense at the president’s comments that somehow we’re less safe because the Protect America Act expired.” [Politico, 2/22/2008]
Republicans Refuse to Discuss Legislation - Democratic staffers in the House and Senate Intelligence Committees meet today to discuss how to iron out difference between the two chambers’ version of the proposed extension of the PAA; Republican aides refuse to attend. [Associated Press, 2/23/2008] Democrats also charge that, contrary to administration claims of wanting to work with Congress to pass an acceptable update to the law, the White House has refused to supply lawmakers with documents they have requested pertaining to the extension. [Politico, 2/22/2008]

Entity Tags: Mike McConnell, Protect America Act, House Intelligence Committee, Michael Mukasey, Bush administration (43), Silvestre Reyes, John D. Rockefeller

Timeline Tags: Civil Liberties

President Bush again demands that Congress reinstate the Protect America Act (PAA) (see August 5, 2007), with new provisions providing the nation’s telecommunications industry retroactive legal immunity from criminal and civil prosecution for possible crimes committed in the administration’s domestic wiretapping program (see May 12, 2006). Bush says that without such immunity, US telecom firms will be reluctant to help the administration spy on potential terrorists. The PAA is a central part of the legislative update of the 1978 Foreign Intelligence Surveillance Act (FISA) (see 1978) which mandates that any wiretaps must receive the approval of the FISA Court. Bush insists that he will veto an update to FISA without the immunity provisions, even as he asserts the country is at risk of further terrorist attacks without the FISA updates, and after letting the PAA lapse without signing an extension of the legislation into law. However, Bush blames Congress for not passing the FISA update with an immunity clause: “Congress’ failure to pass this legislation was irresponsible,” he says. “In other words, the House’s refusal to act is undermining our ability to get cooperation from private companies. And that undermines our efforts to protect us from terrorist attack.” He explains why the Democrats don’t want his bill: “House leaders are blocking this legislation, and the reason can be summed up in three words: class action lawsuits.” A spokesman for Congressional Democrats retorts: “They cannot have it both ways. If it is true that the expiration of the [surveillance law] has caused gaps in intelligence, then it was irresponsible for the president and Congressional Republicans to openly oppose an extension of the law.”
Democrats Put Trial Lawyers Before National Security? - Bush says: “The Senate bill would prevent plaintiffs’ attorneys from suing companies believed to have helped defend America after the 9/11 attacks. More than 40 of these lawsuits have been filed, seeking hundreds of billions of dollars in damages from these companies.… It is unfair and unjust to threaten these companies with financial ruin only because they are believed to have done the right thing and helped their country.” The lawsuits (see June 26, 2006) seek damages based upon violations of FISA, the Wiretap Act, the Communications Act, and the Stored Communications Act, among other laws. Bob Edgar of Common Cause says neither money nor punishment is the issue: “Innocent Americans who have had their rights violated by the telecoms deserve their day in court. If these companies did nothing wrong, then they have nothing to fear.” Bush is apparently attempting to refocus the issue as an attack on trial lawyers—traditionally a group supportive of Democrats—in saying: “Members of the House have a choice to make: They can empower the trial bar—or they can empower the intelligence community. They can help class action trial lawyers sue for billions of dollars—or they can help our intelligence officials protect millions of lives. They can put our national security in the hands of plaintiffs’ lawyers—or they can entrust it to the men and women of our government who work day and night to keep us safe.” House member John Conyers (D-MI) calls such characterizations “irresponsible” and “inaccurate.” [CBS News, 2/23/2008]

Entity Tags: Protect America Act, John Conyers, Foreign Intelligence Surveillance Court, Mike McConnell, George W. Bush, Michael Mukasey, Common Cause, Bob Edgar, Foreign Intelligence Surveillance Act, Dana Rohrbacher

Timeline Tags: Civil Liberties

Representative Peter Hoekstra (R-MI) pens a blistering op-ed for the conservative National Review that accuses House Democrats of allowing the Protect America Act to expire (PAA—see February 16, 2008) and thereby endangering the country by leaving it unprotected against terrorist attacks. This is the same argument President Bush and Republicans have advanced in recent days in favor of continued warrantless wiretapping (see February 23, 2008). Hoekstra calls the Democrats’ action “unprecedented irresponsibility.” The “burdensome paperwork, government lawyers, and court orders” that implementing wiretaps will now engender, Hoekstra writes, “could mean the difference in stopping a terrorist plot or saving the life of an American soldier.” Hoekstra quickly turns to another key agenda for reauthorizing the PAA—providing retroactive immunity from lawsuits for American telecommunications firms. He echoes the arguments of Bush and other officials such as Attorney General Michael Mukasey and Director of National Intelligence Mike McConnell (see February 22, 2008) by writing that without such immunity, “these companies obviously will be reluctant to cooperate with the government in the future.” But Hoekstra takes the argument even farther, equating the Democrats’ refusal to reauthorize the PAA with their support from trial lawyers, who “have contributed more $1.5 million to Democrat coffers.” He then says that US intelligence agents will suffer because, he asserts, “many of [them] have been forced to take out professional liability insurance to protect them from the actions of the Democratic Congress.” Hoekstra claims that Democrats consistently favor working to investigate global warming over protecting the nation. [National Review, 2/25/2008] Hoekstra continues the attack the next day with a piece in the Wall Street Journal co-authored with his House colleague Lamar Smith (R-TX) and his Senate colleague Christopher “Kit” Bond (R-MO). The three open this column with the rhetorical question, “Are Americans as safe today as they were before Congress allowed the Protect America Act to expire on Feb. 16?” and answer it with much the same arguments that Hoekstra advanced the day before. “We are less safe today and will remain so until Congress clears up the legal uncertainty for companies that assist in collecting intelligence for the government—and until it gives explicit permission to our intelligence agencies to intercept, without a warrant, foreign communications that pass through the US,” they claim. They also echo the claim asserted by McConnell and Mukasey that the nation’s intelligence community has lost valuable intelligence because of the lapse in legislation—without acknowledging that McConnell and Mukasey withdrew that claim within hours (see February 23, 2008). [Wall Street Journal, 2/26/2008]

Entity Tags: Michael Mukasey, Christopher (“Kit”) Bond, George W. Bush, Lamar Smith, Peter Hoekstra, Mike McConnell, Protect America Act

Timeline Tags: Civil Liberties

A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.
Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:
bullet The NSA’s domestic surveillance activities;
bullet The CIA’s use of rendition and torture against terrorist suspects;
bullet The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and
bullet The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).
Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.
Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.
'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.” “It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”
Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]

Entity Tags: Nancy Pelosi, Gregory Nojeim, Center for Democracy and Technology, American Civil Liberties Union, Barry Steinhardt, Bush administration (43), Common Cause, Jane Harman

Timeline Tags: Civil Liberties, Inslaw and PROMIS

The online news site Wired News reveals that a “whistleblower” is alleging that the US government has had direct, high-speed access to a major wireless carrier’s systems, exposing US citizens’ telephone calls, data transmissions, and even physical movements to potentially illegal government surveillance. Babak Pasdar, the CEO of Bat Blue and a former computer security consultant, says he worked for the unnamed carrier in late 2003. “What I thought was alarming is how this carrier ended up essentially allowing a third party outside their organization to have unfettered access to their environment,” Pasdar says. “I wanted to put some access controls around it; they vehemently denied it. And when I wanted to put some logging around it, they denied that.” According to Wired News, while Pasdar refuses to name the carrier, his claims are virtually identical to allegations made in a 2006 federal lawsuit against four telecommunications firms and the US government (see January 31, 2006); the suit named Verizon Wireless as taking actions similar to those claimed by Pasdar. Pasdar has provided an affidavit to the nonprofit Government Accountability Project (GAP), which has begun circulating the affidavit along with talking points to Congressional staffers. Congress is working on legislation that would grant retroactive immunity to telecommunications firms that worked with the government to illegally wiretap American citizens’ communications (see July 10, 2008). Pasdar says he learned of the surveillance in September 2003, when he led a team hired to revamp security on the carrier’s internal network. When he asked about a so-called “Quantico Circuit” linking its network to an unnamed third party, the carrier’s officials became uncommunicative (see September 2003). Quantico is the center of the FBI’s electronic surveillance operations. “The circuit was tied to the organization’s core network,” Pasdar writes in his affidavit. “It had access to the billing system, text messaging, fraud detection, Web site, and pretty much all the systems in the data center without apparent restrictions.” The “Quantico Circuit” was unshielded, which would have given the recipient unfettered access to customer records, data, and information. Pasdar tells a Wired News reporter, “I don’t know if I have a smoking gun, but I’m certainly fairly confident in what I saw and I’m convinced it was being leveraged in a less than forthright and upfront manner.” Verizon Wireless refuses to comment on Pasdar’s allegations, citing national security concerns. Representative John Dingell (D-MI), the chairman of the House Committee on Energy and Commerce, writes in response: “Mr. Pasdar’s allegations are not new to the Committee on Energy and Commerce, but our attempts to verify and investigate them further have been blocked at every turn by the administration. Moreover, the whistleblower’s allegations echo those in an affidavit filed by Mark Klein (see December 15-31, 2005 and July 7, 2009), a retired AT&T technician, in the Electronic Frontier Foundation’s lawsuit against AT&T.… Because legislators should not vote before they have sufficient facts, we continue to insist that all House members be given access to the necessary information, including the relevant documents underlying this matter, to make an informed decision on their vote. After reviewing the documentation and these latest allegations, members should be given adequate time to properly evaluate the separate question of retroactive immunity.” [Wired News, 3/6/2008] Klein will assist Pasdar in writing a letter opposing immunity for the telecom firms based on Pasdar’s evidence, a letter which GAP provides to newspapers across the country. However, Klein will write, only a few smaller newspapers will publish the letter. [Klein, 2009, pp. 103]

Entity Tags: Wired News, Babak Pasdar, Government Accountability Project, Mark Klein, John Dingell, Verizon Wireless

Timeline Tags: Civil Liberties

The Supreme Court dismisses an appeal by the political advocacy group Citizens United (CU) that argued the group’s First Amendment rights had been violated by the Federal Election Commission (FEC). The Court had agreed to hear CU’s case that it should be allowed to broadcast a partisan political documentary about Democratic presidential candidate Hillary Clinton, Hillary: The Movie, on cable television networks in the days before critical primary elections (see January 10-16, 2008). The Court did not rule on the merits of the case, but instead ruled that CU should have filed its case first with the federal appeals court in Washington. The ruling does not dismiss the case entirely, but makes it unlikely that the Court will rule on the campaign law issues surrounding the case (see March 27, 2002) before the November 2008 elections. Lawyer James Bopp, representing CU, says, “It is our intention to get the case expeditiously resolved on the merits in the district court, and then if we are unsuccessful there, to appeal” again to the Court. Bopp accuses Justice Department lawyers of trying to slow down the case to prevent it being resolved before the election. CU also wants to release a similar documentary about the other leading Democratic presidential contender, Barack Obama (D-IL—see October 28-30, 2008), in a similar fashion to its planned widespread release of the Clinton film. Justice Stephen Breyer, one of the Court’s more liberal members, says in the order dismissing the appeal that had the case been taken up, he would have affirmed the previous decision in favor of the FEC. None of the other justices made any public statement about the case. The case will be heard by the Washington, DC, federal appeals court. [Christian Science Monitor, 3/24/2008] The appeals court will find against CU, and the organization will reapply to the Court for a hearing, an application which will be granted (see March 15, 2009).

Entity Tags: James Bopp, Jr, Barack Obama, Citizens United, Federal Election Commission, Hillary Clinton, US Department of Justice, US Supreme Court, Stephen Breyer

Timeline Tags: Civil Liberties

The American Civil Liberties Union learns of another Justice Department memo in a Freedom of Information Act (FOIA) response that produces a 2003 memo supporting the use of torture against terror suspects (see April 1, 2008). This 2001 memo (see October 23, 2001), says that the Constitution’s protections against unreasonable searches and seizures—fundamental Fourth Amendment rights—do not apply in the administration’s efforts to combat terrorism. The Bush administration now says it disavows that view.
Background - The memo was written by John Yoo, then the deputy assistant attorney general, and the same lawyer who wrote the 2003 torture memo. It was written at the request of the White House and addressed to then-Attorney General Alberto Gonzales. The administration wanted a legal opinion on its potential responses to terrorist activity. The 37-page memo itself has not yet been released, but was mentioned in a footnote of the March 2003 terror memo. “Our office recently concluded that the Fourth Amendment had no application to domestic military operations,” the footnote states, referring to a document titled “Authority for Use of Military Force to Combat Terrorist Activities Within the United States.”
Relationship to NSA Wiretapping Unclear - It is not clear exactly what domestic military operations the October memo covers, but federal documents indicate that the memo relates to the National Security Agency’s Terrorist Surveillance Program (TSP). The TSP began after the 9/11 attacks, allowing for warrantless wiretaps of phone calls and e-mails, until it stopped on January 17, 2007, when the administration once again began seeking surveillance warrants from the Foreign Intelligence Surveillance Court (see May 1, 2007). White House spokesman Tony Fratto says that the October 2001 memo is not the legal underpinning for the TSP. Fratto says, “TSP relied on a separate set of legal memoranda” outlined by the Justice Department in January 2006, a month after the program was revealed by the New York Times (see February 2001, After September 11, 2001, and December 15, 2005). Justice Department spokesman Brian Roehrkasse says department officials do not believe the October 2001 memo was about the TSP, but refuses to explain why it was included on FOIA requests for documents linked to the TSP.
No Longer Applicable - Roehrkasse says the administration no longer holds the views expressed in the October 2001 memo. “We disagree with the proposition that the Fourth Amendment has no application to domestic military operations,” he says. “Whether a particular search or seizure is reasonable under the Fourth Amendment requires consideration of the particular context and circumstances of the search.” The ACLU’s Jameel Jaffer is not mollified. “The recent disclosures underscore the Bush administration’s extraordinarily sweeping conception of executive power,” he says. “The administration’s lawyers believe the president should be permitted to violate statutory law, to violate international treaties and even to violate the Fourth Amendment inside the US. They believe that the president should be above the law.” He continues, “Each time one of these memos comes out you have to come up with a more extreme way to characterize it.” The ACLU has filed a court suit to challenge the government’s withholding of the memo. [Associated Press, 4/3/2008] Another civil rights group, the Electronic Frontier Foundation, joins the ACLU in challenging the memo (see April 2, 2008).

Entity Tags: Jameel Jaffer, Brian Roehrkasse, American Civil Liberties Union, Alberto R. Gonzales, Bush administration (43), Foreign Intelligence Surveillance Court, Terrorist Surveillance Program, US Department of Justice, John C. Yoo, Electronic Frontier Foundation, Tony Fratto

Timeline Tags: Civil Liberties

Retired AT&T “whistleblower” Mark Klein (see December 15-31, 2005 and July 7, 2009) has a short essay published in Wired News, sharply criticizing the recently passed legislation that amended the Foreign Intelligence Surveillance Act (FISA—see July 10, 2008) and granted telecommunications firms immunity from prosecution for helping government agencies illegally spy on American citizens. Klein initially offered the essay in letter form to the New York Times, but although the editors there showed what Klein will call “some interest,” they rejected the letter. Instead, Wired News’s Ryan Singel accepted the letter for one of his “Threat Level” columns. Singel describes Klein as “furious” at the vote, and quotes Klein: “[Wednesday]‘s vote by Congress effectively gives retroactive immunity to the telecom companies and endorses an all-powerful president. It’s a Congressional coup against the Constitution. The Democratic leadership is touting the deal as a ‘compromise,’ but in fact they have endorsed the infamous Nuremberg defense: ‘Just following orders.’ The judge can only check their paperwork. This cynical deal is a Democratic exercise in deceit and cowardice.… Congress has made the FISA law a dead letter—such a law is useless if the president can break it with impunity. Thus the Democrats have surreptitiously repudiated the main reform of the post-Watergate era and adopted Nixon’s line: ‘When the president does it that means that it is not illegal.’ This is the judicial logic of a dictatorship. The surveillance system now approved by Congress provides the physical apparatus for the government to collect and store a huge database on virtually the entire population, available for data mining whenever the government wants to target its political opponents at any given moment—all in the hands of an unrestrained executive power. It is the infrastructure for a police state.” [Wired News, 6/27/2008; Klein, 2009, pp. 108]

Entity Tags: Mark Klein, Foreign Intelligence Surveillance Act, Wired News, Ryan Singel

Timeline Tags: Civil Liberties

President Bush signs the FISA Amendments Act of 2008 (FAA), a revamping and expansion of the original Foreign Intelligence Surveillance Act (see 1978). The legislation passed the House by a sweeping 293 to 129 votes, with most Democratic Congressional leaders supporting it over the opposition of the more liberal and civil liberties-minded Democrats. Republicans were almost unanimously supportive of the bill. Though Democratic Senators Russell Feingold (D-WI) and Christopher Dodd (D-CT) managed to delay the bill’s passage through the Senate, their attempt to modify the bill was thwarted by a 66-32 margin. (Dodd credits AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) as one of the very few people to make the public aware of the illegal NSA wiretapping program, which the FISA amendment would protect. Without Klein, Dodd states, “this story might have remained secret for years and years, causing further erosion of our rights.”) Senator Barack Obama (D-IL), the party’s presumptive presidential nominee, gave his qualified support to the bill, stating: “Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise, but do so with a firm pledge that as president, I will carefully monitor the program.” Obama had opposed an earlier Senate version that would have given “blanket immunity” to the telecommunications companies for their participation in the illegal NSA wiretapping program (see December 15, 2005). House Speaker Nancy Pelosi (D-CA), who organized Democratic support for the bill in the House, said that she supported the bill primarily because it rejects Bush’s argument that a wartime chief executive has the “inherent authority” to conduct some surveillance activity he considers necessary to fight terrorism. It restores the legal notion that the FISA law is the exclusive rule on government spying, she said, and added: “This is a democracy. It is not a monarchy.” Feingold, however, said that the bill granted “retroactive immunity to the telecommunications companies that may have engaged in President Bush’s illegal wiretapping program.” The amendments restore many of the provisions of the expired Protect America Act (PAA—see August 5, 2007) that drastically modify the original FISA legislation and grant the government broad new surveillance powers. Like the PAA, the FAA grants “third parties” such as telecommunications firms immunity from prosecution for engaging in illegal surveillance of American citizens if they did so in partnership with government agencies such as the National Security Agency (NSA). [Washington Post, 6/20/2008; CNN, 6/26/2008; US Senate, 7/9/2008; White House, 7/10/2008; Klein, 2009, pp. 95-97] Senate Majority Leader Harry Reid (D-NV) actually refused to honor a “hold” placed on the bill by Dodd, a highly unusual move. Klein will later note that Reid has in the past always honored holds placed on legislation by Republicans, even if Democrats were strongly supportive of the legislation being “held.” Klein will write that Pelosi crafted a “showpiece” FISA bill without the immunity provisions, garnering much praise for her from civil liberties organizations; however, Pelosi’s colleague House Majority Leader Steny Hoyer (D-MD) had secretly worked with the White House to craft a bill that preserved immunity for telecoms, and on June 10, Pelosi “rammed” that bill through the House. The final bill actually requires the judiciary to dismiss lawsuits brought against telecom firms if those firms can produce evidence that they had worked in collusion with the NSA. Feingold later observes that the final bill is not a “compromise, it is a capitulation.” [Klein, 2009, pp. 101-103] Klein will write that Democrats and Republicans have worked together to “unw[ind] one of the main reforms of the post-Watergate era and accepted the outrageous criminal rationalizations of [President] Nixon himself.” Klein will quote Nixon as saying, “If the president does it, that means it’s not illegal” (see April 6, 1977), and will say that is “the essence of the FISA ‘compromise’” and turned Congress into the White House’s “rubber stamp.… It is the twisted judicial logic of a dictatorship.” [Klein, 2009, pp. 107]

Entity Tags: Nancy Pelosi, Foreign Intelligence Surveillance Act, FISA Amendments Act of 2008, Christopher Dodd, Barack Obama, George W. Bush, Mark Klein, Russell D. Feingold, Richard M. Nixon, Harry Reid, Steny Hoyer, National Security Agency, Protect America Act

Timeline Tags: Civil Liberties

The Electronic Frontier Foundation (EFF) files a lawsuit challenging the constitutionality of the recently passed amendment to the Foreign Intelligence Surveillance Act (FISA—see July 10, 2008). The EFF is particularly concerned with the portion of the legislation that grants retroactive immunity from prosecution to telecommunications firms that worked with government agencies to illegally conduct electronic surveillance against American citizens (see December 15, 2005). The FISA Amendments Act of 2008, or FAA, violates the Constitution’s separation of powers, according to the EFF, and, the organization writes, “robs innocent telecom customers of their rights without due process of law.” The lawsuit was triggered by Attorney General Michael Mukasey’s recent submission of a classified certification in another EFF lawsuit about illegal electronic certification (see January 31, 2006) that claimed the electronic surveillance conducted on behalf of the National Security Agency by AT&T did not happen. EFF senior attorney Kevin Bankston says: “The immunity law puts the fox in charge of the hen house, letting the attorney general decide whether or not telecoms like AT&T can be sued for participating in the government’s illegal warrantless surveillance. In our constitutional system, it is the judiciary’s role as a co-equal branch of government to determine the scope of the surveillance and rule on whether it is legal, not the executive’s. The attorney general should not be allowed to unconstitutionally play judge and jury in these cases, which affect the privacy of millions of Americans.” Mukasey’s certification claimed the government has no “content-dragnet” program that surveills millions of domestic communications, though it does not deny having acquired such communications. EFF has provided the court with thousands of pages of documents proving the falsity of Mukasey’s assertions, the organization writes. EFF attorney Kurt Opsahl says: “We have overwhelming record evidence that the domestic spying program is operating far outside the bounds of the law. Intelligence agencies, telecoms, and the administration want to sweep this case under the rug, but the Constitution won’t permit it.” EFF spokesperson Rebecca Jeschke tells a reporter that the FAA “violates the federal government’s separation of powers and violates the Constitution. We want to make sure this unconstitutional law does not deny telecom customers their day in court. They have legitimate privacy claims that should be heard by a judge. Extensive evidence proves the existence of a massive illegal surveillance program affecting millions of ordinary Americans. The telecoms broke the law and took part in this. The FISA Amendments Act and its immunity provisions were an attempt to sweep these lawsuits under the rug, but it’s simply unconstitutional.” EFF lawyers fear the FAA will render their lawsuit invalid. [Electronic Frontier Foundation, 10/17/2008; Salon, 10/17/2008] The EFF has filed a related lawsuit against the NSA and senior members of the Bush administration (see September 18, 2008).

Entity Tags: Foreign Intelligence Surveillance Act, Electronic Frontier Foundation, AT&T, FISA Amendments Act of 2008, Kevin Bankston, Kurt Opsahl, National Security Agency, Michael Mukasey, Rebecca Jeschke

Timeline Tags: Civil Liberties

Judge Vaughn Walker rules that “sufficient facts” exist to keep alive a lawsuit brought by the defunct Islamic charity Al Haramain, which alleges it was subjected to illegal, warrantless wiretapping by the US government (see February 28, 2006). The lawsuit centers on a Top Secret government document accidentally disclosed to plaintiffs’ lawyers Wendell Belew and Asim Ghafoo that allegedly proves the claim of illegal wiretapping; previous court rulings forced Belew and Ghafoo to return the document to the government and prohibited its use in the lawsuit. The lawsuit is widely viewed as a test case to decide in court whether the Bush administration abused its power by authorizing a secret domestic spying program (see Spring 2004 and December 15, 2005). Jon Eisenberg, the lawyer for Belew and Ghafoo, says it does not matter whether the case pertains to the Bush administration or the incoming Obama administration. “I don’t want President Obama to have that power any more than I do President Bush,” he says. Because the lawsuit contains sufficient evidence even without the Top Secret document, Walker rules, it can continue. “The plaintiffs have alleged sufficient facts to withstand the government’s motion to dismiss,” he writes. Therefore, he adds, the law demands that they be allowed to review the classified document, and others, to determine whether the lawyers were spied on illegally and whether Bush’s spy program was unlawful. “To be more specific, the court will review the sealed document ex parte and in camera,” Walker writes. “The court will then issue an order regarding whether plaintiffs may proceed—that is, whether the sealed document establishes that plaintiffs were subject to electronic surveillance not authorized by FISA” (the Foreign Intelligence Surveillance Act—see 1978). [Wired News, 1/5/2009]

Entity Tags: Vaughn Walker, Al Haramain Islamic Foundation, Asim Ghafoo, Jon Eisenberg, Bush administration (43), Wendell Belew, Foreign Intelligence Surveillance Act, Obama administration

Timeline Tags: Civil Liberties

Eric Holder.Eric Holder. [Source: New York Times]Incoming Attorney General Eric Holder says the Justice Department will defend the US’s warrantless eavesdropping program (see Spring 2004 and December 15, 2005) in court, based on Congress’s passage of legislation immunizing US telecommunications companies from lawsuits challenging their participation in the government spy program (see January 5, 2009). Holder makes this statement during Senate hearings to confirm his selection as attorney general. “The duty of the Justice Department is to defend statutes that have been passed by Congress,” Holder says. “Unless there are compelling reasons, I don’t think we would reverse course.” President-elect Obama, while a senator, opposed granting immunity to the telecommunications firms, but voted for immunity because it was included in a broader surveillance bill that gave the Bush administration broad new powers to eavesdrop on Americans without warrants. [Wired News, 1/15/2009]

Entity Tags: Barack Obama, US Department of Justice, Eric Holder, Bush administration (43)

Timeline Tags: Civil Liberties

As one of its last official acts, the Bush administration asks federal judge Vaughn Walker to stay his ruling that keeps alive a lawsuit testing whether a sitting president can bypass Congress and eavesdrop on Americans without warrants. The request, filed at 10:56 p.m. on President Bush’s last full day in office, asks Walker to stay his ruling and allow the federal government to appeal his ruling that allows the al-Haramain lawsuit to proceed (see February 28, 2006). The warrantless wiretapping alleged in the lawsuit took place in 2004, well before Congress’s 2008 authorization of the government’s spy program. The Obama administration’s incoming Attorney General, Eric Holder, says the Justice Department will defend the spy program because Congress made it legal (see January 15, 2009). It is not clear whether the Justice Department under Holder will continue to fight the Al Haramain lawsuit. The Bush administration wants Walker to reverse his decision to let plaintiffs’ lawyers Wendell Belew and Asim Ghafoo use a Top Secret document that was accidentally disclosed to them in 2004 (see January 5, 2009); that document, which allegedly proves the warrantless and illegal nature of the wiretapping performed against the Al Haramain charity, is at the center of the lawsuit. Previous rulings disallowed the use of the document and forced the defense lawyers to return it to the government, but Walker ruled that other evidence supported the claim of warrantless wiretapping, and therefore the document could be used. In its request for a stay, the Bush administration asserts that allowing the document to be used in the lawsuit would jeopardize national security, and that the document is protected under the state secrets privilege (see March 9, 1953). Administration lawyers say that Walker should not be allowed to see the document, much less the defense lawyers. “If the court were to find… that none of the plaintiffs are aggrieved parties, the case obviously could not proceed, but such a holding would reveal to plaintiffs and the public at large information that is protected by the state secrets privilege—namely, that certain individuals were not subject to alleged surveillance,” the administration writes in its request. If the lawsuit continues, the government says, that decision “would confirm that a plaintiff was subject to surveillance” and therefore should not be allowed: “Indeed, if the actual facts were that just one of the plaintiffs had been subject to alleged surveillance, any such differentiation likewise could not be disclosed because it would inherently reveal intelligence information as to who was and was not a subject of interest, which communications were and were not of intelligence interest, and which modes of communication were and were not of intelligence interest, and which modes of communication may or may not have been subject to surveillance.” Jon Eisenberg, the lawyer for Belew and Ghafoo, says: “We filed this lawsuit to establish a judicial precedent that the president cannot disregard Congress in the name of national security. Plaintiffs have a right to litigate the legality of the surveillance.” [Wired News, 1/20/2009]

Entity Tags: Jon Eisenberg, Asim Ghafoo, Al Haramain Islamic Foundation, Bush administration (43), Obama administration, Eric Holder, Wendell Belew, Vaughn Walker, US Department of Justice, George W. Bush

Timeline Tags: Civil Liberties

Constitutional lawyer and author Bruce Fein, a former official in the Justice Department under Ronald Reagan, writes that if President Obama wants to “restore the rule of law and to prevent future wrongdoing by high-level government officials,” he “should investigate, among others, former President George W. Bush, former Vice President Dick Cheney, former Defense Secretary Donald Rumsfeld, former Attorney General John Ashcroft, former White House counsel and Attorney General Alberto Gonzales, and former White House political adviser Karl Rove. The crimes to be investigated should include complicity in torture, illegal surveillance, illegal detention, perjury, obstruction of justice, and contempt of Congress. Prosecutions should follow if the evidence convinces a grand jury to indict.” Fein states that “[t]he best way to deter government criminality and to teach citizens the rule of law is to punish the perpetrators who are unanimously found guilty beyond a reasonable doubt by independent and impartial jurors.”
FBI, CIA Feared Prosecution for Torture - He notes that the FBI refused to participate in “enhanced interrogation techniques,” including waterboarding, for fear of being charged with war crimes. And the CIA required specific legal opinions from the Bush Justice Department—the so-called “golden shield” (see August 1, 2002)—and specific presidential authorization before it would allow its agents to torture detainees. And the White House ordered an end to waterboarding after it was warned that such tactics left its officials open to charges of torture and war crimes.
Attorney General Feared Prosecution under FISA - He goes on to note that Justice Department officials such as acting Attorney General James Comey “balked at approving… Bush’s warrantless surveillance program without modification in March 2004 probably because he feared criminal prosecution under the Foreign Intelligence Surveillance Act” (see 1978).
'Unpunished Lawlessness by Government Officials Invites Lawlessness Generally' - Fein asserts that “unpunished lawlessness by government officials invites lawlessness generally.” He quotes former Supreme Court Justice Louis Brandeis: “Decency, security, and liberty alike demand that government officials shall be subjected to the same rules of conduct that are commands to the citizen. In a government of laws, existence of the government will be imperiled if it fails to observe the law scrupulously. Our government is the potent, the omnipresent teacher. For good or for ill, it teaches the whole people by its example. Crime is contagious. If the government becomes a lawbreaker, it breeds contempt for law; it invites every man to become a law unto himself; it invites anarchy.” The best way to deter criminal behavior, he says, is to prosecute alleged criminals, and that process must start with government officials. [Washington Times, 1/20/2009]

Entity Tags: Bruce Fein

Timeline Tags: Civil Liberties

President Barack Obama, in the same sweeping set of executive orders that mandates the closure of the Guantanamo Bay detention facility and orders the closure of the CIA’s secret prisons (see January 22, 2009), orders that the US no longer torture prisoners. And in a broad repudiation of Bush administration policies and legal arguments, Obama’s order nullifies every single legal order and opinion on interrogations issued by any lawyer in the executive branch—including the Department of Justice—since September 11, 2001 (see Shortly After September 11, 2001, Late September 2001, October 23, 2001, Late October 2001, November 6-10, 2001, January 9, 2002, January 25, 2002, and April 2002 and After). “Key components of the secret structure developed under Bush are being swept away,” the Washington Post reports. Obama orders that all interrogations conducted by the CIA and other US officials strictly follow the procedures outlined in the US Army Field Manual. Retired Admiral Dennis Blair, Obama’s nominee to become the director of national intelligence, says that the government may revise the Field Manual to include more coercive interrogation techniques; a commission will be appointed to determine if the Field Manual is adequate. Currently the Field Manual limits interrogators to 19 approved techniques, bans torture, and prohibits harsh questioning techniques in favor of using psychological approaches. “I can say without exception or equivocation that the United States will not torture,” Obama tells a group of listeners at the State Department. “The message that we are sending the world is that the United States intends to prosecute the ongoing struggle against violence and terrorism and we are going to do so vigilantly and we are going to do so effectively and we are going to do so in a manner that is consistent with our values and our ideals,” he adds. The US will now “observe core standards of conduct, not just when it’s easy, but also when it’s hard.” [Agence France-Presse, 1/22/2009; Los Angeles Times, 1/23/2009; Washington Post, 1/23/2009] Tom Malinowski of Human Rights Watch says that he is certain Obama will not secretly authorize torture. Malinowski says that while Obama might oversee some changes in the Field Manual, he says that Obama will not renege on his promise that detainees would not be tortured or treated inhumanely. [Financial Times, 1/22/2009]

Entity Tags: Human Rights Watch, US Department of Justice, Central Intelligence Agency, Barack Obama, Tom Malinowski, Dennis C. Blair

Timeline Tags: Torture of US Captives, Civil Liberties

PBS’s Nova series broadcasts “The Spy Factory,” an examination of the National Security Agency’s domestic surveillance program. The program is crafted by author and national security expert James Bamford with PBS producer Scott Willis. One portion of the broadcast shows a representation of the enormous data flow of Internet communications entering the US from Asia at Morro Bay, California, and then goes to a small AT&T facility in San Luis Obispo. “If you want to tap into international communications, it seems like the perfect place is San Luis Obispo,” Bamford narrates. “That’s where 80 percent of all communications from Asia enters the United States.” However, the NSA taps into the AT&T datastream much farther north, in AT&T’s Folsom Street facility in San Francisco (see October 2003 and Late 2003). According to former AT&T technician Mark Klein (see July 7, 2009 and May 2004), the NSA would have far more access to domestic communications by tapping into the dataflow at the San Francisco facility. He will later write, “This fact belies the government’s claims that they’re only looking at international communications.” [Klein, 2009, pp. 50-51; PBS, 2/3/2009]

Entity Tags: Mark Klein, AT&T, James Bamford, Public Broadcasting System, National Security Agency, Scott Willis

Timeline Tags: Civil Liberties

A federal appeals court rejects the Obama administration’s assertion that a potential threat to national security should stop a lawsuit challenging the government’s warrantless wiretapping program. The Justice Department had requested an emergency stay in a case brought by a defunct Islamic charity, the Al Haramain Islamic Foundation (see February 28, 2006). Al Haramain has asked that classified information be made available to the court to prove its case that the electronic surveillance brought to bear against it by the government was illegal; Justice Department lawyers contend that the information needs to remain classified and unavailable to the court, and cite the “state secrets” privilege (see March 9, 1953) as legal justification. Although the court rejects the request for the stay, Justice Department lawyers say they will continue fighting to keep the information secret. “The government respectfully requests that the court refrain from further actions to provide plaintiffs with access to classified information,” says a filing made by the Justice Department in regards to the ruling. A lawyer for Al Haramain, Steven Goldberg, says: “All we wanted was our day in court and it looks like we’re finally going to get our day in court. This case is all about challenging an assertion of power by the executive branch which is extraordinary.” The American Civil Liberties Union’s Ann Brick says the court has now crafted a way to review the issue in which “national security isn’t put at risk, but the rule of law can still be observed.” [Associated Press, 2/27/2009] Days later, the Justice Department will file a brief announcing its intention to refuse to honor the appeals court’s decision (see March 2, 2009).

Entity Tags: Obama administration, Ann Brick, Steven Goldberg, US Department of Justice, Al Haramain Islamic Foundation

Timeline Tags: Civil Liberties

The US Supreme Court hears the case of Citizens United v. Federal Election Commission, in which the Federal Election Commission (FEC) refused to let the conservative lobbying organization Citizens United (CU) air a film entitled Hillary: The Movie during the 2008 presidential primary season (see January 10-16, 2008). The FEC ruled that H:TM, as some have shortened the name, was not a film, but a 90-minute campaign ad with no other purpose than to smear and attack Senator Hillary Clinton (D-NY) as being unfit to hold office. A panel of appeals judges agreed with the FEC’s ruling, which found the film was “susceptible of no other interpretation than to inform the electorate that Senator Clinton is unfit for office, that the United States would be a dangerous place in a President Hillary Clinton world, and that viewers should vote against her.” As a campaign ad, the film’s airing on national network television came under campaign finance laws, particularly since the film was financed by corporate political donations. CU was allowed to air the film in theaters and sell it in DVD and other formats, but CU wanted to pay $1.2 million to have the movie aired on broadcast cable channels and video-on-demand (pay per view) services, and to advertise its broadcast. CU president David Bossie (see May 1998) hired former Bush Solicitor General Theodore Olson after the Supreme Court agreed to hear the case. Bossie denies that he chose Olson because of their shared loathing of the Clintons—they worked together to foment the “Arkansas Project,” a Clinton smear effort that resulted in Congress unsuccessfully impeaching President Clinton—but because Olson gave “us the best chance to win.” Bossie dedicated the Clinton film to Barbara Olson, Olson’s late wife, who died in the 9/11 attacks (see (Between 9:15 a.m. and 9:25 a.m.) September 11, 2001). [Washington Post, 3/15/2009; Christian Science Monitor, 3/23/2009] “I just don’t see how the Federal Election Commission has the authority to use campaign-finance rules to regulate advertising that is not related to campaigns,” Bossie told reporters last year. [Christian Science Monitor, 2/1/2008]
Uphold or Cut Back McCain-Feingold? - Observers, unaware of the behind-the-scenes machinations, believe the case gives the Court the opportunity to either uphold or cut back the body of law stemming from the Bipartisan Campaign Reform Act (BCRA, or McCain-Feingold) campaign finance law (see March 27, 2002), which limits the ability of corporations and labor unions to spend unlimited amounts of money on political advertising before elections. CU is arguing that the BCRA is unconstitutional, having argued before a previous court that the the BCRA law was unconstitutional in the way it was being enforced by the FEC against its film. In its brief to the Court, CU denies the film is any sort of “electioneering,” claiming: “Citizens United’s documentary engages in precisely the political debate the First Amendment was written to protect… The government’s position is so far-reaching that it would logically extend to corporate or union use of a microphone, printing press, or the Internet to express opinions—or articulate facts—pertinent to a presidential candidate’s fitness for office.” The Justice Department, siding with the FEC, calls the film an “unmistakable” political appeal, stating, “Every element of the film, including the narration, the visual images and audio track, and the selection of clips, advances the clear message that Senator Clinton lacked both the integrity and the qualifications to be president of the United States.” The film is closer to a political “infomercial” than a legitimate documentary, the Justice Department argues. The film’s “unmistakable message is that Senator Clinton’s character, beliefs, qualifications, and personal history make her unsuited to the office of the President of the United States,” according to a Justice Department lawyer, Edwin Kneedler, who filed a brief on behalf of the FEC. The Justice Department wants the Court to uphold FEC disclosure requirements triggered by promotional ads, while Olson and CU want the Court to strike down the requirements. Olson says financial backers of films such as H:TM may be reluctant to back a film if their support becomes publicly known. Kneedler, however, writes that such disclosure is in the public interest. The Reporters Committee for Freedom of the Press (RCFP) is joining CU in its court fight, stating in a brief, “By criminalizing the distribution of a long-form documentary film as if it were nothing more than a very long advertisement, the district court has created uncertainty about where the line between traditional news commentary and felonious advocacy lies.” Scott Nelson of the Public Citizen Litigation Group, which supports the BCRA, disagrees with RCFP’s stance, saying, “The idea that [the law] threatens legitimate journalism and people who are out creating documentaries, I think, is a stretch.” [Washington Post, 3/15/2009; Christian Science Monitor, 3/23/2009] The RCFP has said that the movie “does not differ, in any relevant respect, from the critiques of presidential candidates produced throughout the entirety of American history.” And a lawyer with the RCFP, Gregg P. Leslie, asked, “Who is the FEC to decide what is news and what kind of format news is properly presented in?” [New York Times, 3/5/2009]
Filled with False Information - The movie was relentlessly panned by critics, who found much of its “information” either misrepresentative of Clinton or outright false. CU made several other films along with the Clinton documentary, which included attacks on filmmaker Michael Moore, the American Civil Liberties Union, illegal immigrants, and Clinton’s fellow presidential contender Barack Obama (D-IL—see October 28-30, 2008). [Washington Post, 3/15/2009; Christian Science Monitor, 3/23/2009]
Arguments Presented - Olson and his opponent, Deputy Solicitor General Malcolm Stewart, present arguments in the case to the assembled Court. Traditionally, lawyers with the Solicitor General (SG)‘s office are far more straightforward with the Court than is usual in advocacy-driven cases. New Yorker reporter Jeffrey Toobin later writes: “The solicitor general’s lawyers press their arguments in a way that hews strictly to existing precedent. They don’t hide unfavorable facts from the justices. They are straight shooters.” Stewart, who clerked for former Justice Harry Blackmun and is a veteran of the SG office since 1993, is well aware of the requirements of Court arguments. Justice Samuel Alito, a conservative justice with a penchant for asking tough questions that often hide their true intentions behind carefully neutral wording, is interested in seeing how far he can push Stewart’s argument. Does the BCRA apply only to television commercials, he asks, or might it regulate other means of communication during a federal campaign? “Do you think the Constitution required Congress to draw the line where it did, limiting this to broadcast and cable and so forth?” Could the law limit a corporation from “providing the same thing in a book? Would the Constitution permit the restriction of all those as well?” Stewart says that the BCRA indeed imposes such restrictions, stating, “Those could have been applied to additional media as well.” Could the government regulate the content of a book? Alito asks. “That’s pretty incredible. You think that if a book was published, a campaign biography that was the functional equivalent of express advocacy, that could be banned?” Stewart, who tardily realizes where Alito was going, attempts to recover. “I’m not saying it could be banned,” he responds. “I’m saying that Congress could prohibit the use of corporate treasury funds and could require a corporation to publish it using its—” Justice Anthony Kennedy, considered a “swing” justice in some areas but a reliable conservative vote in campaign-spending cases, interrupts Stewart. “Well, suppose it were an advocacy organization that had a book,” Kennedy says. “Your position is that, under the Constitution, the advertising for this book or the sale for the book itself could be prohibited within the 60- and 30-day periods?” Stewart gives what Toobin later calls “a reluctant, qualified yes.” At this point, Roberts speaks up. According to Toobin, Roberts intends to paint Stewart into something of a corner. “If it has one name, one use of the candidate’s name, it would be covered, correct?” Roberts asks. Stewart responds, “That’s correct.” Roberts then asks, “If it’s a 500-page book, and at the end it says, ‘And so vote for X,’ the government could ban that?” Stewart responds, “Well, if it says ‘vote for X,’ it would be express advocacy and it would be covered by the preexisting Federal Election Campaign Act (FECA—see February 7, 1972, 1974, May 11, 1976, and January 8, 1980) provisions.” Toobin later writes that with their “artful questioning, Alito, Kennedy, and Roberts ha[ve] turned a fairly obscure case about campaign-finance reform into a battle over government censorship.” Unwittingly, Stewart has argued that the government has the right to censor books because of a single line. Toobin later writes that Stewart is incorrect, that the government could not ban or censor books because of McCain-Feingold. The law applies to television advertisements, and stems from, as Toobin will write, “the pervasive influence of television advertising on electoral politics, the idea that commercials are somehow unavoidable in contemporary American life. The influence of books operates in a completely different way. Individuals have to make an affirmative choice to acquire and read a book. Congress would have no reason, and no justification, to ban a book under the First Amendment.” Legal scholars and pundits will later argue about Stewart’s answers to the three justices’ questions, but, as Toobin will later write, “the damage to the government’s case had been profound.” [New Yorker, 5/21/2012]
Behind the Scenes - Unbeknownst to the lawyers and the media, the Court initially renders a 5-4 verdict in favor of CU, and strikes down decades of campaign finance law, before withdrawing its verdict and agreeing to hear rearguments in the fall (see June 29, 2009). Toobin will write that the entire case is orchestrated behind the scenes, by Roberts and his fellow majority conservatives. Toobin will write of “a lengthy and bitter behind-the-scenes struggle among the justices that produced both secret unpublished opinions and a rare reargument of a case” that “reflects the aggressive conservative judicial activism of the Roberts Court.” Toobin will write that although the five conservatives are involved in broadening the scope of the case, and Kennedy actually writes the majority decision, “the result represented a triumph for Chief Justice Roberts. Even without writing the opinion, Roberts, more than anyone, shaped what the Court did. As American politics assumes its new form in the post-Citizens United era, the credit or the blame goes mostly to him.” The initial vote on the case is 5-4, with the five conservative justices—Alito, Kennedy, Roberts, Scalia, and Clarence Thomas—taking the majority.
Expansive Concurrence Becomes the Majority Opinion - At the outset, the case is decided on the basis of Olson’s narrow arguments, regarding the issue of a documentary being made available on demand by a nonprofit organization (CU). Roberts takes the majority opinion onto himself. The four liberals in the minority are confident Roberts’s opinion would be as narrow as Olson’s arguments. Roberts’s draft opinion is indeed that narrow. Kennedy writes a concurrence opining that the Court should go further and overturn McCain-Feingold, the 1990 Austin decision (see March 27, 1990), and end the ban on corporate donations to campaigns (see 1907). When the draft opinions circulates, the other three conservatives begin rallying towards Kennedy’s more expansive concurrence. Roberts then withdraws his draft and lets Kennedy write the majority opinion in line with his concurrence. Toobin later writes: “The new majority opinion transformed Citizens United into a vehicle for rewriting decades of constitutional law in a case where the lawyer had not even raised those issues. Roberts’s approach to Citizens United conflicted with the position he had taken earlier in the term.” During arguments in a different case, Roberts had “berated at length” a lawyer “for his temerity in raising an issue that had not been addressed in the petition. Now Roberts was doing nearly the same thing to upset decades of settled expectations.”
Dissent - The senior Justice in the minority, John Paul Stevens, initially assigns the main dissent to Justice David Souter. Souter, who is in the process of retiring from the Court, writes a stinging dissent that documents some of the behind-the-scenes machinations in the case, including an accusation that Roberts violated the Court’s procedures to get the outcome he wanted. Toobin will call Souter’s planned dissent “an extraordinary, bridge-burning farewell to the Court” that Roberts feels “could damage the Court’s credibility.” Roberts offers a compromise: Souter will withdraw his dissent if the Court schedules a reargument of the case in the fall of 2009 (see June 29, 2009). The second argument would feature different “Questions Presented,” and the stakes of the case would be far clearer. The four minority justices find themselves in something of a conundrum. They feel that to offer the Kennedy opinion as it stands would be to “sandbag” them and the entire case, while a reargument would at least present the issues that the opinion was written to reflect. And there is already a 5-4 majority in favor of Kennedy’s expansive opinion. The liberals, with little hope of actually winning the case, agree to the reargument. The June 29, 2009 announcement will inform the parties that the Court is considering overturning two key decisions regarding campaign finance restrictions, including a decision rendered by the Roberts court (see March 27, 1990 and December 10, 2003) and allow essentially unlimited corporate spending in federal elections. Court observers will understand that the Court is not in the habit of publicly asking whether a previous Court decision should be overruled unless a majority is already prepared to do just that. Toobin will call Roberts and his four colleagues “impatient” to make the decision, in part because an early decision would allow the ruling to impact the 2010 midterm elections. [New Yorker, 5/21/2012]
Created to Give Courts Shot at McCain-Feingold - Critics, as yet unaware of the behind-the-scenes maneuvering, will later say that CU created the movie in order for it to fall afoul of the McCain-Feingold campaign finance law, and give the conservatives on the Court the opportunity to reverse or narrow the law. Nick Nyhart of Public Campaign will say: “The movie was created with the idea of establishing a vehicle to chip away at the decision. It was part of a very clear strategy to undo McCain-Feingold.” Bossie himself will later confirm that contention, saying: “We have been trying to defend our First Amendment rights for many, many years. We brought the case hoping that this would happen… to defeat McCain-Feingold.” [Washington Post, 1/22/2010] CU’s original lawyer on the case, James Bopp, will later verify that the case was brought specifically to give the Court a chance to cut back or overturn campaign finance law (see January 25, 2010). The Court will indeed overturn McCain-Feingold in the CU decision (see January 21, 2010).

Entity Tags: Clarence Thomas, US Department of Justice, Theodore (“Ted”) Olson, Scott Nelson, US Supreme Court, Bipartisan Campaign Reform Act of 2002, Citizens United, Barbara Olson, American Civil Liberties Union, Anthony Kennedy, Barack Obama, Samuel Alito, Reporters Committee for Freedom of the Press, William Jefferson (“Bill”) Clinton, Michael Moore, Hillary Clinton, Gregg P. Leslie, Nick Nyhart, Edwin Kneedler, David Souter, Federal Election Commission, James Bopp, Jr, John Paul Stevens, David Bossie, John G. Roberts, Jr, Jeffrey Toobin, Malcolm Stewart

Timeline Tags: Civil Liberties

The US Supreme Court says it will schedule a hearing on the controversial “Citizens United” case, Citizens United v. Federal Election Commission (see March 15, 2009), for September 2009, in an unusual second presentation before the Court (see September 9, 2009). According to the justices, the lawyers for both Citizens United (CU) and the federal government should argue whether previous Court rulings upholding federal election law should be overturned based on First Amendment grounds. Both sides are asked to argue whether the Court should overrule the 1990 Austin decision (see March 27, 1990), which upheld restrictions on corporate spending on political campaigns, and/or the 2003 McConnell decision (see December 10, 2003), which upheld the bulk of the 2002 Bipartisan Campaign Reform Act (BCRA—see March 27, 2002). Law professor Nathaniel Persily says of the directive: “The Court is poised to reverse longstanding precedents concerning the rights of corporations to participate in politics. The only reason to ask for reargument on this is if they’re going to overturn Austin and McConnell.” The New York Times observes, “The Roberts court [referring to the Supreme Court under Chief Justice John Roberts] has struck down every campaign finance regulation to reach it, and it seems to have a majority prepared to do more.” Previous lower court rulings have found that CU’s attempt to air a film attacking presidential candidate Hillary Clinton (D-NY) was an attempt to engage in “electioneering,” and thus came under the restrictions of the McCain-Feingold campaign law (see March 27, 2002). The film was financed in part by donations from corporations and individuals whom CU has refused to identify. [United Press International, 6/29/2009; New York Times, 6/29/2009] CU previously attempted to have its case heard by the Court, but the Court sent the case back to a federal appeals court, which ruled in favor of the Federal Election Commission (FEC) and against CU (see March 24, 2008). Law professor Richard Hasen agrees with Persily and the Times that the decision to reargue the case a second time indicates that the Court’s conservative majority is prepared to overturn both Austin and McConnell, and allow essentially unlimited corporate spending in federal elections. Hasen writes that if the Court does indeed rule in favor of unlimited corporate spending, it will be in response to the fundraising advantage currently enjoyed by Democratic presidential candidate Barack Obama (D-IL) over his Republican counterpart, John McCain (R-AZ). [Slate, 6/29/2009] The decision will indeed overturn both Austin and McConnell, and gut most of the BCRA (see January 21, 2010).

Entity Tags: Hillary Clinton, Bipartisan Campaign Reform Act of 2002, Barack Obama, Federal Election Commission, US Supreme Court, New York Times, John G. Roberts, Jr, Richard L. Hasen, Nathaniel Persily, John McCain, Citizens United

Timeline Tags: Civil Liberties

Page 2 of 3 (217 events)
previous | 1, 2, 3 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike