!! History Commons Alert, Exciting News

Context of 'Late 2003: AT&T Technician Visits NSA ‘Secret Room’ in San Francisco'

This is a scalable context timeline. It contains events related to the event Late 2003: AT&T Technician Visits NSA ‘Secret Room’ in San Francisco. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 2 (155 events)
previous | 1, 2 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

A National Security Agency (NSA) linguist runs afoul of his superiors after he and other linguists submit a report concluding that Islamist terrorists are planning attacks on America. The analyst, who insists on remaining anonymous and is nicknamed “J” by press reports, is fluent in an unusual number of languages. His and his colleagues’ study of Arabic language messages, and the flow of money to terrorist organizations from Saudi Arabia, lead them to believe that Saudi extremists are plotting an attack. J will recall in January 2006: “You could see, this was the pure rhetoric of Osama bin Laden and his group, the exact same group, and we had an early indication.… All of us in the group had this view of a burgeoning threat, and suddenly we were all trotted off to the office of security. Then came the call to report for a battery of psychological tests.” J will issue further warnings of potential terrorist strikes, this time involving hijackers, passenger planes, and US buildings, in May 2001 (see May 2001). In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/25/2006]

Entity Tags: “J”, National Security Agency

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

A National Security (NSA) linguist who only allows himself to be identified to the media as “J” warns his superiors at the agency that terrorists may be planning to hijack passenger planes to ram into buildings, and that security measures need to be implemented to prevent this. Instead, J is ordered to undergo psychiatric evaluation. (J was given similar treatment in another instance eight years before; see September 11, 1993). J will later claim that NSA officials dismissed his warnings, and instead labeled him as “obsessed” with the idea of a “kamikaze” threat because of time he had spent in Japan. In 2006, J will say that any time his analysis countered conventional wisdom, he was ordered to undergo psychiatric evaluations. He will eventually develop an irregular heartbeat due to the stress of anticipating further retaliatory, potentially career-damaging psychological evaluations. “I believe it was retaliation, but how do you prove that?” he will ask. J will spend his last decade at NSA with no promotion or raise, and will say that another linguist left the agency during that time out of disgust with what was happening. “Who was going to listen to us? Who could do anything anyway?” he asks in 2006. In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/26/2006] It is not clear whether J’s warnings are related to the 33 other warnings picked up by NSA analysts during this same time period (see May-July 2001.)

Entity Tags: National Security Agency, “J”

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Issuetsdeah, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

October 26, 2001: USA Patriot Act Becomes Law

President Bush signs the Patriot Act into law.President Bush signs the Patriot Act into law. [Source: White House]President Bush signs the USA Patriot Act (see October 2, 2001) into law. The act’s provisions include:
bullet 1) Non-citizens can be detained and deported if they provide “assistance” for lawful activities of any group the government chooses to call a terrorist organization. Under this provision the secretary of state can designate any group that has ever engaged in violent activity as a terrorist organization. Representative Patsy Mink (D-HI) notes that in theory supporters of Greenpeace could now be convicted for supporting terrorism. [San Francisco Chronicle, 11/12/2001]
bullet 2) Immigrants can be detained indefinitely, even if they are found not to have any links to terrorism. They can be detained indefinitely for immigration violations or if the attorney general decides their activities pose a danger to national security. They need never be given a trial or even a hearing on their status. [San Francisco Chronicle, 9/8/2002]
bullet 3) Internet service providers can be ordered to reveal the websites and e-mail addresses that a suspect has communicated to or visited. The FBI need only inform a judge that the information is relevant to an investigation. [Village Voice, 11/26/2001; San Francisco Chronicle, 9/8/2002]
bullet 4) The act “lays the foundation for a domestic intelligence-gathering system of unprecedented scale and technological prowess.” [Washington Post, 11/4/2001] It allows the government to access confidential credit reports, school records, and other records, without consent or notification. [San Francisco Chronicle, 9/8/2002] All of this information can now be given to the CIA, in violation of the CIA’s mandate prohibiting it from spying within the US. [Village Voice, 11/26/2001]
bullet 5) Financial institutions are encouraged to disclose possible violations of law or “suspicious activities” by any client. The institution is prohibited from notifying the person involved that it made such a report. The term “suspicious” is not defined, so it is up to the financial institutions to determine when to send such a report.
bullet 6) Federal agents can easily obtain warrants to review a library patron’s reading and computer habits (see January 2002). [Village Voice, 2/22/2002] Section 215 allows the FBI to ask the Foreign Intelligence Surveillance Court (FISC) for an order to obtain documents relating to counterterrorism investigations without meeting the usual standard of legal “probable cause” that a crime may have been committed. Senator Russ Feingold (D-WI—see October 9, 2001) says that Section 215 can allow the FBI to “go on a fishing expedition and collect information on virtually anyone.” Librarians will make Section 215 the centerpiece of their objections to the Patriot Act, arguing that the government can now “sweep up vast amounts of information about people who are not suspected of a crime.” In 2005, one librarian will say, “It reminds me of the Red Scare of the 1950s.” However, some FBI officials find it easier to use provisions of Section 505, which expands the usage of so-called “national security letters” (see November 28, 2001). [Roberts, 2008, pp. 39-40]
bullet 7) The government can refuse to reveal how evidence is collected against a suspected terrorist defendant. [Tampa Tribune, 4/6/2003]
Passes with No Public Debate - The law passes without public debate. [Village Voice, 11/9/2001; Village Voice, 11/26/2001] Even though it ultimately took six weeks to pass the law, there were no hearings or congressional debates. [Salon, 3/24/2003] Congressman Barney Frank (D-MA) says: “This was the least democratic process for debating questions fundamental to democracy I have ever seen. A bill drafted by a handful of people in secret, subject to no committee process, comes before us immune from amendment” (see October 2-4, 2001 and October 24, 2001). [Village Voice, 11/9/2001] Only 66 congresspeople, and one senator, Feingold, vote against it. Few in Congress are able to read summaries, let alone the fine print, before voting on it. [Los Angeles Times, 10/30/2001] Feingold says, “The new law goes into a lot of areas that have nothing to do with terrorism and have a lot to do with the government and the FBI having a wish list of things they want to do.” [Village Voice, 11/9/2001] Supporters of the act point out that some of its provisions will expire in four years, but in fact most provisions will not expire. [Chicago Tribune, 11/1/2001]
Mounting Opposition - One year later, criticism of the law will grow. [San Francisco Chronicle, 9/8/2002] Dozens of cities will later pass resolutions criticizing the Patriot Act (see January 12, 2003).

Entity Tags: George W. Bush, USA Patriot Act, Foreign Intelligence Surveillance Court, US Congress, Patsy Mink, Russell D. Feingold, Barney Frank

Timeline Tags: Complete 911 Timeline, Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

The National Security Agency begins sending data—consisting of telephone numbers, e-mail addresses, and names—to the FBI that was obtained through surveillance of international communications originating within the US (see After September 11, 2001 and October 2001). The NSA sends so much data, in fact, that hundreds of agents are needed to investigate the thousands of tips per month that the data is generating. However, virtually all of this information leads to dead ends and/or innocent people. FBI officials repeatedly complain that the unfiltered information is bogging down the bureau: according to over a dozen current and former law enforcement and counterterrorism officials, the flood of tips provide them and their colleagues with very few real leads against terrorism suspect. Instead, the NSA data diverts agents from more productive work. Some FBI officials view the NSA data as pointless and likely illegal intrusions on citizens’ privacy. Initially, FBI director Robert Mueller asks senior administration officials “whether the program had a proper legal foundation,” but eventually defers to Justice Department legal opinions. One former FBI agent will later recall, “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism—case closed. After you get a thousand numbers and not one is turning up anything, you get some frustration.” A former senior prosecutor will add, “It affected the FBI in the sense that they had to devote so many resources to tracking every single one of these leads, and, in my experience, they were all dry leads. A trained investigator never would have devoted the resources to take those leads to the next level, but after 9/11, you had to.” Former NSA director Bobby Ray Inman says that the problem between the FBI and the NSA may stem in part from their very different approaches. Signals intelligence, the technical term for the NSA’s communications intercepts, rarely produces “the complete information you’re going to get from a document or a witness” in a traditional FBI investigation, he says. And many FBI officials are uncomfortable with the NSA’s domestic operations, since by law the NSA is precluded from operating inside US borders except under very specific circumstances. [New York Times, 1/17/2006]

Entity Tags: Federal Bureau of Investigation, National Security Agency, Bobby Ray Inman, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, Civil Liberties

As soon as he hears the news of his son’s capture in Afghanistan, John Walker Lindh’s father immediately hires James Brosnahan, a well-respected lawyer, on behalf of his son. On December 3, Brosnahan faxes a letter to Secretary of State Colin Powell, Attorney General John Ashcroft, Defense Secretary Donald Rumsfeld, and CIA Director George Tenet. He introduces himself as Lindh’s lawyer, expresses his wish to see him, and states: “Because [Lindh] is wounded and, based upon press reports, went for three days without food, I would ask that any further interrogation be stopped, especially if there is any intent to use it in any subsequent legal proceedings.” When Brosnahan receives no reply, he writes again, “I would ask that no further interrogation of my client occur until I have the opportunity to speak with him. As an American citizen, he has the right to counsel and, under all applicable legal authorities, I ask for the right to speak with my client as soon as possible.” On December 5, still having received no reply, he urges that “we have a conversation today.” Again, no reply comes. [Los Angeles Times, 3/23/2002; World Socialist Web Site, 3/27/2002; New Yorker, 3/3/2003]

Entity Tags: John Walker Lindh, George J. Tenet, Donald Rumsfeld, Colin Powell, John Ashcroft, James Brosnahan

Timeline Tags: Torture of US Captives, War in Afghanistan

At the Justice Department, an attorney-adviser in the Professional Responsibility Advisory Office (PRAO) named Jesselyn Radack provides a federal prosecutor in the terrorism and violent crimes section of the Criminal Division with advice on John Walker Lindh’s case. She informs him that “The FBI wants to interview American Taliban member John Walker [Lindh] some time next week… about taking up arms against the US.” She also writes: “I consulted with a senior legal adviser here at PRAO and we don’t think you can have the FBI agent question Walker. It would be a pre-indictment, custodial overt interview, which is not authorized by law.” She also advises him to have the FBI agent inform Lindh that his parents hired attorneys for him and ask him whether he wants to be represented by them. [Newsweek, 12/7/2001] In 2009, Radack will recall: “I was called with the specific question of whether or not the FBI on the ground could interrogate [Lindh] without counsel. And I had been told unambiguously that Lindh’s parents had retained counsel for him (see December 3-5, 2001). I gave that advice on a Friday, and the same attorney at Justice who inquired called back on Monday and said essentially, ‘Oops, they did it anyway. They interrogated him anyway. What should we do now?’ My office was there to help correct mistakes. And I said, ‘Well, this is an unethical interrogation, so you should seal it off and use it only for intelligence-gathering purposes or national security, but not for criminal prosecution.’ A few weeks later, Attorney General Ashcroft held one of his dramatic press conferences, in which he announced a complaint being filed against Lindh. He was asked if Lindh had been permitted counsel. And he said, in effect, ‘To our knowledge, the subject has not requested counsel.’ That was just completely false. About two weeks after that he held another press conference, because this was the first high-profile terrorism prosecution after 9/11. And in that press conference he was asked again about Lindh’s rights, and he said that Lindh’s rights had been carefully, scrupulously guarded, which, again, was contrary to the facts, and contrary to the picture that was circulating around the world of Lindh blindfolded, gagged, naked, bound to a board.” [Vanity Fair, 2/2009] Shortly thereafter, Radack will be fired from, and investigated by, the Justice Department (see Late December 2001 - 2002).

Entity Tags: John Ashcroft, Jesselyn Radack, John Walker Lindh, US Department of Justice

Timeline Tags: Torture of US Captives, War in Afghanistan

John Walker Lindh (see Late morning, November 25, 2001) is moved to a Navy ship, the USS Peleliu. When he arrives, he is still unable to walk and is suffering from dehydration, frostbite on his toes and mild hypothermia. Navy physicians treat Lindh with IV fluids, and on the same day, Haynes’ deputy, Paul W. Cobb Jr., tells Lindh’s lawyers: “I can inform you that John Walker is currently in the control of United States armed forces and is being held aboard USS Peleliu in the theater of operations. Our forces have provided him with appropriate medical attention and will continue to treat him humanely, consistent with the Geneva Convention protections for prisoners of war.” [Business Wire, 12/17/2001; ABC News, 12/19/2001] It is the first response James Brosnahan, head of Lindh’s defense team, receives to his letters, the first of which he sent on December 3 (see December 3-5, 2001).

Entity Tags: James Brosnahan, John Walker Lindh, Paul W. Cobb

Timeline Tags: Torture of US Captives, War in Afghanistan

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

The Justice Department’s Patrick Philbin sends a classified memo to Attorney General John Ashcroft. The memo’s contents will not be divulged, but the American Civil Liberties Union (ACLU) will later learn that it regards Ashcroft’s review of the Terrorist Surveillance Program (TSP—see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo contains a legal review by Ashcroft of President Bush’s order authorizing the TSP, the Bush administration’s name for its warrantless wiretapping program. The review is requested before one of the 45-day reauthorizations by the president as required by law. [ProPublica, 4/16/2009]

Entity Tags: US Department of Justice, Patrick F. Philbin, Terrorist Surveillance Program, American Civil Liberties Union, John Ashcroft

Timeline Tags: Civil Liberties

Vice Admiral John Poindexter testifying before Congress in the Iran Contra hearings in 1987.Vice Admiral John Poindexter testifying before Congress in the Iran Contra hearings in 1987. [Source: Associated Press]Vice Admiral John Poindexter begins running a shadowy new government agency called the Information Awareness Office. [New York Times, 2/13/2002; Federal Computer Week, 10/17/2002] Poindexter, formerly President Reagan’s National Security Adviser, is known for his five felony convictions of lying to Congress, destroying documents, and obstructing Congress in its investigation of his role in the mid-1980s Iran-Contra affair. Later his convictions were overturned on a technicality. [Los Angeles Times, 11/17/2002] Far from apologizing, Poindexter said it was his duty to lie to Congress. [Newsday, 12/1/2002] The New York Times notes that his new agency “is developing technologies to give federal officials instant access to vast new surveillance and information-analysis systems.” The new office is part of DARPA, the Defense Advanced Research Projects Agency. Poindexter was also known for his controversial role in shifting control of computer security to the military in the 1980s. Says Marc Rotenberg, former counsel for the Senate Judiciary Committee, “It took three administrations and both political parties over a decade to correct those mistakes.” [New York Times, 2/13/2002] Surprisingly, Poindexter’s appointment is little noticed until later in 2002 when the Total Information Awareness program is revealed (see March 2002; November 9, 2002). Incidentally, several others involved in the Iran-Contra affair also find jobs in the Bush Administration, including Elliott Abrams, John Negroponte, and Otto Reich. [Observer, 12/8/2002]

Entity Tags: Total Information Awareness, Defense Advanced Research Projects Agency, John Poindexter

Timeline Tags: Civil Liberties, Iran-Contra Affair


This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that
even “gait” - the way one walks, will be analyzed.
This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that even “gait” - the way one walks, will be analyzed. [Source: DARPA]The US military internally announces the creation of a new global data collection system called Total Information Awareness. The existence of this program is not reported until August 2002 [Wired News, 8/7/2002] , and not widely known until November 2002 (see November 9, 2002). Interestingly, the early accounts of this program suggest its budget is a “significant amount” of $96 million [Federal Computer Week, 10/17/2002] , and not the $10 million later reported. [Guardian, 11/23/2002] It is also reported that “parts” of the program “are already operational” whereas later it is said to be only in the conceptual stages of development. [Federal Computer Week, 10/17/2002]

Entity Tags: Total Information Awareness, US Department of Defense

Timeline Tags: Civil Liberties

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

Veteran AT&T technician Mark Klein (see July 7, 2009) is startled when he receives an email informing him and his colleagues that a representative from the National Security Agency (NSA) will soon arrive to conduct “some kind of business.” Klein works at the Geary Street facility in San Francisco, helping provide Internet, VoIP (voice over Internet Protocol), and data transport between the US and the Far East. Klein and his supervisor, Don Henry, soon learn that one of their colleagues, one of AT&T’s senior “field support specialists” whom Klein will only identify as “Ski,” is to be interviewed by the NSA for a security clearance. Ski is slated to begin working in an NSA-operated “secure facility” at AT&T’s Folsom Street facility in San Francisco. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 22-25] Klein later says of the NSA visit: “That struck me as a little odd to begin with, because I remember from back in the ‘70s, the NSA is not supposed to be doing domestic spying, so what were they doing in an AT&T company office? It struck me as odd, but I didn’t know anything more about it, so I just let it lie and waited for the guy to come.” Klein will later describe the NSA representative as “closemouthed and unsmiling, and he did his business.” Klein decides that the NSA visit was a one-time affair, and he thinks no more of it for the time being. [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, “Ski” (AT&T field support specialist), Don Henry, National Security Agency

Timeline Tags: Civil Liberties

According to the later recollections of senior AT&T technician Mark Klein (see July 7, 2009), rumors are swirling throughout AT&T regarding a “secret room” being built at the company’s facility at 611 Folsom Street in San Francisco (see Summer 2002). (At this time, Klein works at another AT&T facility located on San Francisco’s Geary Street; he will later begin working at the Folsom Street facility.) In January 2003, Klein will learn that the rumors are true, and that the room is to be used by the National Security Agency (NSA) (see January 2003). [Klein, 2009, pp. 26-28]

Entity Tags: Mark Klein, National Security Agency, AT&T

Timeline Tags: Civil Liberties


The original logo for the Total Information Awareness program. An eye from a Masonic pyramid appears to cast a beam over the world, with Muslim regions highlighted. [<a href=“http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/11/20/MN218568.DTL” target=_new>San Francisco Chronicle, 11/20/02</a>, <a href=“http://www.guardian.co.uk/Print/0,3858,4552953,00.html” target=_new>Guardian, 11/23/02</a>] The motto, Scientia Est Potentia, means “knowledge is power.” The logo is later removed from the department’s website. [<a href=“http://www.sunspot.net/news/nationworld/bal-spy1503,0,4325331.story?coll=bal-home-headlines” target=_new>Baltimore Sun, 1/5/03</a>]
The original logo for the Total Information Awareness program. An eye from a Masonic pyramid appears to cast a beam over the world, with Muslim regions highlighted. [San Francisco Chronicle, 11/20/02, Guardian, 11/23/02] The motto, Scientia Est Potentia, means “knowledge is power.” The logo is later removed from the department’s website. [Baltimore Sun, 1/5/03] [Source: DARPA]The New York Times exposes the existence of John Poindexter’s Total Information Awareness data collection program, begun in early 2002 (see Mid-January 2002; March 2002). [New York Times, 11/9/2002] Conservative columnist William Safire writes, “If the Homeland Security Act is not amended before passage, here is what will happen to you: Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend—all these transactions and communications will go into what the Defense Department describes as ‘a virtual, centralized grand database.’ To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you—passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the FBI, your lifetime paper trail plus the latest hidden camera surveillance—and you have the supersnoop’s dream: a ‘Total Information Awareness’ about every US citizen.” [New York Times, 11/14/2002] Poindexter says it will take years to realize his vision, but his office has already begun providing some technology to government agencies. [Washington Post, 11/12/2002] The existence of this program, and the fact that Poindexter is running it, causes concern for many on both the left and right. [USA Today, 1/16/2003] It is regularly called Orwellian, conjuring visions of 1984’s Big Brother, and even supporters admit it sounds Orwellian. [Newsweek, 11/15/2002; Los Angeles Times, 11/17/2002; Guardian, 11/23/2002; Newsday, 12/1/2002; New Yorker, 12/9/2002; BBC, 12/12/2002; Dallas Morning News, 12/16/2002; Baltimore Sun, 1/5/2003] The New York Times suggests, “Congress should shut down the program pending a thorough investigation.” [New York Times, 11/18/2002] Experts question not only its civil liberties implications, but also if it is even feasible. If it does work, would its database be swapped with errors that could not be removed? (see March 2002) [Mercury News (San Jose), 12/26/2002] However, many newspapers fail to report on the program at all, and ABC is the only network to report the story on prime time television. [ABC News, 11/16/2002; ABC News, 11/25/2002] Despite so many objections, the program is included in the Homeland Security bill (see November 25, 2002), and only later somewhat curbed by Congress (see January 23, 2003).

Entity Tags: John Poindexter, William Safire, Homeland Security Act, Total Information Awareness

Timeline Tags: Civil Liberties, Iran-Contra Affair

This Homeland Security department logo of an eye peeking
through a keyhole was copyrighted but apparently not used.
This Homeland Security department logo of an eye peeking through a keyhole was copyrighted but apparently not used. [Source: Public domain]President Bush signs legislation creating the Department of Homeland Security. Homeland Security Director Tom Ridge is promoted to secretary of homeland security. The department will consolidate nearly 170,000 workers from 22 agencies, including the Coast Guard, the Secret Service, the federal security guards in airports, and the Customs Service. [New York Times, 11/26/2002; Los Angeles Times, 11/26/2002] However, the FBI and CIA, the two most prominent anti-terrorism agencies, will not be part of it. [New York Times, 11/20/2002] The department wants to be active by March 1, 2003, but “it’s going to take years to integrate all these different entities into an efficient and effective organization.” [New York Times, 11/20/2002; Los Angeles Times, 11/26/2002] Some 9/11 victims’ relatives are angry over sections inserted into the legislation at the last minute. Airport screening companies will be protected from lawsuits filed by family members of 9/11 victims. Kristen Breitweiser, whose husband died in the World Trade Center, says: “We were down there lobbying last week and trying to make the case that this will hurt us, but they did it anyway. It’s just a slap in the face to the victims.” [New York Times, 11/26/2002] The legislation creating the new department contains sweeping new powers for the executive branch that go largely unremarked on by the media. The White House and the departments under its control can now withhold from the public vast amounts of information about “critical infrastructure,” such as emergency plans for major industrial sites, and makes the release of such information a criminal offense. The explanation is that keeping this information out of terrorist hands will prevent them from creating a “road map” for planning attacks; what is much less discussed is how little the public can now know about risky practices at industrial sites in their communities. [Savage, 2007, pp. 110]

Entity Tags: US Coast Guard, US Department of Homeland Security, US Customs Service, US Secret Service, George W. Bush, Kristen Breitweiser, Bush administration (43), Central Intelligence Agency, Federal Bureau of Investigation, Relatives of September 11 Victims, Tom Ridge

Timeline Tags: Complete 911 Timeline, Civil Liberties

An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities.An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities. [Source: USGS via Microsoft]On behalf of the National Security Agency (NSA), AT&T constructs a secret, highly secured room in its network operations center in Bridgeton, Missouri, used to conduct secret government wiretapping operations. This is a larger and more elaborate “data mining” center than the one AT&T has constructed in San Francisco (see January 2003). Salon’s Kim Zetter will later write that the Bridgeton facility “had the earmarks of a National Security Agency operation,” including a sophisticated “mantrap” entrance using retinal and fingerprint scanners. Sometime in early 2003, AT&T technician Mark Klein (see July 7, 2009) discusses the Bridgeton facility with a senior AT&T manager, whom he will only identify as “Morgan.” The manager tells Klein that he considers the Bridgeton facility “creepy,” very secretive and with access restricted to only a few personnel. Morgan tells Klein that the secure room at Bridgeton features a logo on the door, which Klein will describe as “the eye-on-the-pyramid logo which is on the back of the dollar bill—and that got my attention because I knew that was for awhile the logo of the Total Awareness Program” (TIA-see Mid-January 2002, March 2002 and November 9, 2002). Klein notes that the logo “became such a laughingstock that they [the US government] withdrew it.” However, neither Klein nor Morgan find the NSA secure room at Bridgeton amusing. In June 2006, two AT&T workers will tell Zetter that the 100 or so employees who work in the room are “monitoring network traffic” for “a government agency,” later determined to be the NSA. Only government officials or AT&T employees with top-secret security clearance are admitted to the room, which is secured with a biometric “mantrap” or highly sophisticated double door, secured with retinal and fingerprint scanners. The few AT&T employees allowed into the room have undergone exhaustive security clearance procedures. “It was very hush-hush,” one of the AT&T workers will recall. “We were told there was going to be some government personnel working in that room. We were told: ‘Do not try to speak to them. Do not hamper their work. Do not impede anything that they’re doing.’” (Neither of Zetter’s sources is Klein, who by the time Zetter’s article is published in 2006, will have made his concerns about the NSA and AT&T public.) The Bridgeton facility is the central “command center” for AT&T’s management of all routers and circuits carrying domestic and international Internet traffic. Hence, it is the ideal location for conducting surveillance or collecting data. AT&T controls about a third of all bandwidth carrying Internet traffic to and from homes and businesses throughout the US. The two employees, who both will leave AT&T to work with other telecommunications firms, will say they cannot be sure what kinds of activities actually take place within the secret room. The allegations follow those made by Klein, who after his retirement (see May 2004) will submit an affidavit stating his knowledge of other, similar facilities in San Francisco and other West Coast switching centers, whose construction and operations were overseen by the NSA (see January 16, 2004 and January 2003); the two AT&T employees say that the orders for the San Francisco facility came from Bridgeton. NSA expert Matthew Aid will say of the Bridgeton facility, “I’m not a betting man, but if I had to plunk $100 down, I’d say it’s safe that it’s NSA.” Aid will say the Bridgeton facility is most likely part of “what is obviously a much larger operation, or series of interrelated operations” combining foreign intelligence gathering with domestic eavesdropping and data collection. Former high-level NSA intelligence officer Russell Tice will say bluntly: “You’re talking about a backbone for computer communications, and that’s NSA.… Whatever is happening there with the security you’re talking about is a whole lot more closely held than what’s going on with the Klein case.” The kind of vetting that the Bridgeton AT&T employees underwent points to the NSA, both Aid and Tice will say; one of the two AT&T employees who will reveal the existence of the Bridgeton facility will add, “Although they work for AT&T, they’re actually doing a job for the government.” Aid will add that, while it is possible that the Bridgeton facility is actually a center for legal FBI operations, it is unlikely due to the stringent security safeguards in place: “The FBI, which is probably the least technical agency in the US government, doesn’t use mantraps. But virtually every area of the NSA’s buildings that contain sensitive operations require you to go through a mantrap with retinal and fingerprint scanners. All of the sensitive offices in NSA buildings have them.” The American Civil Liberties Union’s Jameel Jaffer will add that when the FBI wants information from a telecom such as AT&T, it would merely show up at the firm with a warrant and have a wiretap placed. And both the NSA and FBI can legally, with warrants, tap into communications data using existing technological infrastructure, without the need for such sophisticated surveillance and data-mining facilities as the ones in Bridgeton and San Francisco. Both AT&T and the NSA will refuse to comment on the facilities in Bridgeton, citing national security concerns. [Salon, 6/21/2006; Klein, 2009, pp. 28-30]

Entity Tags: Terrorist Surveillance Program, National Security Agency, Russell Tice, Matthew Aid, Federal Bureau of Investigation, Kim Zetter, Mark Klein, AT&T, Jameel Jaffer, “Morgan” (senior AT&T manager), American Civil Liberties Union

Timeline Tags: Civil Liberties

The NSA’s secret room in the AT&T switching center.The NSA’s secret room in the AT&T switching center. [Source: PBS]Veteran AT&T technician Mark Klein (see July 7, 2009) takes an informal tour of his company’s facility on San Francisco’s Folsom Street (see Late 2002), along with three other technicians from his Geary Street offices. The tour, Klein will later say, is to introduce the four technicians to the Folsom Street staff, “because they were obviously eventually planning to bring us over there.” Klein learns that the rumors of a “secret room” in the facility are true (see Fall 2002). The secret room is on the facility’s sixth floor and is being built to house some sort of equipment, but Klein is unsure exactly what that equipment might be. Klein and the others see the outer door of the secret room, and a workman working on the door “suddenly [began talking to Klein and his colleages in a] very low voice like he didn’t want to be overheard. He felt like this was something secret, you know, and he didn’t know much about it, and he was saying: ‘None of us can go in there. It’s all secret.’ This was not only an affront to the technicians; it was a violation of union rules, because they were obviously planning to install telecommunications equipment, which is supposed to be the jurisdiction of the union technicians. We had a contract. So the technicians were not only angry about this secret thing that they’re not let in on, but also the fact that there’s work there that they’re excluded from. And they were told nothing about it. So that was it.” Klein is further surprised to learn that only a single non-union technician (whom he only identifies as “Ski,” an AT&T “field support specialist” who has been granted a security clearance by the National Security Agency (NSA)), is allowed to work in the secure room. No union technicians are allowed in, even though the installation work being done is specifically contracted to the union workers. “The regular technician work force was not allowed in the room,” Klein will later state. Klein deduces that this secret room is the long-rumored NSA installation he has been hearing about. Moreover, he notes with some alarm that the room is next door to the 4ESS phone switch, “the traditional workhorse used for AT&T long-distance calls.” Klein will write, “Now my mental alarm bells were ringing, but for the moment there was nothing to do but take some mental notes, particularly since it was not clear exactly what they [the NSA and AT&T] were doing.” [Wired News, 4/7/2006; Democracy Now!, 5/12/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 26-28] Klein will explain that he chooses not to say anything about his concerns because he is “scared for several reasons, one being, well, this is obviously secret. This is obviously some federal government secret operation that they don’t want nosy people nosing around in, and if I started asking questions I could get into trouble. Furthermore, our jobs were in jeopardy anyway, because [we] were always getting wind that they were planning to close our previous office at Geary Street, and I didn’t need to give them an excuse to fire me. So I thought after thinking about it that the best thing to do is not to say anything and just watch it.” [PBS Frontline, 5/15/2007] He later learns that similar cabinets are being installed in AT&T centers in other cities, including Seattle, San Jose, Los Angeles, and San Diego (see Late 2003). [Wired News, 4/7/2006] The Folsom Street facility is apparently connected to a more central surveillance facility operated out of one of AT&T’s main command centers in Missouri (see Late 2002-Early 2003).

Entity Tags: Bush administration (43), AT&T, Electronic Frontier Foundation, Mark Klein, Terrorist Surveillance Program, “Ski” (AT&T field support specialist), National Security Agency

Timeline Tags: Civil Liberties

Congress imposes some limitations on the Total Information Awareness program (see March 2002; November 9, 2002). Research and development of the program would have to halt within 90 days of enactment of the bill unless the Defense Department submits a detailed report about the program. The research can also continue if Bush certifies that the report cannot be provided. Congress also okays use of the program internationally, but it cannot be used inside the US unless Congress passes new legislation specifically authorizing such use. [New York Times, 1/24/2003; Los Angeles Times, 2/19/2003] However, a bill to completely stop the program has yet to pass. [Mercury News (San Jose), 1/17/2003; Los Angeles Times, 2/19/2003] Several days earlier, Senator Charles Grassley (R-IA) alleged that the Justice Department and FBI are more extensively exploring the use of the Total Information Awareness program than they have previously acknowledged. [Associated Press, 1/21/2003; Washington Post, 1/22/2003] Contracts worth tens of millions of dollars have been signed with private companies to develop pieces of the program. [Associated Press, 2/12/2003] Salon also reports that the program “has now advanced to the point where it’s much more than a mere ‘research project’.” [Salon, 1/29/2003]

Entity Tags: Total Information Awareness, US Congress, US Department of Defense

Timeline Tags: Civil Liberties

AT&T completes installing “splitter” equipment in its Folsom Street, San Francisco, facility (see January 2003), enabling the National Security Agency (NSA) to monitor a vast amount of domestic and international electronic communications over telephone and Internet connections. [Klein, 2009, pp. 34-35] Veteran AT&T technician Mark Klein (see July 7, 2009) later helps connect Internet circuitry to a splitting cabinet that leads into the secret room (see October 2003). In an affidavit, Klein will later state, “While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T’s Internet service) circuits by splitting off a portion of the light signal.” The circuitry allows AT&T to divert traffic to and from its network from other domestic and international providers to the NSA monitoring equipment, meaning that even citizens who do not use AT&T as their provider can be monitored. [Wired News, 4/7/2006]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), working near the National Security Agency (NSA)‘s “secret room” in the firm’s Folsom Street, San Francisco facility (see October 2003), receives two documents pertaining to the equipment in that secret room. (In a 2007 interview with PBS, Klein will cite a third document as well, that he found lying on top of a router.) The two documents are entitled “SIMS Splitter Cut-In and Test Procedure Issue 2, 01/12/03” and “SIMS Splitter Cut-In and Test Procedure OSWF Training Issue 2 January 24, 2002.” “OSWF” stands for “On-Site Work Force.” As for “SIMS,” all Klein knows is that it is an acronym associated with the secret room. Reading over the documents, Klein realizes that they indicate the secret room contains a “splitter cabinet,” installed in February 2003 (see February 2003), containing “optical splitters” that “cut in” to signals sent through 16 “Peering Links” between AT&T and 16 other major carriers and Internet exchange points. He later recalls: “I brought them back to my desk, and when I started looking at it, I looked at it more, and I looked at it more, and finally it dawned on me sort of all at once, and I almost fell out of my chair, because this showed, first of all, what they had done, that they had taken working circuits, which had nothing to do with a splitter cabinet, and they had taken in particular what are called peering links which connect AT&T’s network with the other networks. It’s how you get the Internet, right? One network connects with another. So they took 16 high-speed peering links which go to places like Qwest [Communications] and Palo Alto Internet Exchange and places like that.… These circuits were working at one point, and the documents indicated in February 2003 they had cut into these circuits so that they could insert the splitter so that they can get the data flow from these circuits to go to the secret room. So this data flow meant that they were getting not only AT&T customers’ data flow; they were getting everybody else’s data flow, whoever else might happen to be communicating into the AT&T network from other networks. So it was turning out to be like a large chunk of the network, of the Internet.” The documents, he later says, name “the circuit IDs… the companies they belong to… [and] the cut date. And they were all in February [2003], when they were cut into the splitter” (see February 2003). The 16 carriers include ConXion, Verio, XO, Genuity, Qwest, PAIX (Palo Alto Internet Exchange), Allegiance, Abovenet, Global Crossing, C&W, UUNET, Level 3, Sprint, Telia, PSINet, and MAE West (the Metropolitan Area Exchange for AT&T’s Western region). In plain English, the splitter in the NSA room is duplicating the electronic data being sent through AT&T’s equipment, and sending the duplicated signals somewhere else, presumably to NSA computers for later processing. Klein is given the documents by a veteran AT&T technician who is preparing to retire. Klein, in a casual conversation with the colleague who gave him the documents, remarks, “It seems obvious to me, given that the secret room is next to the 4ESS (see January 2003), that they’re listening to phone calls.” Klein’s colleague shakes his head and says: “No, Internet.… I’ll show you.” (In 2007 Klein will learn from a telecommunications expert that since AT&T was transferring its long-distance telephone traffic onto Internet fiber cables, the splitter was most likely picking up both telephone and Internet traffic.) Klein’s colleague shows him the cabinet containing the splitters. Klein later tells a reporter: “[T]here were optical splitters, which basically were connected by fiber-optic cable down to the secret room on the sixth floor.… The analogy I can give you, which most people are familiar with is, say you get cable TV in your living room and then want to watch all the channels you get in the living room, you want to get all those same channels in your bedroom. So they install on the cable what they call a splitter, which splits off all the signals, duplicates of the same signals which go to the bedroom.… What the splitter does is make a duplicate copy of all the signals going across the fiber-optic cables.… We’re talking about billions and billions of bits of data going across every second, right? And it’s going into the router, and it’s coming back from the routers in that office. So what they do with the splitter is they intercept that data stream and make copies of all the data, and those copies go down on the cable to the secret room.” Klein confirms from his colleague and from the documents that show the splitters are connected directly to the equipment in the secret room. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 34-35]

Entity Tags: Genuity, UUNET, XO, Allegiance, Abovenet, AT&T, ConXion, Sprint/Nextel, Telia, Palo Alto Internet Exchange, MAE West, Level 3, Global Crossing, Mark Klein, National Security Agency, C&W, PSINet, Qwest

Timeline Tags: Civil Liberties

A portion of the outer door of AT&T’s Folsom Street facility.A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

Narus logo.Narus logo. [Source: Endace (.com)]Narus, a firm which manufactures telecommunications hardware, co-sponsors a technical conference in McLean, Virginia, titled “Intelligence Support Systems for Lawful Interception and Internet Surveillance.” As AT&T engineer Mark Klein (see July 7, 2009) will later write: “Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint, and Verizon. Narus founder Dr. Ori Cohen gave a keynote speech.” Also speaking at the conference is William Crowley, the former deputy director of the National Security Agency (NSA). Narus is providing some of the key hardware components used in the NSA’s domestic surveillance program (see January 16, 2004). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 39]

Entity Tags: Narus, AT&T, BellSouth, Mark Klein, Ori Cohen, Verizon Wireless, National Security Agency, MCI, Sprint/Nextel, William Crowley

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), who is considering “blowing the whistle” on the National Security Agency’s secret data-mining operation being conducted with the complicity and participation of AT&T (see January 16, 2004), is troubleshooting a problem of “signal loss” caused by AT&T’s signals being routed through the NSA’s “splitter cabinet,” which “splits” part of the optical data flow from its normal route into the NSA’s computers, enabling the agency to monitor all of the Internet traffic going through Klein’s Folsom Street, San Francisco, facility (see October 2003). Klein learns from a fellow technician that AT&T is “getting the same problem in the other offices where splitters are going in.” Klein is stunned to learn that other AT&T facilities have NSA splitters. He learns from the other technician that the “other offices” are in, among other places, Atlanta, San Diego, San Jose, and Seattle. (Apparently neither Klein nor the other technician are aware of the NSA splitter at the central AT&T facility in Bridgeton, Missouri—see Late 2002-Early 2003). Klein will later write, “This thing was getting bigger and bigger.” Klein determines that the NSA splitter is causing the signal loss: “The company was degrading the signal quality of its network for the sake of the NSA.”
Visiting the Secret Room - Klein accompanies an AT&T field support specialist named Rick into the NSA’s “secret room” at the Folsom Street building, with the intention of repairing the splitter problem. Rick is one of the few AT&T technicians authorized to work in the room; he invites Klein to join him and Klein agrees. Klein watches Rick punch the entry code into the lock of Room 641A and follows him inside. Klein observes a large amount of hardware, most installed in what he will later call “standard cabinets used by the telecommunications industry,” along with a computer workstation and a set of storage lockers. Klein later says he spends no more than two minutes inside the secret room. He will recall: “[I]f I didn’t know that the NSA was involved, it would look like any other work space where telecom people work, with rows of cabinets with equipment inside them, humming.… [T]he odd thing about the whole room, of course, was that I couldn’t normally get in there, nor could any of the other union technicians. Only this one guy who had clearance from the NSA could get in there, so that changed the whole context of what this is about.” Shortly thereafter, Rick tells Klein and a group of employees that he has keys allowing him access to the other NSA secret rooms in AT&T’s offices in San Diego, San Jose, and Seattle. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 42-44]

Entity Tags: AT&T, “Rick” (AT&T field support specialist), Mark Klein, National Security Agency

Timeline Tags: Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

Deputy Attorney General James Comey sends a classified memo to Attorney General John Ashcroft. The contents of the memo are kept secret, but the American Civil Liberties Union (ACLU) will later learn that it is a briefing and summary of the Office of Legal Counsel (OLC)‘s preliminary conclusions regarding the Terrorist Surveillance Program (see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: James B. Comey Jr., American Civil Liberties Union, Terrorist Surveillance Program, US Department of Justice, Office of Legal Counsel (DOJ), John Ashcroft

Timeline Tags: Civil Liberties

At a speech in Hershey, Pennsylvania, supporting the USA Patriot Act (see October 26, 2001), President Bush tells listeners that all US surveillance efforts are done with warrants from the Foreign Intelligence Surveillance Act (FISA) Court: “For years, law enforcement used so-called roving wire taps to investigate organized crime. You see, what that meant is if you got a wire tap by court order—and, by the way, everything you hear about requires court order, requires there to be permission from a FISA court, for example.… See, with court approval, we have long used roving wire taps to lock up monsters—mobsters. Now [with the Patriot Act in effect] we have a chance to lock up monsters, terrorist monsters.” [White House, 4/19/2004] The next day, Bush makes a similar claim during another pro-Patriot Act speech in Buffalo. He tells listeners: “[T]here are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires—a wiretap requires a court order. Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so. It’s important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. But a roving wiretap means—it was primarily used for drug lords. A guy, a pretty intelligence drug lord would have a phone, and in old days they could just get a tap on that phone. So guess what he’d do? He’d get him another phone, particularly with the advent of the cell phones. And so he’d start changing cell phones, which made it hard for our DEA types to listen, to run down these guys polluting our streets. And that changed, the law changed on—roving wiretaps were available for chasing down drug lords. They weren’t available for chasing down terrorists, see? And that didn’t make any sense in the post-9/11 era. If we couldn’t use a tool that we’re using against mobsters on terrorists, something needed to happen. The Patriot Act changed that. So with court order, law enforcement officials can now use what’s called roving wiretaps, which will prevent a terrorist from switching cell phones in order to get a message out to one of his buddies.” [White House, 4/20/2004] Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48] Klein will call Bush’s description of the surveillance program “disingenuous,” and continue: “They present it as about phone calls. They’re just watching a few bad people who make phone calls to al-Qaeda and the Middle East, and you notice they don’t talk about the Internet hardly at all. That part of it hasn’t been revealed, because if they did, Americans would realize it’s not just a few people; it’s everybody, because the data they’re handing over is not selected out. When you run fiber optics through a splitter and you send all that data to a secret room, there’s no selecting going on there at all.… They have no way of sifting it out unless they look through it later. Now they can claim, ‘Oh, we are right as rain; we’re only doing the legal thing and selecting out a few people that we’re legally entitled to,’ but that’s only after they get all the data. The analogy I use: If the government claims: ‘Well, when you do your taxes, why don’t you just write me a blank check and we’ll fill in the amount? Don’t worry. We’ll do it legal. We’ll fill in the right amount,’ would you do that? Nobody would trust the government by writing a blank check to them. It’s the same thing with the data we’re giving them.… [T]he Fourth Amendment specifically bans general warrants. It calls for specific warrants in which the things to be seized and the persons to be seized are specifically named. There’s a reason for that. It’s to protect against arbitrary government power. And what they’ve done is to trample over the Fourth Amendment by basically instituting a general warrant on the Internet.” [PBS Frontline, 5/15/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Mark Klein, National Security Agency, George W. Bush

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Entity Tags: Mark Klein, AT&T

Timeline Tags: Civil Liberties

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

Yaser Esam Hamdi.Yaser Esam Hamdi. [Source: Associated Press]In the case of Yaser Esam Hamdi v. Donald Rumsfeld, the Supreme Court rules 8-1 that, contrary to the government’s position, Hamdi (see December 2001), as a US citizen held inside the US, cannot be held indefinitely and incommunicado without an opportunity to challenge his detention. It rules he has the right to be given the opportunity to challenge the basis for his detention before an impartial court. Justice Sandra Day O’Connor writes for the majority: “It would turn our system of checks and balances on its head to suggest that a citizen could not make his way to court with a challenge to the factual basis for his detention by his government, simply because the Executive opposes making available such a challenge. Absent suspension of the writ by Congress, a citizen detained as an enemy combatant is entitled to this process.” Hamdi, on the other hand, apart from military interrogations and “screening processes,” has received no process. Due process, according to a majority of the Court, “demands some system for a citizen detainee to refute his classification [as enemy combatant].” A “citizen-detainee… must receive notice of the factual basis for his classification, and a fair opportunity to rebut the government’s factual assertions before a neutral decision-maker.” However, O’Connor writes, “an interrogation by one’s captor… hardly constitutes a constitutionally adequate factfinding before a neutral decisionmaker.”
Conservative Dissent: President Has Inherent Power to Detain Citizens during War - Only Justice Clarence Thomas affirms the government’s opinion, writing, “This detention falls squarely within the federal government’s war powers, and we lack the expertise and capacity to second-guess that decision.” [Supreme Court opinion on writ of certiorari. Shafiq Rasul, et al. v. George W. Bush, et al., 6/28/2004] Thomas adds: “The Founders intended that the president have primary responsibility—along with the necessary power—to protect the national security and to conduct the nation’s foreign relations. They did so principally because the structural advantages of a unitary executive are essential in these domains.” [Dean, 2007, pp. 105]
'A State of War Is Not a Blank Check for the President' - The authority to hold Hamdi and other such US citizens captured on enemy battlefields derives from Congress’s Authorization to Use Military Force (AUMF—see September 14-18, 2001). Justice Antonin Scalia dissents from this portion of the majority ruling, saying that because Congress had not suspended habeas corpus, Hamdi should either be charged with a crime or released. The Court also finds that if Hamdi was indeed a missionary and not a terrorist, as both he and his father claim, then he must be freed. While the Court does not grant Hamdi the right to a full criminal trial, it grants him the right to a hearing before a “neutral decision-maker” to challenge his detention. O’Connor writes: “It is during our most challenging and uncertain moments that our nation’s commitment to due process is most severely tested; and it is in these times that we must preserve our commitment at home to the principles for which we fight abroad.… We have long made clear that a state of war is not a blank check for the president when it comes to the rights of the nation’s citizens.”
Affirms President's Right to Hold US Citizens Indefinitely - Although the media presents the ruling as an unmitigated defeat for the Bush administration, it is actually far more mixed. The White House is fairly pleased with the decision, insamuch as Hamdi still has no access to civilian courts; the administration decides that Hamdi’s “neutral decision-maker” will be a panel of military officers. Hamdi will not have a lawyer, nor will he have the right to see the evidence against him if it is classified. This is enough to satisfy the Court’s ruling, the White House decides. In 2007, author and reporter Charlie Savage will write: “[T]he administration’s legal team noted with quiet satisfaction that, so long as some kind of minimal hearing was involved, the Supreme Court had just signed off on giving presidents the wartime power to hold a US citizen without charges or a trial—forever.” The Justice Department says of the ruling that it is “pleased that the [Court] today upheld the authority of the president as commander in chief of the armed forces to detain enemy combatants, including US citizens.… This power, which was contested by lawyers representing individuals captured in the War on Terror, is one of the most essential authorities the US Constitution grants the president to defend America from our enemies.” [Savage, 2007, pp. 193-194]

Entity Tags: Sandra Day O’Connor, Antonin Scalia, Donald Rumsfeld, Yaser Esam Hamdi, Clarence Thomas, Charlie Savage

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Judge Colleen Kollar-Kotelly, the presiding judge over the Foreign Intelligence Surveillance Court (FISC), warns the Justice Department that if it does not stop using evidence collected with warrantless wiretaps to obtain warrants to continue surveillance, her court will be more reluctant to grant warrants for surveillance. Kollar-Kotelly has complained about this before (see 2004). Though both Kollar-Kotelly and her predecessor, Judge Royce Lambeth, express concerns to senior officials that Bush’s warrantless wiretapping program is inherently unconstitutional, neither judge feels that they have the authority to rule on the president’s power to order such surveillance. Instead, they work to preserve the integrity of the FISA process. Eventually, the judges reach a compromise with government lawyers: any case using evidence from warrantless wiretaps that is to be presented to the judges for FISA warrants to continue monitoring the same suspects will be “tagged,” and that evidence will not be used to obtain warrants. Those cases, numbering less than ten a year, are to be presented only to the presiding judge. Lambeth and Kollar-Kotelly both feel that the process will work primarily because of the trust they have developed in James Baker, the Justice Department’s liaison to FISC. Part of the problem stems from contradictory statements and claims from the administration; after the wiretapping program began (see After September 11, 2001, NSA chief Michael Hayden and then-Attorney General John Ashcroft made it clear in private meetings with the judges that President Bush wanted to gain all possible information on any potential terrorist attacks, and that such information-gathering must by necessity go beyond the FISA court’s probable-cause requirement. But more recent assertions by Hayden and Ashcroft’s successor, Alberto Gonzales (see December 19, 2005, claiming that NSA analysts do not listen to domestic calls unless they already have some evidence that one of the parties to the call has links to terrorism, contradict earlier administration claims to the judges. Kollar-Kotelly suspects that the entire truth of the matter is not being presented to her and the FISC. Her suspicions are validated when her court is, in spite of administration reassurances, again presented with warrant applications based on illegally obtained evidence (see Late 2005). [Washington Post, 2/9/2006]

Entity Tags: Royce Lambeth, US Department of Justice, National Security Agency, John Ashcroft, Alberto R. Gonzales, Colleen Kollar-Kotelly, Foreign Intelligence Surveillance Court, George W. Bush, James Baker, Michael Hayden

Timeline Tags: Civil Liberties

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, AT&T, George W. Bush, USA Patriot Act, National Security Agency

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004) is gladdened to see the New York Times’s reports on the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 24, 2005). Klein has known since 2002 that the National Security Agency (NSA) has been using AT&T facilities to illegally eavesdrop on American citizens’ telephone and Internet communications (see Late 2002, January 2003, October 2003, Fall 2003, Late 2003, Late 2003, and January 16, 2004). He has considered going public with his knowledge, but has so far refrained because, he will later explain, “[t]he atmosphere was still kind of scary.” He will later say of the Times report, “They seemed to be talking mainly about phone calls, but anyway, it was revealed that there was an illegal spying program going on, and I thought, ‘Ah, this would probably blow the whole thing,’ and I thought it would all come out, and I don’t need to do anything.” However, Klein is horrified to see the government’s response. He will say: “[W]hat came out was the government turned around and went on the offensive against anybody who would dare to criticize them.… They’re issuing threats: Anyone who has a security clearance and spills any beans here is in for prosecution. That was deliberately said by them several times on TV to intimidate anybody in, say, the NSA who knew the truth, intimidate them so they would not come forward. So that silenced anybody in the intelligence community” (see December 17, 2005, December 19, 2005, December 21, 2005, December 30, 2005, and January 25-26, 2006). In his 2009 book Wiring Up the Big Brother Machine… and Fighting It, Klein will write that the Justice Department’s December 2005 investigation into the leak of classified information that led to the Times reports (see December 30, 2005) “was obviously intended to silence Congress, the media, and any potential whistleblowers inside the NSA who might have been tempted to come forward. The administration was manipulating the secrecy oath which people had taken to get security clearances, turning it into a weapon to silence anyone who had knowledge of wrongdoing.” Klein decides that he must come forward. He never received a security clearance, so he cannot be threatened with legal action over violating such clearance. He will explain: “All I had and still have are some company documents and some knowledge of some illicit NSA installation at AT&T’s network. And if anybody—say, Congress—was willing to follow the trail, I can give them all the names they want, and they can go up the hierarchy of AT&T all the way up to Dave Dorman, who was the president back then, and they can go even higher, and they can find out who is responsible for this, and they can ask them under oath and subpoena what the heck is going on here, if they had the will to do it.” Klein later admits to some hesitation and trepidation at undertaking such an effort, and will cite the “McCarthyite” atmosphere he says the government has created in which “dissidents become the target of a lynch mob searching for ‘terrorists.’” But, he will write, he believes the Times stories are “a political indication of a shift at the top of government, a split of some kind which could provide an opening.… Maybe they would publish my material, I thought, and that would provide some protection.” By December 31, Klein writes a preface to his memo from almost two years before (see January 16, 2004 and December 31, 2005). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 52-53]

Entity Tags: New York Times, AT&T, Bush administration (43), National Security Agency, US Department of Justice, Mark Klein

Timeline Tags: Civil Liberties

A number of senators from both political parties lash out at President Bush’s acknowledgment that he reauthorized the NSA’s warrantless wiretapping program over thirty times since its inception in late 2001 (see December 17, 2005). Senator Russ Feingold (D-WI) says that such warrantless wiretapping is outside of the law. “He’s trying to claim somehow that the authorization for the Afghanistan attack after 9/11 permitted this, and that’s just absurd,” Feingold says. “There’s not a single senator or member of Congress who thought we were authorizing wiretaps.… If he needs a wiretap, the authority is already there—the [Foreign] Intelligence Surveillance Act (FISA). They can ask for a warrant to do that, and even if there’s an emergency situation, they can go for 72 hours as long as they give notice at the end of 72 hours.” Senator Arlen Specter (R-PA) says the behavior of the White House and NSA “can’t be condoned.” Specter, the chairman of the Senate Judiciary Committee, says his committee will immediately begin investigating the matter. Senator Charles Schumer (D-NY) says the report swayed his decision on the reauthorization of the USA Patriot Act. “Today’s revelation that the government listened in on thousands of phone conversations without getting a warrant is shocking and has greatly influenced my vote,” he says. [CNN, 12/16/2005]

Entity Tags: Charles Schumer, Arlen Specter, Foreign Intelligence Surveillance Act, George W. Bush, Russell D. Feingold, National Security Agency, USA Patriot Act, Senate Judiciary Committee

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Reporter Arlene Getz equates President Bush’s attempt at controlling the media exposure of the warrantless wiretapping program (see December 15, 2005 and December 6, 2005) to similar media manipulation programs undertaken by the white apartheid regime in South Africa during the 1980s, and the acceptance of the controlled media by some South African citizens. Getz, who reported extensively on South Africa’s government, writes: “For anyone who has lived under an authoritarian regime, phone tapping—or at least the threat of it—is always a given. But US citizens have always been lucky enough to believe themselves protected from such government intrusion. So why have they reacted so insipidly to yet another post-9/11 erosion of US civil liberties?” She extends the comparison: “While Bush uses the rhetoric of ‘evildoers’ and the ‘global war on terror,’ Pretoria talked of ‘total onslaught.’ This was the catchphrase of P. W. Botha, South Africa’s head of state from 1978 to 1989.…Botha liked to tell South Africans that the country was under ‘total onslaught’ from forces both within and without, and that this global assault was his rationale for allowing opponents to be jailed, beaten or killed. Likewise, the Bush administration has adopted the argument that anything is justified in the name of national security.” [Newsweek, 12/21/2005]

Entity Tags: National Security Agency, Arlene Getz, Bush administration (43), P. W. Botha, George W. Bush

Timeline Tags: Civil Liberties, Domestic Propaganda

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005) and having prepared evidence to prove his knowledge of AT&T’s complicity with the NSA in setting in motion that operation (see December 31, 2005), begins searching for a civil liberties group that might be interested in his work. He quickly determines that two organizations, the Electronic Privacy Information Center (EPIC) and the Electronic Frontier Foundation (EFF), might be his best choices. Reluctant to use the telephone for fear of surveillance, he visits the EPIC offices, where he gives a lawyer a copy of the CD containing his evidence, printouts, and a disk copy of his PGP privacy key for public dissemination. He will later say that the lawyer on site is “polite” but shows little interest. When two weeks go by without any contact from EPIC, he journeys to San Francisco to the EFF offices with his documentation in hand. The reception at EFF is far different from the polite disinterest evidenced at EPIC. Executive director Shari Steele escorts him to speak with senior attorneys Kevin Bankston and Lee Tien. The EFF staffers tell Klein that their organization is already preparing a lawsuit against AT&T for illegally providing its customers’ telephone records to the government (see January 31, 2006), and his evidence will be very useful in the suit. Klein later writes, “I felt a sense of relief, that I had found the right place: a group that wanted to take on this fight.” EFF’s initial lawsuit does not include Klein’s material, but the organization will use it in the court proceedings. [Klein, 2009, pp. 55-56]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), Electronic Privacy Information Center, Kevin Bankston, Shari Steele, Lee Tien, Mark Klein

Timeline Tags: Civil Liberties

Fourteen law professors and former federal officials send a letter criticizing the Justice Department’s recent legal arguments supporting the legality of the secret NSA surveillance program (see December 19, 2005 and December 21-22, 2005). The letter is signed by law professors Curtis A. Bradley, a former State Department legal advisor; David Cole; Walter Dellinger, a former acting solicitor general and assistant attorney general; Ronald Dworkin; Richard Epstein; Harold Koh, a former assistant secretary of state and a former Justice Department official; Philip B. Heymann, a former deputy attorney general; Martin Lederman, a former Justice Department official; Beth Nolan, a former presidential counsel and a former Justice Department official; William S. Sessions, the former director of the FBI; Geoffrey R. Stone; Kathleen M. Sullivan; Laurence H. Tribe; and William Van Alstyne, a former Justice Department attorney. The letter is couched in legal language, but clearly states that the signees consider the NSA surveillance program entirely illegal: “[T]he program appears on its face to violate existing law.” The signees consider and reject the Justice Department’s argument that Congress “implicitly authorized the NSA program when it enacted the Authorization for Use of Military Force (AUMF) against al-Qaeda” in 2001 (see September 14-18, 2001), writing: “[T]he AUMF cannot reasonably be construed to implicitly authorize warrantless electronic surveillance in the United States during wartime, where Congress has expressly and specifically addressed that precise question in FISA and limited any such warrantless surveillance to the first 15 days of war.” The signees also reject the Justice Department’s argument that the president’s “inherent constitutional authority as commander in chief to collect ‘signals intelligence’” is not prohibited by FISA. The signees conclude that the Justice Department has failed “to offer a plausible legal defense of the NSA domestic spying program. If the administration felt that FISA was insufficient, the proper course was to seek legislative amendment, as it did with other aspects of FISA in the Patriot Act, and as Congress expressly contemplated when it enacted the wartime wiretap provision in FISA. One of the crucial features of a constitutional democracy is that it is always open to the president—or anyone else—to seek to change the law. But it is also beyond dispute that, in such a democracy, the president cannot simply violate criminal laws behind closed doors because he deems them obsolete or impracticable.” [Marty Lederman, 1/9/2006; Center for Democracy and Technology, 1/9/2006 pdf file]

Entity Tags: Harold Koh, William S. Sessions, William Van Alstyne, Curtis Bradley, Beth Nolan, Geoffrey Stone, US Department of Justice, Walter Dellinger, Richard Epstein, Martin (“Marty”) Lederman, Laurence Tribe, Kathleen M. Sullivan, Ronald Dworkin, National Security Agency, Philip Heymann, David D. Cole

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), already having contacted a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), contacts Los Angeles Times reporter Joseph Menn about his story. Klein has a packet of evidence showing AT&T’s collusion with the National Security Agency (NSA) in that agency’s surveillance of American citizens. Menn is enthusiastic, and Klein provides him with the full packet of documents he has secured from AT&T, the first time he has shown these documents to anyone (see December 31, 2005). Klein is sure Menn is preparing a “blockbuster” story centering on his evidence and observations. [Klein, 2009, pp. 57]

Entity Tags: National Security Agency, AT&T, Joseph Menn, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Current and former National Security Agency (NSA) employees say that the agency often retaliates against whistleblowers by labeling them “delusional,” “paranoid,” or “psychotic.” They say such labeling protects powerful superiors who might be incriminated by potentially criminal evidence provided by such whistleblowers, and helps to keep employees in line through fear and intimidation. One NSA whistleblower, former intelligence analyst Russell Tice, is currently the victim of such agency allegations. Tice, along with three other former analysts, Diane Ring, Thomas Reinbold, and another analyst who wishes to remain anonymous, make the allegations of unfounded psychological labeling by the agency; their allegations are corroborated by a current NSA officer who also wishes to remain anonymous. [Cybercast News Service, 1/25/2006]
Identifying a Potential Spy - Tice, a former signals intelligence (SIGINT) officer, is the first NSA whistleblower to capture the media’s attention, when in 2004, the Pentagon investigated possible NSA retaliation against him. In 2001, Tice reported that a co-worker at the Pentagon’s Defense Intelligence Agency (DIA) was possibly engaged in espionage for China, possibly connected to California Republican official and Chinese double agent Katrina Leung. [Democracy Now!, 1/3/2006; Cybercast News Service, 1/25/2006] Tice says, “I saw all the classic signs” in the DIA employee. After transferring to the NSA in November 2002, he reported his concerns again, this time adding criticisms of incompetence for the FBI, who in Tice’s view failed to properly investigate his allegations. Instead, Tice was ordered by NSA Security to undergo psychiatric evaluation. He was labeled “paranoid” and “psychotic” by NSA forensic psychologist Dr. John Michael Schmidt; Tice lost his top-secret security clearance as a result. [Cybercast News Service, 1/25/2006]
Fired - He was fired from the NSA in 2005 after spending his last years at the agency pumping gas and working in an agency warehouse. “I reported my suspicion and got blown off,” he says. “I pushed the issue and that ticked them off, the fact that I questioned their almighty wisdom.” [Cox News Service, 5/5/2005] Tice again made news on January 10, 2006 (see January 10, 2006), when he admitted to being a source for the New York Times’s article about a secret NSA electronic surveillance program against American citizens, a program carried out in the name of combating terrrorism. [ABC News, 1/10/2006]
No Evidence of Mental Instability - As for Tice’s own psychological evaluation by Schmidt, according to three other clinical psychologists, there is “no evidence” of either of the disorders in Tice’s mental makeup. And another NSA psychologist pronounced Tice mentally sound in 2002, though having a “somewhat rigid approach to situations.” Tice is described by five retired NSA and intelligence officials as “congenial,” “enthusiastic,” and “a scholar of high intellectual rigor [with] sound judgment [and] unparalleled professionalism.” Tice says of the NSA’s attempts to smear whistleblowers with apparently baseless psychological allegations, “This nonsense has to stop. It’s like Soviet-era torture. These people are vicious and sadistic. They’re destroying the lives of good people, and defrauding the public of good analysts and linguists.” But it has been effective in cowing others who were, in Tice’s words, “too afraid or ashamed to come forward.” [Cybercast News Service, 1/25/2006]
Further Allegations - Another former analyst, now employed by another federal agency and who only allows himself to be identified as “J,” describes similar targeting by the NSA. J is fluent in an unusually high number of languages, and is described by former colleagues as “brilliant” and possessed of “amazing” critical skills. “I believe the abuse is very widespread,” J says. “The targeted person suddenly is described as ‘not being a team player,’ as ‘disgruntled,’ and then they’re accused of all sorts of bizarre things. Soon they’re sent to the psych people.” J himself was targeted in September 1993 (see September 11, 1993) when he and other analysts concluded that the United States was being targeted by Islamic terrorists, and then again in early 2001 after predicting a terrorist attack using planes as weapons (see May 2001).
NSA Like the 'Gestapo' - A third whistleblower, a current NSA officer who refuses to be identified, confirms the allegations and says that baseless psychiatric allegations as a form of retaliation are “commonplace” at the agency. He says, “A lot of people who work there are going through the same thing. People live in fear here. They run it like some kind of Gestapo.” Those identified as “problems” are “yelled at, badgered and abused.…These are really good people, who start to be labeled crazy, but they’re telling the truth.” The official adds that the NSA often plants false evidence in personnel files as part of the intimidation campaign. Tice says the NSA maintains what he calls a “dirt database” of inconsequential but potentially embarrassing information on employees, gathered during routine clearance investigations and used as a form of leverage. The current officer says that an “underground network” has developed to discuss these issues. “It’s like the Nazis have taken over,” he says. [Cybercast News Service, 1/25/2006]
Personal Vendettas - Diane Ring is another former NSA official targeted by her superiors. Unlike Tice, a self-described conservative who believes President Bush should be impeached over the NSA’s illegal wiretapping program, Ring is a Bush supporter who believes the surveillance program is entirely proper. Ring, a former NSA computer scientist, says she was ordered to undergo psychiatric evaluations after coming into conflict with a colonel at the Pentagon. Ring is not a whistleblower per se like the others, but says she was targeted for retaliation because of a personal vendetta against her. The colonel “blew up” at Ring after she missed a meeting and explained that her branch chief had her working on a classified program that took priority over the meeting. Ring also was evaluated by Dr. Schmidt. When she complained about the apparent retaliation, her security clearance was, like Tice’s, revoked, and she was “red-badged,” or put on restricted access within the NSA offices. Ring says she received an excellent job evaluation just three months prior to the actions taken against her. She says her colleagues at the time were told not to talk to her, and she was restricted to working in a room filled with other red-badgers. She thinks she was isolated as part of an intentional campaign to force her to leave the agency. “They had these red-badgers spread out all over the place.” she recalls. “Some were sent to pump gas in the motor pool and chauffeur people around. In our room, some people brought sleeping bags in and slept all day long. Others read. I would think that would incense the taxpaying public.” Schmidt eventually reported that another doctor diagnosed Ring with a “personality disorder,” but Ring has a July 21, 2005 letter from that doctor, Lawrence Breslau, which reads in part, “On mental status examination including cognitive assessment she performs extremely well.” In the letter, Breslau says he never made such a diagnosis. She, like others in her position, went to the NSA Employee Assistance Service (EAS) for confidential counseling, but the current NSA officer says that though those sessions are supposed to be confidential, NSA officials can and do obtain “confidential” sessions for retaliatory purposes. “Their goal is to freak you out, to get inside your mind,” that officer says. Rice claims that NSA General Counsel Paul Caminos lied about her case before a judge, denying that he had sent an internal e-mail forbidding anyone from supporting Ring. Ring says she was “floored” by Caminos’s actions: “I served in Bosnia. We had mines going off all around us, all day long. That was nothing compared to this.” She is currently working on clearing her name with the NSA’s new director, Lieutenant General Keith Alexander. Ring believes that the problem at NSA involves a small number of people, “The whole lot of them is corrupt though. There is zero integrity in the process. And zero accountability.”
'Psychiatric Abuse' 'Very Widespread' - Like his fellow whistleblowers, former NSA officer Thomas Reinbold says the practice of “psychiatric abuse” inside the NSA is “very widespread.” Reinbold, who recelved 26 commendations and awards during his career at the NSA, including a medal for the intelligence he provided during the 1991 Gulf War, says, “They call it ‘doing a mental’ on someone.” Such practices have a “chilling effect” on other potential whistleblowers: “They fear for their careers because they fear someone will write up bad [psychological] fitness reports on them.” Reinhold was labeled “paranoid” and “delusional” by Schmidt after he complained to an inspector general on February 25, 1994, that the federal government was guilty of contract tampering; Schmidt’s evaluation contradicts a psychological evaluation he conducted on Reinbold eight months before that found he was mentally sound. At the time, Reinbold worked as a contracting officer representative for the Naval Security Group (NAVSECGRU) in Virginia. Reinbold had his high-level security clearance revoked, and was escorted off the grounds by armed security officers. Reinbold says NSA officials fabricated evidence in his personnel file to force him out; that evidence included allegations that he was a danger to himself and others, and that he had said “if [he] was going down, [he] would take everyone with him.” In September 1995, an administrative hearing found that the revocation of Reinbold’s security clearance was unjustified and recommended restoring his clearance, but did not allow the damaging information to be removed from his personnel file. He later sued the agency, and then retired because of diabetes. “I gave 29 years of my life to the intelligence community,” he recalls. “They couldn’t get me out the door fast enough. There are very good people, getting screwed and going through hell.”
Helping Those Who Come After - Some of the whistleblowers hope to gain the assistance of politicians to help their cases. But Tice is less optimistic. “Our time is over,” Tice says he told Ring. “But we can make a difference for those who come behind us.” The five whistleblowers have the support of the whistleblower advocacy group Integrity International. Its founder and director, Dr. Don Soeken, himself a whistleblower while he was with the US Public Health Service in the 1970s, says, “When this retaliation first starts, there’s a tendency by bosses to use code words like ‘delusional,’ ‘paranoid’ and ‘disgruntled’. Then they use psychiatric exams to destroy them. They kill the messenger and hope the PR spin will be bought by the public.” Tom Devine of the Government Accountability Project says that “psychiatric retaliation” is a knee-jerk reaction against whistleblowers: “It’s a classic way to implement the first rule of retaliation: shift the spotlight from the message to the messenger. We call it the ‘Smokescreen Syndrome.’” Superiors investigate and smear the whistleblower for anything from financial irregularities to family problems, sexual practices, bad driving records, or even failure to return library books, Devine says. “It’s a form of abuse of power.” The Whistleblower Protection Act was written to protect those like Tice, Ring, Reinbold, and Soeken, but, says Beth Daly of the Project on Government Oversight (POGO), the act has serious flaws. “You have to go through the inspector general or the director of the CIA to let them know if you’re going to Congress and what you’re going to disclose,” she says. “And inspector generals are notorious for revealing who whistleblowers are.”

Entity Tags: Paul Caminos, Project for Government Oversight, Naval Security Group, Russell Tice, Tom Devine, Thomas Reinbold, National Security Agency, US Public Health Service, Keith Alexander, Lawrence Breslau, Diane Ring, Defense Intelligence Agency, Beth Daly, Don Soeken, House National Security Subcommittee, Government Accountability Project, John Michael Schmidt, Integrity International, “J”

Timeline Tags: Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

Electronic Frontier Foundation logo.Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Entity Tags: Electronic Frontier Foundation, Foreign Intelligence Surveillance Act, National Security Agency, AT&T, US Department of Justice, Kevin Bankston

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]

Entity Tags: Jeff Jonas, Foreign Intelligence Surveillance Act, Bush administration (43), James W. Pennebaker, Mark Klein, National Security Agency, Washington Post

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). [United Press International, 2/14/2006] Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” [In These Times, 5/15/2006]

Entity Tags: Russell Tice, Christopher Shays, Dennis Kucinich, House Armed Services Committee, James Bamford, House Government Reform Subcommittee on National Security, Emerging Threats and International Relations

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), is concerned that the New York Times will not publish a story featuring his allegations and evidence against AT&T and the National Security Agency (NSA). Klein was “outed” by Los Angeles Times editor Dean Baquet to the US intelligence apparatus after Klein approached a Los Angeles Times reporter about his story, and Klein is concerned that he lacks the protection that publicity would afford him (see February 11, 2006 and After). New York Times reporters James Risen and Eric Lichtblau fail to contact Klein for weeks during this time period, leaving Klein to wonder if the New York Times, like the Los Angeles Times before it, will fail to publish his story. Klein emails Risen and Lichtblau his full set of AT&T documents proving his allegations in mid-February (see December 31, 2005). Meanwhile, he sends emails containing selected documents to a number of Congressional members. Only one, House Representative Pete Stark (D-CA), responds, promising that he will present Klein’s information to the House Judiciary Committee, but, as Klein will write, “I never heard anything from the Judiciary Committee, or any other committee for that matter.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 63]

Entity Tags: James Risen, Dean Baquet, AT&T, Eric Lichtblau, House Judiciary Committee, Los Angeles Times, Mark Klein, New York Times, National Security Agency, Fortney Hillman (“Pete”) Stark, Jr

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, J. Scott Marcus

Timeline Tags: Civil Liberties

Page 1 of 2 (155 events)
previous | 1, 2 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike