!! History Commons Alert, Exciting News

Context of 'December 2002: Lawmakers Informed of Secret NSA Surveillance and Data Mining Programs'

This is a scalable context timeline. It contains events related to the event December 2002: Lawmakers Informed of Secret NSA Surveillance and Data Mining Programs. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 3 of 5 (467 events)
previous | 1, 2, 3, 4, 5 | next

White House deputy chief of staff Karl Rove declares that covert CIA case officer Valerie Plame Wilson, recently outed by conservative columnist Robert Novak (see July 14, 2003), is now “fair game,” presumably for media attacks. Plame Wilson learns of Rove’s declaration when she walks into her den to find her husband Joseph Wilson just getting off the phone. She will later write: “[H]e had a look on his face that I’d never seen before. He said he had just been talking with journalist and Hardball host Chris Matthews [the host of a political discussion show on MSNBC], who had told [Wilson] that he had just spoken with the powerful presidential adviser Karl Rove.” [Wilson, 2007, pp. 147] Wilson himself will later write that Matthews tells him: “I just got off the phone with Karl Rove. He says, and I quote, ‘Wilson’s wife is fair game.‘… I will confirm that if asked.” Wilson will write: “Those are fighting words for any man, and I’d just had them quoted to me.… Rove was legendary for his right-wing zeal and take-no-prisoners operating style. But what he was doing now was tantamount to declaring war on two US citizens, both of them with years of government service.… For a president who promised to restore dignity and honor to the White House, this behavior from a trusted adviser was neither dignified nor honorable. In fact, it was downright dirty and highly unethical even in a town where the politics of personal destruction are the local pastime.” He cannot be sure why he and his wife are being targeted. Surely, he muses, no one believes that his wife sent him on his mission to Niger (see Shortly after February 13, 2002 and February 19, 2002), or that his trip to one of the poorest countries in Africa had been some sort of pleasure jaunt. He realizes that the ultimate target might not be either his wife or himself, but others who may feel impelled to speak out against the administration, a point he makes later in the day to two reporters from Newsday (see July 21, 2003). [Wilson, 2004, pp. 1-5] Wilson will later write: “To make a political point, to defend a political agenda, to blur the truth that one of the president’s own staffers had scripted a lie into the president’s mouth, one of the administration’s most senior officials found it perfectly acceptable to push a story that exposed a national security asset. It was appalling.” [Wilson, 2004, pp. 351]

Entity Tags: Karl C. Rove, Chris Matthews, Bush administration (43), Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: Domestic Propaganda, Niger Uranium and Plame Outing

A senior intelligence official confirms that outed CIA officer Valerie Plame Wilson (see July 14, 2003) was not responsible for selecting her husband, former ambassador Joseph Wilson, to go to Niger to determine the truth or falsity of charges that Iraq had sought to buy uranium from there (see Shortly after February 13, 2002 and February 19, 2002). While Plame Wilson worked “alongside” the operations officers who asked her husband to travel to Niger, the official notes, she did not recommend her husband to undertake the Niger assignment. “They [the officers who did ask Wilson to check the uranium story] were aware of who she was married to, which is not surprising,” the official says. “There are people elsewhere in government who are trying to make her look like she was the one who was cooking this up, for some reason. I can’t figure out what it could be.” [Newsday, 7/22/2003]

Entity Tags: Valerie Plame Wilson, Central Intelligence Agency, Joseph C. Wilson

Timeline Tags: Niger Uranium and Plame Outing

Joseph Wilson, the former US ambassador to Gabon who has played a key part in discrediting the Bush administration’s attempts to claim that Iraq tried to purchase weapons-grade uranium from Niger (see July 6, 2003)), is interviewed for the PBS Frontline episode, “Truth, Consequences, and War.” The interview will be broadcast in early October 2003.
Trip to Niger - Wilson confirms that the CIA sent him to Niger in February 2002 to find evidence either supporting or challenging claims that Iraq tried to purchase weapons-grade uranium from that nation (see Shortly after February 13, 2002 and February 21, 2002-March 4, 2002). Wilson notes that the CIA officials who sent him to Iraq “said that the Office of the Vice President had raised questions about this report, and they’d asked them to look into it” (see (February 13, 2002)), but he personally had no contact with anyone in that office.
Reactions to Claims of Iraq-Niger Uranium Deal - Wilson recalls being bemused by President Bush’s assertion that Iraq tried to purchase uranium from an African country, but accepted the possibility that he was not referring to Niger, but another African nation that also mines and sells uranium (see January 28-29, 2003). Wilson says the issue became a concern to him when the International Atomic Energy Agency concluded that the documents used for the Iraq-Niger claims were obvious forgeries (see March 7, 2003), and the State Department admitted to being gulled by them (see March 8, 2003). He says, “Now, when the State Department spokesman said that, I was moved to say on a news program that I thought that if the US government looked into its files, it would find that it had far more information on this particular subject than the State Department spokesman was letting on” (see March 8, 2003). Wilson calls the decision to allow Bush to make the claim in his State of the Union address (see Mid-January 2003 and 9:01 pm January 28, 2003) irresponsible. “You allow the president of the United States to use information that did not even pass the threshold for an Italian news magazine [Panorama—see October 9, 2002]? You allow him to use that information in the most important speech that he makes in his tenure?”
Correcting the Record - Wilson denies that his decision to write an op-ed for the New York Times exposing the falsehood of the White House claims (see July 6, 2003) was political. Instead, he says, it was “a response to what appeared to me to be a series of misstatements on the part of senior administration officials.” Wilson notes that the White House had many opportunities to set the record straight without his intervention, but chose not to. He made pleas to the White House through his friends at the State Department and friends of senior administration officials to be honest about the claims (see January 29, 2003 and March 8, 2003). Wilson reiterates his feelings that the Iraq invasion was outside the bounds of the various United Nations resolutions constraining Iraq’s behavior, and that Iraq could have been successfully contained by continuing UN efforts to disarm the Iraqi regime. There were no provable links between Iraq and Islamist terrorism, there was no provable imminent threat to the US or the Middle East from Iraq, and allegations that Iraq had committed genocide could have been addressed through the UN’s Genocide Convention.
Blowing His Wife's CIA Identity - Wilson concludes by addressing the leak of his wife Valerie Plame Wilson’s identity as a CIA official (see June 23, 2003, July 7, 2003, 8:30 a.m. July 8, 2003, July 8, 2003, 11:00 a.m. July 11, 2003, 8:00 a.m. July 11, 2003, Late Afternoon, July 12, 2003, 1:26 p.m. July 12, 2003, July 12, 2003, and July 14, 2003), and notes that while he won’t confirm that his wife is a CIA official, to publicly expose such an official is a crime under the Intelligence Identities Protection Act (see July 16, 2003). It was an attempt to intimidate others, Wilson says: “I think it was a signal to others, that should you decide to come forward, we will do this to your family as well. It was just very sloppy.” He adds that if his wife is indeed a CIA official, “if it’s a real violation, [it will] cause a lot of pain in our national security apparatus, because at a minimum—the assertions were that she was a CIA operative working in the weapons of mass destruction programs. So if those assertions are true, what this administration has done is they’ve taken a national security asset involved in a program to which they give high priority, off the table, and to protect whose career? What political objective is so important… that you take a national security asset off—not to shut me up, but to… [shut] others up. That would be the only conclusion I could come to. If you read the story in which this assertion was made, the assertion adds absolutely nothing to the story, nothing. It is not germane, it is not relevant.” The interviewer says, “All’s fair in love and war,” and Wilson responds: “When you’re an administration that comes to office on a platform of restoring dignity and honor to the White House, and you act in such a dishonorable and undignified way, then you really do descend to that ‘all’s fair in love and war’ status. I think in that case it’s important to point out how duplicitous some in the White House are.” [PBS Frontline, 10/9/2003]

Entity Tags: New York Times, Intelligence Identities Protection Act, George W. Bush, Central Intelligence Agency, Bush administration (43), International Atomic Energy Agency, Joseph C. Wilson, Public Broadcasting System, US Department of State, Office of the Vice President, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

Senior AT&T technician Mark Klein (see July 7, 2009), working near the National Security Agency (NSA)‘s “secret room” in the firm’s Folsom Street, San Francisco facility (see October 2003), receives two documents pertaining to the equipment in that secret room. (In a 2007 interview with PBS, Klein will cite a third document as well, that he found lying on top of a router.) The two documents are entitled “SIMS Splitter Cut-In and Test Procedure Issue 2, 01/12/03” and “SIMS Splitter Cut-In and Test Procedure OSWF Training Issue 2 January 24, 2002.” “OSWF” stands for “On-Site Work Force.” As for “SIMS,” all Klein knows is that it is an acronym associated with the secret room. Reading over the documents, Klein realizes that they indicate the secret room contains a “splitter cabinet,” installed in February 2003 (see February 2003), containing “optical splitters” that “cut in” to signals sent through 16 “Peering Links” between AT&T and 16 other major carriers and Internet exchange points. He later recalls: “I brought them back to my desk, and when I started looking at it, I looked at it more, and I looked at it more, and finally it dawned on me sort of all at once, and I almost fell out of my chair, because this showed, first of all, what they had done, that they had taken working circuits, which had nothing to do with a splitter cabinet, and they had taken in particular what are called peering links which connect AT&T’s network with the other networks. It’s how you get the Internet, right? One network connects with another. So they took 16 high-speed peering links which go to places like Qwest [Communications] and Palo Alto Internet Exchange and places like that.… These circuits were working at one point, and the documents indicated in February 2003 they had cut into these circuits so that they could insert the splitter so that they can get the data flow from these circuits to go to the secret room. So this data flow meant that they were getting not only AT&T customers’ data flow; they were getting everybody else’s data flow, whoever else might happen to be communicating into the AT&T network from other networks. So it was turning out to be like a large chunk of the network, of the Internet.” The documents, he later says, name “the circuit IDs… the companies they belong to… [and] the cut date. And they were all in February [2003], when they were cut into the splitter” (see February 2003). The 16 carriers include ConXion, Verio, XO, Genuity, Qwest, PAIX (Palo Alto Internet Exchange), Allegiance, Abovenet, Global Crossing, C&W, UUNET, Level 3, Sprint, Telia, PSINet, and MAE West (the Metropolitan Area Exchange for AT&T’s Western region). In plain English, the splitter in the NSA room is duplicating the electronic data being sent through AT&T’s equipment, and sending the duplicated signals somewhere else, presumably to NSA computers for later processing. Klein is given the documents by a veteran AT&T technician who is preparing to retire. Klein, in a casual conversation with the colleague who gave him the documents, remarks, “It seems obvious to me, given that the secret room is next to the 4ESS (see January 2003), that they’re listening to phone calls.” Klein’s colleague shakes his head and says: “No, Internet.… I’ll show you.” (In 2007 Klein will learn from a telecommunications expert that since AT&T was transferring its long-distance telephone traffic onto Internet fiber cables, the splitter was most likely picking up both telephone and Internet traffic.) Klein’s colleague shows him the cabinet containing the splitters. Klein later tells a reporter: “[T]here were optical splitters, which basically were connected by fiber-optic cable down to the secret room on the sixth floor.… The analogy I can give you, which most people are familiar with is, say you get cable TV in your living room and then want to watch all the channels you get in the living room, you want to get all those same channels in your bedroom. So they install on the cable what they call a splitter, which splits off all the signals, duplicates of the same signals which go to the bedroom.… What the splitter does is make a duplicate copy of all the signals going across the fiber-optic cables.… We’re talking about billions and billions of bits of data going across every second, right? And it’s going into the router, and it’s coming back from the routers in that office. So what they do with the splitter is they intercept that data stream and make copies of all the data, and those copies go down on the cable to the secret room.” Klein confirms from his colleague and from the documents that show the splitters are connected directly to the equipment in the secret room. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 34-35]

Entity Tags: Genuity, UUNET, XO, Allegiance, Abovenet, AT&T, ConXion, Sprint/Nextel, Telia, Palo Alto Internet Exchange, MAE West, Level 3, Global Crossing, Mark Klein, National Security Agency, C&W, PSINet, Qwest

Timeline Tags: Civil Liberties

Abdullah Almalki.Abdullah Almalki. [Source: Tom Hanson / Canadian Press]A month after his transfer to the Sednaya prison in Syria (see August 19, 2003), Maher Arar meets another prisoner he recognizes as Abdullah Almalki, the man he was questioned about a year before (see September 26, 2002) in New York. “His head was shaved, and he was very, very thin and pale. He was very weak.” Almalki is in far worse shape than Arar. “He told me he had also been at the Palestine Branch, and that he had also been in a grave like I had been except he had been in it longer. He told me he had been severely tortured with the tire, and the cable. He was also hanged upside down. He was tortured much worse than me. He had also been tortured when he was brought to Sednaya, so that was only two weeks before.” [CBC News, 11/26/2004]

Entity Tags: Maher Arar, Abdullah Almalki

Timeline Tags: Torture of US Captives

A portion of the outer door of AT&T’s Folsom Street facility.A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

Salon columnist and media observer Eric Boehlert notes that while the White House has specifically, and emphatically, denied Karl Rove leaked the CIA identity of Valerie Plame Wilson (see September 29, 2003), it has not yet given such coverage to Lewis “Scooter” Libby, the chief of staff for Vice President Dick Cheney. Circumstantial evidence that the White House may be leaving Libby to, in Boehlert’s words, “twist in the wind” is mounting. The New York Daily News has reported that “Democratic Congressional sources said they would like to hear from… Lewis Libby.” On MSNBC, an administration critic, former counterterrorism official Larry Johnson, who says he knows who the leaker is, would not deny it was Libby. And Senator Chuck Hagel has implied that the leak originated from the vice president’s office when he said that President Bush needs to sit down with Cheney and “ask… what he knows about it.” A former senior CIA officer says, “Libby is certainly suspect No. 1.” Even Cheney’s own spokeswoman, Cathie Martin, refuses to deny Libby’s involvement, saying only, “This is a serious matter and we shouldn’t be speculating in light of an ongoing investigation.” Boehlert notes that conservative columnist Robert Novak, who outed Plame Wilson in one of his columns (see July 14, 2003), has dropped several hints about his primary source that point (inconclusively) to Libby. Novak’s assertion that his source is “no partisan gunslinger” (see October 1, 2003) is a better characterization of Libby than of Rove. Since Novak has referred to his source as “he,” the source cannot be National Security Adviser Condoleezza Rice or any other White House female. Most interestingly, Boehlert notes, Novak was never looking for Plame Wilson’s identity when he spoke with his sources in July 2003. Rather, he wanted to know why former ambassador Joseph Wilson was chosen to go to Niger (see Shortly after February 13, 2002 and February 21, 2002-March 4, 2002). The logical place for Novak to begin such an inquiry, Boehlert writes, was Cheney’s office. Wilson believed Cheney was primarily, if indirectly, responsible for sending him to Niger (see (February 13, 2002)). Time magazine ran a story that revealed Libby was talking to reporters about Wilson (see July 17, 2003). And Boehlert notes other, less significant clues that add incrementally to the evidence showing that Libby might well have been Novak’s source. Finally, Boehlert comes back to Larry Johnson. Johnson confirmed for PBS that Plame Wilson was an undercover CIA agent and not merely an “analyst,” as Novak has asserted. He recently said flatly on MSNBC, “I know the name of the person that spoke with Bob Novak,” and that person works “at the White House,” and more specifically, “in the Old Executive Office Buildings.” Cheney’s office is located inside the Old Executive Office Building. Johnson was asked by co-host Pat Buchanan: “Scooter Libby. Now, is Scooter Libby the name you heard?” Johnson replied, “I’m not going to comment on that.” [Salon, 10/3/2003] The day after Boehlert’s column appears, White House press secretary Scott McClellan gives reporters the same assurance about Libby that he gave to Rove (see October 4, 2003).

Entity Tags: Larry C. Johnson, Catherine (“Cathie”) Martin, Bush administration (43), Chuck Hagel, Karl C. Rove, Lewis (“Scooter”) Libby, Robert Novak, Eric Boehlert, Office of the Vice President, Valerie Plame Wilson, Patrick Buchanan, Richard (“Dick”) Cheney

Timeline Tags: Domestic Propaganda, Niger Uranium and Plame Outing

Jack Goldsmith succeeds Jay Bybee as the head of the Justice Department’s Office of Legal Counsel (OLC). The OLC essentially performs two functions: advising the executive branch on the legal limits of presidential power, and crafts legal justifications for the actions of the president and the executive branch. Goldsmith, who along with fellow Justice Department counsel and law professor John Yoo, is seen as one of the department’s newest and brightest conservative stars. But instead of aiding the Bush administration in expanding the power of the executive branch, Goldsmith will spend nine tumultuous months battling the White House on issues such as the NSA’s warrantless wiretapping program, the administration’s advocacy of torture in the interrogation of terrorism suspects, and the extralegal detention and military tribunals of “enemy combatants.” Goldsmith will find himself at odds with Yoo, the author of two controversial OLC memos that grant the US government wide latitude in torturing terror suspects (see January 9, 2002 and August 1, 2002), with White House counsel and future attorney general Alberto Gonzales, and with the chief aide to Vice President Dick Cheney, David Addington, who along with Cheney is one of the strongest advocates of the so-called “unitary executive” theory of governance, which says the president has virtually unlimited powers, especially in the areas of national security and foreign policy, and is not always subject to Congressional or judicial oversight. Within hours of Goldsmith’s swearing-in, Goldsmith receives a phone call from Gonzales asking if the Fourth Geneva Convention, which protects civilians in war zones such as Iraq, covers terrorists and insurgents as well. Goldsmith, after intensive review with other lawyers in and out of the Justice Department, concludes that the conventions do indeed apply. Ashcroft concurs. The White House does not. Goldsmith’s deputy, Patrick Philbin, says to Goldsmith as they drive to the White House to meet with Gonzales and Addington, “They’re going to be really mad. They’re not going to understand our decision. They’ve never been told no.” Philbin’s prediction is accurate; Addington is, Goldsmith recalls, “livid.” The physically and intellectually imposing Addington thunders, “The president has already decided that terrorists do not receive Geneva Convention protections. You cannot question his decision.” Addington refuses to accept Goldsmith’s explanations. Months later, an unmollified Addington will tell Goldsmith in an argument about another presidential decision, “If you rule that way, the blood of the hundred thousand people who die in the next attack will be on your hands.” These initial encounters set the tone for Goldsmith’s stormy tenure as head of the OLC. Goldsmith will lead a small group of administration lawyers in what New York Times Magazine reporter Jeffrey Rosen calls a “behind-the-scenes revolt against what [Goldsmith] considered the constitutional excesses of the legal policies embraced by his White House superiors in the war on terror,” Goldsmith will resign in June of 2004 (see June 17, 2004). [New York Times Magazine, 9/9/2007]

Entity Tags: Richard (“Dick”) Cheney, US Department of Justice, Office of Legal Counsel (DOJ), John C. Yoo, Jack Goldsmith, David S. Addington, Alberto R. Gonzales, National Security Agency, Jay S. Bybee, John Ashcroft, Jeffrey Rosen

Timeline Tags: Civil Liberties

Top: the seven detainees are forced to form a human pyramid. Charles Graner and Sabrina Harman stand behind them smiling and giving thumbs up signs. Bottom: Some of the same detainees are forced to simulate oral sex on each other. Top: the seven detainees are forced to form a human pyramid. Charles Graner and Sabrina Harman stand behind them smiling and giving thumbs up signs. Bottom: Some of the same detainees are forced to simulate oral sex on each other. [Source: Public domain]At Abu Ghraib, seven Iraqi detainees are brought to Cellblock 1A from one of the tent camps escorted by MPs. The seven Iraqis are suspected of having taken part in a fight. They include Nori al-Yasseri, Hussein Mohssein Mata al-Zayiadi, and four others known only by their first names: Haidar, Ahmed, Ahzem, Hashiem and Mustafa. [Washington Post, 5/21/2004; US Department of Defense, 8/23/2004 pdf file] They are repeatedly punched and attacked by Staff Sgt. Ivan L. Frederick, Spc. Charles Graner, and other MPs (see Evening November 7, 2003). The MPs then take out their cameras to take pictures of the seven naked men and begin putting them in humiliating poses, often placing themselves in the picture as well, smiling. Graner makes them climb on top of each other to form a human pyramid, as is reported by Spc. Sabrina Harman. [Washington Post, 5/22/2004; Rolling Stone, 7/28/2004] “They put us two on the bottom, two on top of them, and two on top of those and on top,” Al-Zayiadi will say. [Washington Post, 5/21/2004] “The pyramid lasted about 15 to 20 minutes,” according to Harman. [Washington Post, 5/22/2004] The prisoners are also made to crawl on hands and knees with MPs riding on their backs. [Rolling Stone, 7/28/2004] “They were sitting on our backs like riding animals,” Al-Zayiadi says. Meanwhile, others are taking photographs. [Washington Post, 5/21/2004] Frederick then takes hold of the prisoner whom he has singled out for additional punishment and motions him to masturbate. “I grabbed his arm by the elbow, put it on his genitals and moved it back and forth with an arm motion, and he did it.” [Los Angeles Times, 10/21/2004] He makes another detainee do the same. “I lifted his hood and gave him a hand gesture, telling him to keep doing it himself.” [New York Times, 10/21/2004] Spc. Matthew Wisdom, who complained to his team leader Sgt. Robert Jones earlier in the evening about the treatment of the detainees, returns to Tier 1A to find a naked detainee being forced to masturbate in front of another naked detainee on his knees before him. “I saw two naked detainees,” Wisdom will later recall, “one masturbating to another kneeling with its mouth open. I thought I should just get out of there. I didn’t think it was right.” [New Yorker, 5/10/2004] According to Wisdom, Frederick says to him: “Look what these animals do when we leave them alone for two seconds.” [New Yorker, 5/10/2004; Los Angeles Times, 8/5/2004] Meanwhile, Pfc. Lynndie England makes sexually suggestive comments “in a somewhat sarcastic, fun tone of voice,” according to Wisdom. [Los Angeles Times, 8/5/2004] “I heard Pfc. England shout out, ‘He’s getting hard.’” [New Yorker, 5/10/2004] Again Wisdom leaves the building to tell Sgt. Jones, who assures him the “problem [will] be addressed and dealt with,” [Los Angeles Times, 8/5/2004] and Wisdom assumes that the problem will be taken care of. [New Yorker, 5/10/2004] Others, meanwhile, are lined up and forced to masturbate. These facts are corroborated by photographs that show the MPs laughing as they look on. [Rolling Stone, 7/28/2004] Al-Zayiadi later identifies himself in one of these pictures. “They told my friend to masturbate and told me to masturbate also, while they were taking pictures,” he says. [Washington Post, 5/21/2004] In the end, Al-Zayiadi says they are tossed naked but still hooded into a cell. “They opened the water in the cell and told us to lay face down in the water and we stayed like that until the morning, in the water, naked, without clothes.” [Washington Post, 5/21/2004] One of the seven prisoners is likely Haydar Sabbar Abed who says he was originally arrested for not carrying his ID card. After being involved in a fight with an Iraqi prison employee in one of the tent camps, he is taken to the Hard Site. He later recalls: “They cut off our clothes and… told us to masturbate towards this female soldier. But we didn’t agree to do it, so they beat us.” He also says: “They made us act like dogs, putting leashes around our necks. They’d whistle and we’d have to bark like dogs. We thought they were going to kill us.” [BBC, 8/4/2004] The next day, Wisdom asks for and is granted a transfer to a job elsewhere in the prison. Although he and Sgt. Jones say they have been angered by the abuse, they do little more than mildly confront their colleagues with their objections. [Los Angeles Times, 8/5/2004] To the detainees, the experience has been harrowing. Al-Yasseri will later call it a “night which we felt like 1,000 nights.” “I was trying to kill myself,” says Al-Zayiadi, “but I didn’t have any way of doing it.” [Rolling Stone, 7/28/2004] Gen. George Fay will also describe these incidents in his report (see August 25, 2004), which he concludes was an the affair of MPs alone. He states that military intelligence “involvement in this abuse has not been alleged nor is it likely.” However, one of the pictures taken that night, depicting the “human pyramid,” is later used as a screen saver for a computer in the Hard Site. The screen saver is later seen by a female military intelligence interrogator, but she states, according to Gen. Fay, that she did not report the picture because she did not see it again. The same interrogator, Fay will report, had a “close personal relationship” with Staff Sgt. Frederick, [US Department of Defense, 8/23/2004 pdf file] one of the main instigators of the abuse that night.

Entity Tags: Javal Davis, Ivan L. Frederick II, Jeremy C. Sivits, Matthew Wisdom, Shannon K. Snider, Hussein Mohssein Mata Al-Zayiadi, Lynndie England, Nori al-Yasseri, Mustafa, Haydar Sabbar Abed, George R. Fay, Haidar, New Yorker, Hashiem, Ahmed, Charles Graner, Ahzem, Sabrina Harman, Robert Jones II

Timeline Tags: Torture of US Captives

Narus logo.Narus logo. [Source: Endace (.com)]Narus, a firm which manufactures telecommunications hardware, co-sponsors a technical conference in McLean, Virginia, titled “Intelligence Support Systems for Lawful Interception and Internet Surveillance.” As AT&T engineer Mark Klein (see July 7, 2009) will later write: “Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint, and Verizon. Narus founder Dr. Ori Cohen gave a keynote speech.” Also speaking at the conference is William Crowley, the former deputy director of the National Security Agency (NSA). Narus is providing some of the key hardware components used in the NSA’s domestic surveillance program (see January 16, 2004). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 39]

Entity Tags: Narus, AT&T, BellSouth, Mark Klein, Ori Cohen, Verizon Wireless, National Security Agency, MCI, Sprint/Nextel, William Crowley

Timeline Tags: Civil Liberties

The new head of the Justice Department’s Office of Legal Counsel (OLC), Jack Goldsmith, begins an internal review of the legality of the NSA’s warrantless wiretapping program (see December 15, 2005). The program is kept so secret that only four Justice officials even have access to information about its inner workings, a pattern of poor consultation he will call “the biggest legal mess I have ever encountered” when he testifies to the Senate about the program four years later (see October 2, 2007). Neither Attorney General John Ashcroft nor Justice’s top legal counsel know much about the program. When Goldsmith begins his legal review, the White House initially refuses to brief Deputy Attorney General James Comey about it. Goldsmith later testifies that he cannot find “a legal basis for some aspects of the program.” Upon completing the review, Goldsmith declares the program illegal, with the support of Ashcroft and Comey. However, White House officials are irate at Goldsmith’s findings. [Washington Post, 10/20/2007]

Entity Tags: Alberto R. Gonzales, Bush administration (43), Office of Legal Counsel (DOJ), US Department of Justice, John Ashcroft, James B. Comey Jr., Jack Goldsmith, National Security Agency

Timeline Tags: Civil Liberties

A three-judge panel of the Second US Circuit Court of Appeals in New York votes two to one that the military must either charge alleged al-Qaeda terrorist Jose Padilla with a crime, or release him within 30 days. “The government,” the court says, “can transfer Padilla to appropriate civilian authorities who can bring criminal charges against him.” Until now, no court in the US has ruled against the government’s contention that even American citizens arrested on US soil can be held indefinitely based on wartime government prerogatives. Neither the 2001 Authorization to Use Military Force (see September 14-18, 2001) nor the president’s “inherent power” as commander in chief is enough to hold Padilla without a trial, the court finds: “The president, acting alone, possesses no inherent constitutional authority to detain American citizens seized within the United States, away from a zone of combat, as enemy combatants.” The two judges in the majority are a 1998 Clinton appointee and a 2001 Bush appointee; the dissenter, who advocates granting the president new and sweeping powers, is a 2003 Bush appointee. “So far,” Office of Legal Counsel lawyer John Yoo comments, “the Second Circuit is the only court that has rejected the idea that the war on terrorism is, in fact, a war.” Because this ruling conflicts with the Fourth Circuit’s ruling in favor of the Bush administration, the Supreme Court will be forced to resolve the issue (see June 28, 2004); in light of the appeal, the court later agrees to suspend its 30-day ruling. [Knight Ridder, 12/29/2003; Savage, 2007, pp. 153]

Entity Tags: Jose Padilla, John C. Yoo

Timeline Tags: Torture of US Captives, Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Police photo of Tom DeLay, after his 2005 indictment on election fraud charges.Police photo of Tom DeLay, after his 2005 indictment on election fraud charges. [Source: Mug Shot Alley]The co-founder and editor of the American Prospect, Robert Kuttner, subjects the 2002 House of Representatives to scrutiny, and concludes that under the rule of House Majority Leader Tom DeLay (R-TX), it is well on its way to becoming what he calls a “dictatorship.” Kuttner writes that such authoritarian rule in “the people’s chamber” of Congress puts the US “at risk of becoming an autocracy.” He explains: “First, Republican parliamentary gimmickry has emasculated legislative opposition in the House of Representatives (the Senate has other problems). [DeLay] has both intimidated moderate Republicans and reduced the minority party to window dressing.… Second, electoral rules have been rigged to make it increasingly difficult for the incumbent party to be ejected by the voters, absent a Depression-scale disaster, Watergate-class scandal, or Teddy Roosevelt-style ruling party split.… Third, the federal courts, which have slowed some executive branch efforts to destroy liberties, will be a complete rubber stamp if the right wins one more presidential election. Taken together, these several forces could well enable the Republicans to become the permanent party of autocratic government for at least a generation.” Kuttner elaborates on his rather sweeping warnings.
Legislative Dictatorship - The House, and to a lesser extent the Senate, used to have what was called a “de facto four-party system”: liberal Democrats; Southern “Dixiecrats” who, while maintaining their membership as Democrats largely due to lingering resentment of Republicans dating back to the Civil War, often vote with Republicans; conservative Republicans; and moderate-to-liberal “gypsy moth” Republicans, who might vote with either party. Rarely did one of the four elements gain long-term control of the House. Because of what Kuttner calls “shifting coalitions and weak party discipline,” the majority party was relatively respectful of the minority, with the minority free to call witnesses in hearings and offer amendments to legislation. In the House, that is no longer true. While the House leadership began centralizing under House Speaker Jim Wright (D-TX) between 1987 and 1989, the real coalescence of power began under Speaker Newt Gingrich (R-GA) between 1995 and 1999. The process, Kuttner asserts, has radically accelerated under DeLay and Speaker Dennis Hastert (R-IL).
Centralized Legislation - Under current practices, even most Republicans do not, as a rule, write legislation—that comes from DeLay and Hastert. Drastic revisions to bills are often rammed through late in the evening, with little or no debate. The Republican leadership has classified legislation as “emergency” measures 57 percent of the time, allowing them to be voted on with as little as 30 minutes of debate. Kuttner writes, “On several measures, members literally did not know what they were voting for.” Legislation written and proposed by Democrats rarely gets to the floor for debate. Amendments to legislation is also constrained, almost always coming from Hastert and DeLay. “[V]irtually all major bills now come to the floor with rules prohibiting amendments.” DeLay enforces rigid party loyalty, threatening Republican members who resist voting for the leadership’s bills with loss of committee assignments and critical campaign funds, and in some circumstances with DeLay’s sponsoring primary opponents to unseat the uncooperative member in the next election.
Democrats Shut out of Conferences - In the House, so-called “conference committees,” where members work to reconcile House and Senate versions of legislation, have become in essence one-party affairs. Only Democrats who might support the Republican version of the bill are allowed to attend. The conference committee then sends a non-amendable bill to the floor for a final vote.
No Hearings - The general assumption is that House members debate bills, sometimes to exhaustion, on the chamber floor. No more. Before DeLay, bills were almost never written in conference committees. Now, major legislation is often written in conference committee; House members often never see the legislation until it has been written in final, non-amendable form by DeLay and his chosen colleagues.
Abuse of Appropriations - Appropriations, or funding of events authorized by legislation, are ripe for use and misuse by the one-party leadership. Many appropriations bills must pass in order for Congress or other entities of the government to continue functioning. While “earmarks”—“pork-barrel” appropriations for individual members’ pet projects and such—are nothing new, under Gingrich and later Hastert/DeLay, the use of earmarks has skyrocketed. Huge earmarks are now routinely attached to mandatory appropriations bills. DeLay has perfected a technique known as “catch and release.” On close pending votes, the House Republican Whip Organization, made up of dozens of regional whips, will target the small but critical number of Republicans who might oppose the legislation. Head counts are taken; as members register (and change) their votes, some are forced to vote against their consciences (or their constituents) and others are allowed to vote no. Kuttner writes, “Basically, Republican moderates are allowed to take turns voting against bills they either oppose on principle or know to be unpopular in their districts.” This allows the member to save at least some face with their constituents. Under Wright, Republican members such as then-Representative Dick Cheney (R-WY) were outraged when Wright held a vote open for 15 minutes after voting was to end; Cheney called it “the most arrogant, heavy-handed abuse of power I’ve ever seen in the 10 years that I’ve been here.” It is not unusual for DeLay to hold votes open for up to three hours to get recalcitrant members in line. [American Prospect, 2/1/2004] In 2006, author John Dean will note that when the Republicans took control of the House in 1999, there were 1,439 earmarks in that year’s legislation. By the end of 2005, “there were a staggering 13,998 earmarked expenses, costing $27.3 billion.” Dean will write, “Needless to say, there is nothing conservative in those fiscal actions but there is much that is authoritarian about the wanton spending by those Republicans.” [Dean, 2006]
Lack of Opposition - Kuttner notes that Congressional Democrats have not mounted a systematic, organized denunciation of the DeLay operation. Kuttner believes that many Democrats believe voters are uninterested in what they call “process issues,” and that voters will dismiss complaints as “inside baseball,” of little relevance to their lives. Worse, such complaints “make… us look weak,” as one senior House staffer says. Kuttner writes that many Democrats believe such complaints sound “like losers whining.”
Permanent Republican Majority - If DeLay and his confreres in the White House have their way, there will be, in essence, a permanent Republican majority in the House and hopefully in the Senate as well. Bill Clinton routinely practiced what he called bipartisan “triangulation,” building ad hoc coalitions of Democrats and Republicans to pass his legislative initiatives, and in the process weakening the Democratic leadership. Kuttner writes, “Bush’s presidency, by contrast, has produced a near parliamentary government, based on intense party discipline both within Congress and between Congress and the White House.” Republicans have been busy reworking the district maps of various key states to ensure that Republicans keep their majorities, concentrating perceived Democratic voters to have overwhelming majorities in a few districts, and leaving the Republicans holding smaller majorities in the rest. Both parties have been guilty of such “gerrymandering” in the past, but with DeLay’s recent “super-gerrymandering” of his home state of Texas, the Republican makeup of the Texas House delegation is all but assured. DeLay and other House Republicans are working to redistrict other states in similar fashions. As of the 2004 midterm elections, of the 435 House seats, only around 25 are considered effectively contestable—over 90 percent of the House seats are “safe.” Democrats would have to win a disproportionate, and unlikely, number of those “swing” seats to take back control of the House. Kuttner writes: “The country may be narrowly divided, but precious few citizens can make their votes for Congress count. A slender majority, defying gravity (and democracy), is producing not moderation but a shift to the extremes.”
Control of Voting - Kuttner cites the advent of electronic voting machines and the Help America Vote Act (HAVA) as two reasons why Republicans will continue to have advantages at the voting booth. The three biggest manufacturers of electronic voting machines have deep financial ties to the Republican Party, and have joined with Republicans in opposing a so-called “verifiable paper trail” that could prove miscounts and possible fraudulent results. HAVA, written in response to the 2000 Florida debacle, requires that voters show government-issued IDs to be allowed to vote, a provision that Kuttner says is ripe for use in Republican voter-intimidation schemes. Republicans “have a long and sordid history of ‘ballot security’ programs intended to intimidate minority voters by threatening them with criminal prosecution if their papers are not technically in order,” he writes. “Many civil rights groups see the new federal ID provision of HAVA as an invitation to more such harassment.” The only recourse that voters have to such harassment is to file complaints with the Department of Justice, which, under the aegis of Attorney General John Ashcroft, has discouraged investigation of such claims.
Compliant Court System - Increasingly, federal courts with Republican-appointed judges on the bench have worked closely with Republicans in Congress and the White House to issue rulings favorable to the ruling party. Kuttner notes that if President Bush is re-elected: “a Republican president will have controlled judicial appointments for 20 of the 28 years from 1981 to 2008. And Bush, in contrast to both his father and Clinton, is appointing increasingly extremist judges. By the end of a second term, he would likely have appointed at least three more Supreme Court justices in the mold of Antonin Scalia and Clarence Thomas, and locked in militantly conservative majorities in every federal appellate circuit.” The Supreme Court is already close to becoming “a partisan rubber stamp for contested elections,” Kuttner writes; several more justices in the mold of Justices Antonin Scalia (see September 26, 1986) and Clarence Thomas (see October 13, 1991) would, Kuttner writes, “narrow rights and liberties, including the rights of criminal suspects, the right to vote, disability rights, and sexual privacy and reproductive choice. It would countenance an unprecedented expansion of police powers, and a reversal of the protection of the rights of women, gays, and racial, religious, and ethnic minorities. [It would] overturn countless protections of the environment, workers and consumers, as well as weaken guarantees of the separation of church and state, privacy, and the right of states or Congress to regulate in the public interest.” [American Prospect, 2/1/2004]

Entity Tags: George W. Bush, Democratic Party, Dennis Hastert, Clarence Thomas, Antonin Scalia, Tom DeLay, Robert Kuttner, William Jefferson (“Bill”) Clinton, Republican Party, John Ashcroft, Richard (“Dick”) Cheney, House Republican Whip Organization, James C. (‘Jim’) Wright, Jr., John Dean, Newt Gingrich, Help America Vote Act

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Chuck Rosenberg.Chuck Rosenberg. [Source: Associated Press / Charles Dharapak]Vice President Dick Cheney challenges objections to the White House’s secret, warrantless surveillance program (see Early 2002) by Justice Department officials. Cheney makes his objections during a meeting attended by high-level White House and Justice Department officials, but this does not come to light until a 2007 testimony by Deputy Attorney General James Comey (see May 15, 2007). [Washington Post, 6/7/2007] (Comey will step down from his post in mid-2005.) [Law.com, 4/21/2005] The White House meetings take place one day before White House officials journey to Attorney General John Ashcroft’s hospital room to try to force Ashcroft to give his approval for the NSA-managed surveillance program (see March 10-12, 2004). Ashcroft will refuse to give his approval. Cheney’s key role in leading what the Washington Post calls “a fierce internal battle over the legality of the warrantless surveillance program” is not known until Comey’s 2007 testimony. The White House meeting, held to discuss Justice Department objections to the NSA program, is attended by Cheney, White House counsel and future attorney general Alberto Gonzales, Cheney’s chief counsel David Addington, and others. Comey will testify that at the time, eight Justice Department officials are prepared to resign if the White House doesn’t back down on forcing the department to sign off on the program. Those officials include FBI director Robert Mueller, US attorney Chuck Rosenberg of the northern Virginia district, and Office of Legal Counsel head Jack Goldsmith. [Washington Post, 6/7/2007]

Entity Tags: Washington Post, US Department of Justice, Robert S. Mueller III, John Ashcroft, Alberto R. Gonzales, Chuck Rosenberg, David S. Addington, Richard (“Dick”) Cheney, James B. Comey Jr., Jack Goldsmith

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

After senior Justice Department officials object to the possible illegality of the National Security Agency’s secret domestic surveillance program, and refuse to sign off on its continued use, the program is suspended for several months while Justice Department officials conduct a secret audit of the program. Attorney General John Ashcroft will recertify the program at the end of the month (see Late March, 2004). The suspension is prompted by acting Attorney General James Comey’s refusal to approve the program when it comes up for its regular 45-day review, and a subsequent late-night hospital visit by White House officials Andrew Card and Alberto Gonzales to the hospital room of Attorney General John Ashcroft, where they unsuccessfully attempt to pressure Ashcroft, recuperating from surgery, to overrule Comey and approve the program (see March 10-12, 2004). Bush himself has personally reauthorized the program over 30 times since its inception after the 9/11 attacks (see Early 2002), and reauthorizes it himself after Comey and Ashcroft refuse to give it their approval. This reauthorization prompts a threat of mass resignations by Justice Department officials unless the program is brought under increased oversight. Bush will allow the Justice Department to recommend changes to the program, though those changes have never been made public. The Justice Department audits a selection of cases to see how the NSA is running the program, scrutinizing how NSA officials determine that they have probable cause to wiretap US citizens’ phones and e-mail accounts. The results of that audit have not been made public. When the program was first authorized by Bush’s executive order in early 2002, it was so secret that then-Deputy Attorney General Larry Thompson, who was active in most of the government’s most highly classified counterterrorism operations, was not given access to the program. That decision, among other elements of the program, led many Justice Department officials to worry that the program was operating outside of the Constitution and without proper oversight. Comey, Thompson’s successor, was eventually given authorization to take part in the program and to review intelligence data produced by it. Justice Department officials say that Comey takes part in overseeing the reforms that are put into place during the current audit. However, those reforms do not restrict the NSA’s authority to independently choose its eavesdropping targets, and NSA shift supervisors have the authority to decide for themselves whether there is enough evidence against a US citizen to warrant a secret wiretap. No one at the Justice Department or in the White House needs to be consulted before a wiretap is put into place. [New York Times, 12/31/2005]

Entity Tags: US Department of Justice, National Security Agency, Larry D. Thompson, Associated Press, James B. Comey Jr., John Ashcroft, Alberto R. Gonzales, George W. Bush, Andrew Card

Timeline Tags: Civil Liberties

Richard Clarke, counterterrorism “tsar” from 1998 until October 2001, ignites a public debate by accusing President Bush of doing a poor job fighting al-Qaeda before 9/11. In a prominent 60 Minutes interview, he says: “I find it outrageous that the president is running for re-election on the grounds that he’s done such great things about terrorism. He ignored it. He ignored terrorism for months, when maybe we could have done something to stop 9/11.… I think he’s done a terrible job on the war against terrorism.” He adds: “We had a terrorist organization that was going after us! Al-Qaeda. That should have been the first item on the agenda. And it was pushed back and back and back for months.” He complains that he was Bush’s chief adviser on terrorism, yet he never got to brief Bush on the subject until after 9/11. [CBS News, 3/21/2004; CBS News, 3/21/2004; Guardian, 3/23/2004; Salon, 3/24/2004] Author Philip Shenon will call the interview “gripping” and comment that Clarke is “made for television.” This is because of his “urgent speaking style” and his “shock of white hair and ghostly pallor,” which makes it look like he has “emerged from years of hiding in sunless back rooms of the West Wing to share the terrible secrets he ha[s] learned.” [Shenon, 2008, pp. 277] The next day, his book Against All Enemies is released and becomes a bestseller. [Washington Post, 3/22/2004] He testifies before the 9/11 Commission a few days later (see March 24, 2004).

Entity Tags: George W. Bush, Richard A. Clarke, Philip Shenon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, 2004 Elections

The White House responds aggressively to comments made the previous day by former counterterrorism “tsar” Richard Clarke (see March 24, 2004), who accused the Bush administration of doing little about terrorism prior to 9/11 (see March 21, 2004). Author Philip Shenon will characterize the situation at the White House following the comments as a “near panic” and “genuine alarm,” because Clarke’s allegations are “a direct threat to [President] Bush’s reelection hopes.”
Rice Leads Response - White House chief of staff Andy Card will say that the most upset person is Clarke’s former boss Condoleezza Rice, who takes the lead in responding. She appears on several television shows, claiming—in what Shenon calls a “remarkably angry tone”—on 60 Minutes: “Dick Clarke just does not know what he’s talking about.… Richard Clarke had plenty of opportunities to tell us in the administration that he thought the war on terrorism was moving in the wrong direction, and he chose not to.” Vice President Dick Cheney says that Clarke has a “grudge” against the administration because he did not get a position at the Department of Homeland Security that he wanted, adding that Clarke “wasn’t in the loop, frankly” and “clearly missed a lot of what was going on.” Shenon will comment, “Cheney’s remarks had unintentionally proved exactly what Clarke was saying—that his authority was so diminished in the Bush administration that he had no ability to reach the decision makers in the White house when threats emerged.” [Shenon, 2008, pp. 277-279]
Having It Both Ways? - “You can’t have it both ways,” adds retired General Wesley Clark, the former commander of NATO forces in Bosnia. He was “either the counterterrorism czar and was responsible and knew what was going on, or the administration gave him a title and didn’t put any emphasis on terrorism and that’s why he wasn’t in the loop.” [Rich, 2006, pp. 114-119]
Surrogate Smears - Surrogates try dirty tactics, for example conservative columnist Robert Novak suggests that Clarke is motivated by racial prejudice against Rice, a “powerful African-American woman,” and conservative commentator Laura Ingraham asks why “this single man” is such a “drama queen.” Although Clarke anticipated attacks, he is surprised at their ferocity. [Shenon, 2008, pp. 277-279] Former White House communications director Karen Hughes interrupts her book tour to criticize Clarke for supposedly promoting his own book, Against All Enemies. Right-wing bloggers, perhaps given direction by White House officials, begin swapping lascivious and baseless rumors about Clarke’s sexual orientation. [Rich, 2006, pp. 114-119] The Washington Times accuses Clarke of being “a political chameleon who is starved for attention after years of toiling anonymously in government bureaucracies.” Neoconservative columnist Charles Krauthammer calls Clarke “a partisan perjurer.” At the extreme edge of the attack is conservative author Ann Coulter, who with no evidence whatsoever, accuses Clarke of racism: she portrays him as thinking of Condoleezza Rice, “[T]he black chick is a dummy” whom Bush promoted from “cleaning the Old Executive Office Building at night.” [Salon, 3/29/2004] Senator John McCain (R-AZ) calls the attacks “the most vigorous offensive I’ve ever seen from the administration on any issue.” [Washington Post, 3/28/2004]
Clarke's Counters - Republican leaders also threaten to release testimony Clarke gave in 2002, and Clarke says he welcomes the release. The testimony remains classified. [Associated Press, 3/26/2004; Associated Press, 3/28/2004] Clarke calls on Rice to release all e-mail communications between the two of them before 9/11; these are not released either. [Guardian, 3/29/2004] Despite the attacks, Clarke’s partners in a consulting business stick with him, as does ABC News, which recently hired him as a terrorism consultant. [Shenon, 2008, pp. 277-279]
Mishandled Response? - According to Reuters, a number of political experts conclude, “The White House may have mishandled accusations leveled by… Clarke by attacking his credibility, keeping the controversy firmly in the headlines into a second week.” [Reuters, 3/29/2004]
No Evidence of Contradiction - However, a review of declassified citations from Clarke’s 2002 testimony provides no evidence of contradiction, and White House officials familiar with the testimony agree that any differences are matters of emphasis, not fact. [Washington Post, 4/4/2004]

Entity Tags: Robert Novak, John McCain, Karen Hughes, Philip Shenon, Condoleezza Rice, Charles Krauthammer, Laura Ingraham, Andrew Card, Ann Coulter, Wesley Clark, Richard (“Dick”) Cheney, Richard A. Clarke, Washington Times

Timeline Tags: Complete 911 Timeline

The White House discloses to Fox News that former counterterrorism “tsar” Richard Clarke was the anonymous official who gave a background briefing to reporters in August 2002 praising the Bush administration’s record on terrorism (see August 22, 2002). This move, which violates a longstanding confidentiality policy, is made hours before Clarke is to testify to the 9/11 Commission (see March 24, 2004). Clarke recently went public with criticism of the administration (see March 21, 2004) and is being attacked by it (see March 22, 2004 and Shortly After). Author Philip Shenon will comment, “In agreeing to allow Fox News to reveal that Clarke had given the 2002 briefing, the White House was attempting to paint him as a liar—a one-time Bush defender who had become a Bush critic in order to sell a book.” National Security Adviser Condoleezza Rice says to the media: “There are two very different stories here. These stories can’t be reconciled.” [Fox News, 3/24/2004; Washington Post, 3/25/2004; Washington Post, 3/26/2004; Shenon, 2008, pp. 280-281]
Opposing Spin? - Shenon will add that in the briefing Clarke was “spin[ning] the facts” in order to try to knock down an article unfavorable to the administration published by Time magazine, although “the spin took him perilously close to dishonesty, albeit the sort of dishonesty practiced every day in official Washington.” Philip Zelikow, the 9/11 Commission’s executive director and a long-term opponent of Clarke (see January 3, 2001 and January 27, 2003), is delighted by the story and tells a Commission staffer that it might be enough to end the Clarke “circus,” adding, “Does it get any better than this?” [Shenon, 2008, pp. 280-281] Later trying a similar line of attack, Republican Senate leader Bill Frist will ask “[i]f [Clarke] lied under oath to the United States Congress” in closed testimony in 2002, and also ask if Clarke is attempting to promote his book. According to media critic Frank Rich, Frist’s credibility is undermined by his use of his Senate status to promote his own book, a virtually worthless primer entitled When Every Moment Counts: What You Need to Know About Bioterrorism from the Senate’s Only Doctor. Frist’s accusation that Clarke revealed classified information in his book falls flat when Clarke notes that the White House vetted his book for possible security transgressions before publication. [Washington Post, 3/27/2004; Rich, 2006, pp. 114-119]
No Evidence of Contradiction - A review of declassified citations from Clarke’s 2002 testimony provides no evidence of contradiction, and White House officials familiar with the testimony agree that any differences are matters of emphasis, not fact. [Washington Post, 4/4/2004]

Entity Tags: Philip Shenon, Richard A. Clarke, Condoleezza Rice, Philip Zelikow, Washington Times, Frank Rich, Bill Frist

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, 2004 Elections

Richard Clarke sworn in before the 9/11 Commission.Richard Clarke sworn in before the 9/11 Commission. [Source: CBC]Former counterterrorism “tsar” Richard Clarke testifies before the 9/11 Commission. Due to publicity generated by the publication of his book and a controversial appearance on 60 Minutes (see March 21, 2004), it is, in the words of author Philip Shenon, a “true Washington spectacle” and “one of those moments in the capital when anyone of importance in the city [is] in front of a television set.” Shenon will add, “It was being compared by reporters to the sort of drama that John Dean’s testimony provided in Watergate or Lieutenant Colonel Oliver North’s testimony offered in the Iran-Contra affair.” [Shenon, 2008, pp. 281-282]
Clarke Offers Apology - Clarke’s opening statement consists of little more than an apology to the relatives of the 9/11 victims. He says: “Your government failed you, those entrusted with protecting you failed you, and I failed you. For that failure, I would ask… for your understanding and forgiveness.” This leads to a moment of silence, then gasps and sobs. Shenon will point out, “It was the first apology that the 9/11 families had heard from anybody of importance in the Bush administration,” adding that it “was the moment of catharsis that many of the wives and husbands and children of the victims had been waiting for.”
Praises Clinton, Criticizes Bush - Under questioning, Clarke praises the Clinton administration, saying, “My impression was that fighting terrorism, in general, and fighting al-Qaeda, in particular, were an extraordinarily high priority in the Clinton administration—certainly no higher priority.” But he is very critical of the Bush administration, stating, “By invading Iraq… the president of the United States has greatly undermined the war on terrorism.” He says that under Bush before 9/11, terrorism was “an important issue, but not an urgent issue.… [CIA Director] George Tenet and I tried very hard to create a sense of urgency by seeing to it that intelligence reports on the al-Qaeda threat were frequently given to the president and other high-level officials. But although I continue to say it was an urgent problem, I don’t think it was ever treated that way.” He points out that he made proposals to fight al-Qaeda in late January 2001. While the gist of them was implemented after 9/11, he complains, “I didn’t really understand why they couldn’t have been done in February [2001].” He says that with a more robust intelligence and covert action program, “we might have been able to nip [the plot] in the bud.”
Republican Commissioners Ask Tough Questions - However, Clarke faces tough questioning from some of the Republican commissioners. Jim Thompson, who had been in contact with the White House before the hearing (see Morning, March 24, 2004), challenges Clarke over a briefing he gave in 2002 (see August 22, 2002 and March 24, 2004), which, according to Thompson, contradicts what Clarke is saying now. In addition, fellow Republican John Lehman confronts Clarke over what he sees as discrepancies between Clarke’s book and his private interviews with the Commission. Clarke replies that the differences arose because the Commission did not ask him about all the issues he covered in his book, such as his opposition to the invasion of Iraq. He adds that he will not accept any position in any administration formed by Democratic presidential candidate John Kerry.
Clarke Approved Saudi Flights - Clarke also clears up a mystery about the departure of Saudi Arabian nationals after the attacks, which has caused some controversy (see September 14-19, 2001), saying that he was the White House official that approved them. He did this after clearing it with the FBI, although he does not know “what degree of review the FBI did over those names.” [Washington Post, 3/24/2004; New York Times, 3/24/2004; 9/11 Commission, 3/24/2004; Shenon, 2008, pp. 282-289]
Testimony 'Arresting' - Author and media critic Frank Rich will later call Clarke’s testimony “arresting.” Rich will write that Clarke’s forceful, confident demeanor—“sonorous voice, secret-agent aura, and vaguely intimidating body language”—serves to brush back antagonistic Republicans such as Lehman and Thompson. Rich will write that the juxtaposition of Clarke’s damning testimony with President Bush’s bizarre comedy routine that same evening (pretending to hunt for Iraqi WMD under the Oval Office furniture—see March 24, 2004) is jarring. [Rich, 2006, pp. 114-119]

Entity Tags: John Lehman, Clinton administration, Richard A. Clarke, Bush administration (43), Frank Rich, 9/11 Commission, James Thompson

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, 2004 Elections

Former counterterrorism “tsar” Richard Clarke, lambasted by Bush administration supporters (see March 24, 2004) for his criticism of the administration’s foreign policies (see March 21, 2004 and March 24, 2004), counters some of that criticism by noting that when he resigned from the administration a year earlier, he was highly praised by President Bush (see January 31, 2003).
Differing Characterizations from Administration - On Meet the Press, Clarke reads aloud the handwritten note from Bush that lauds his service, telling host Tim Russert: “This is his writing. This is the president of the United States’ writing. And when they’re engaged in character assassination of me, let’s just remember that on January 31, 2003: ‘Dear Dick, you will be missed. You served our nation with distinction and honor. You have left a positive mark on our government.’ This is not the normal typewritten letter that everybody gets. This is the president’s handwriting. He thinks I served with distinction and honor. The rest of his staff is out there trying to destroy my professional life, trying to destroy my reputation, because I had the temerity to suggest that a policy issue should be discussed. What is the role of the war on terror vis-a-vis the war in Iraq? Did the war in Iraq really hurt the war on terror? Because I suggest we should have a debate on that, I am now being the victim of a taxpayer-paid—because all these people work for the government—character assassination campaign.”
Never Briefed Bush on Terrorism - Clarke also notes that the letter proves he never briefed Bush on terrorism because he was not allowed to provide such a briefing (see Early January 2001). He tells Russert: “You know, they’re saying now that when I was afforded the opportunity to talk to him about cybersecurity, it was my choice. I could have talked about terrorism or cybersecurity. That’s not true. I asked in January to brief him, the president, on terrorism, to give him the same briefing I had given Vice President Cheney, Colin Powell, and [Condoleezza] Rice. And I was told, ‘You can’t do that briefing, Dick, until after the policy development process.’” [MSNBC, 3/28/2004; Salon, 3/29/2004]
Administration Should Declassifiy August 2002 Briefing - Clarke also calls on the administration to declassify “all six hours” of the briefing he gave to top officials in August 2002 about the impending threat of a terrorist attack (see August 22, 2002). The administration has selectively declassified material from that briefing to impugn Clarke’s honesty and integrity. “I would welcome it being declassified,” Clarke says. “But not just a little line here and there—let’s declassify all six hours of my testimony.” He also asks that the administration declassify the strategy reports from 2001 that he authored, and all of his e-mails between January 2001 and September 2001, to prove that the charges laid against him by the administration are false. He calls on the White House to end what he calls the “vicious personal attacks” and “character assassination,” and focus on issues. “The issue is not about me,” he tells a CNN reporter. “The issue is about the president’s performance in the war on terrorism.” [MSNBC, 3/28/2004; CNN, 3/28/2004]

Entity Tags: Colin Powell, George W. Bush, Condoleezza Rice, Richard (“Dick”) Cheney, Bush administration (43), Richard A. Clarke, Tim Russert

Timeline Tags: Complete 911 Timeline, 2004 Elections

Deputy Attorney General James Comey sends a classified memo to Attorney General John Ashcroft. The contents of the memo are kept secret, but the American Civil Liberties Union (ACLU) will later learn that it is a briefing and summary of the Office of Legal Counsel (OLC)‘s preliminary conclusions regarding the Terrorist Surveillance Program (see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: James B. Comey Jr., American Civil Liberties Union, Terrorist Surveillance Program, US Department of Justice, Office of Legal Counsel (DOJ), John Ashcroft

Timeline Tags: Civil Liberties

Attorney General John Ashcroft recertifies the NSA’s warrantless wiretapping program as being within the law, three weeks after he and his deputy, James Comey, refused to certify it. The program had come under question in early 2004, when Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel, wrote to Ashcroft and Comey expressing his doubts about the program’s legality (see September 9, 2007). For those three weeks, the program operated without Justice Department approval; President Bush personally recertified it himself, though it was suspended and subjected to an internal review (see March 12-Mid-2004). Ashcroft had previously refused to recertify the program while recuperating from surgery, despite pressure from White House officials Alberto Gonzales and Andrew Card (see March 10-12, 2004). Ashcroft, Comey, Goldsmith, and other Justice Department officials had even threatened to resign en masse if Bush recertified the program without their department’s support; Bush promised to revamp the program to address Ashcroft and Comey’s objections to the program, though what those changes are remains unclear. [Boston Globe, 5/16/2007; Associated Press, 6/7/2007]

Entity Tags: Andrew Card, Alberto R. Gonzales, George W. Bush, Jack Goldsmith, National Security Agency, James B. Comey Jr., US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

At a speech in Hershey, Pennsylvania, supporting the USA Patriot Act (see October 26, 2001), President Bush tells listeners that all US surveillance efforts are done with warrants from the Foreign Intelligence Surveillance Act (FISA) Court: “For years, law enforcement used so-called roving wire taps to investigate organized crime. You see, what that meant is if you got a wire tap by court order—and, by the way, everything you hear about requires court order, requires there to be permission from a FISA court, for example.… See, with court approval, we have long used roving wire taps to lock up monsters—mobsters. Now [with the Patriot Act in effect] we have a chance to lock up monsters, terrorist monsters.” [White House, 4/19/2004] The next day, Bush makes a similar claim during another pro-Patriot Act speech in Buffalo. He tells listeners: “[T]here are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires—a wiretap requires a court order. Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so. It’s important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. But a roving wiretap means—it was primarily used for drug lords. A guy, a pretty intelligence drug lord would have a phone, and in old days they could just get a tap on that phone. So guess what he’d do? He’d get him another phone, particularly with the advent of the cell phones. And so he’d start changing cell phones, which made it hard for our DEA types to listen, to run down these guys polluting our streets. And that changed, the law changed on—roving wiretaps were available for chasing down drug lords. They weren’t available for chasing down terrorists, see? And that didn’t make any sense in the post-9/11 era. If we couldn’t use a tool that we’re using against mobsters on terrorists, something needed to happen. The Patriot Act changed that. So with court order, law enforcement officials can now use what’s called roving wiretaps, which will prevent a terrorist from switching cell phones in order to get a message out to one of his buddies.” [White House, 4/20/2004] Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48] Klein will call Bush’s description of the surveillance program “disingenuous,” and continue: “They present it as about phone calls. They’re just watching a few bad people who make phone calls to al-Qaeda and the Middle East, and you notice they don’t talk about the Internet hardly at all. That part of it hasn’t been revealed, because if they did, Americans would realize it’s not just a few people; it’s everybody, because the data they’re handing over is not selected out. When you run fiber optics through a splitter and you send all that data to a secret room, there’s no selecting going on there at all.… They have no way of sifting it out unless they look through it later. Now they can claim, ‘Oh, we are right as rain; we’re only doing the legal thing and selecting out a few people that we’re legally entitled to,’ but that’s only after they get all the data. The analogy I use: If the government claims: ‘Well, when you do your taxes, why don’t you just write me a blank check and we’ll fill in the amount? Don’t worry. We’ll do it legal. We’ll fill in the right amount,’ would you do that? Nobody would trust the government by writing a blank check to them. It’s the same thing with the data we’re giving them.… [T]he Fourth Amendment specifically bans general warrants. It calls for specific warrants in which the things to be seized and the persons to be seized are specifically named. There’s a reason for that. It’s to protect against arbitrary government power. And what they’ve done is to trample over the Fourth Amendment by basically instituting a general warrant on the Internet.” [PBS Frontline, 5/15/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Mark Klein, National Security Agency, George W. Bush

Timeline Tags: Civil Liberties

A Supreme Court Justice, during the oral arguments in the cases of Jose Padilla and Yaser Esam Hamdi, asks how the Court can be certain that government interrogators are not abusing detainees. Deputy Solicitor General Paul Clement answers that the court will have to “trust the executive to make the kind of quintessential military judgments that are involved in things like that.” [First, 6/2004 pdf file] The government’s legal strategy is so inflexible in part because of Vice President Cheney, who through his lawyer David Addington refuses to allow the Justice Department to budge from its intransigent position. For months, Solicitor General Theodore Olson and his deputy, Clement, have pled for modest shifts in policy that would bolster their arguments in court. Hamdi has languished in a Navy brig for two and a half years without a hearing or a lawyer. British citizen Shafiq Rasul has been held under similar conditions at Guantanamo for even longer (see November 28, 2001 and January 11, 2002-April 30, 2002). Olson says that Cheney’s position—the president has unlimited authority to order the indefinite detention of anyone suspected of terrorist activity without benefit of counsel or any judiciary intervention—would be easier to argue in court if he could “show them that you at least have some system of due process in place” to ensure against wrongful detention, according to a senior Justice Department official familiar with the issue. But Addington wins the argument, overriding Olson and the Justice Department by his arguments that any such retreat would restrict the freedom of future presidents and open the door to further lawsuits. The Supreme Court will find against Cheney in both the Hamdi (see June 28, 2004) and Rasul (see June 28, 2004) cases. Olson will resign as solicitor general 11 days later. [Washington Post, 6/25/2007]

Entity Tags: US Department of Justice, David S. Addington, Jose Padilla, Paul Clement, Richard (“Dick”) Cheney, Theodore (“Ted”) Olson, Shafiq Rasul, Yaser Esam Hamdi, US Supreme Court

Timeline Tags: Torture of US Captives

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Entity Tags: Mark Klein, AT&T

Timeline Tags: Civil Liberties

A Pentagon report determines that conditions at the detention facilities at Guantanamo Bay, Cuba, and Charleston, South Carolina used to house “enemy combatants” are problematic at best. The facilities house three designated enemy combatants: Jose Padilla (see May 8, 2002), Yaser Esam Hamdi (see December 2001), and Ali Saleh Kahlah al-Marri (see December 12, 2001). The report, entitled “Brief to the Secretary of Defense on Treatment of Enemy Combatants Detained at Naval Station Guantanamo Bay, Cuba, and Naval Consolidated Brig Charleston,” is written by the Navy’s Vice Admiral A.T. Church III and by Marine Brigadier General D.D. Thiessen. The focus of the report is to “[e]nsure Department of Defense orders concerning proper treatment of enemy combatants.” The report documents extensive problems at both locations. It cites the following as some of the problems:
bullet “One detainee has Koran removed from cell as part of JFCOM [Joint Forces Command] interrogation plan. Muslim chaplain not available.”
bullet “One detainee in Charleston has mattress removed as part of JFCOM-approved interrogation plan.”
bullet “One detainee in each location currently not authorized ICRC [Red Cross] visits due to interrogation plans in progress.”
bullet “One detainee in Charleston has Koran, mattress, and pillow removed and is fed cold MREs as part of interrogation plan.” This citation has a footnote that reads, “After completion of current interrogation,” removal of the Koran as an incentive to answer questions “will no longer be used at Charleston.”
bullet “Limited number and unique status of detainees in Charleston precludes interaction with other detainees. Argument could be made that this constitutes isolation.”
bullet At the Charleston brig, “Christian chaplain used to provide socialization, but could be perceived as forced proselytization.”
Nonetheless, the report concludes, “No evidence of noncompliance with DoD orders at either facility.” The authors assume that “treatment provided for in presidential and SECDEF orders constitutes ‘humane treatment.’” [Progressive, 3/2007] When Church presents his report to journalists (see May 12, 2004), he says he only found eight “minor infractions.”

Entity Tags: US Department of Defense, Jose Padilla, D.D. Thiessen, Ali Saleh Kahlah al-Marri, Albert T. Church III, Yaser Esam Hamdi

Timeline Tags: Torture of US Captives

Attorney General John Ashcroft again invokes the “state secrets” privilege (see March 9, 1953), forbidding former FBI translator Sibel Edmonds from testifying in a case brought by hundreds of families of September 11 victims (see October 18, 2002). [New York Times, 5/20/2004] Four weeks earlier, on April 26, the Justice Department had obtained a temporary court order preventing her from testifying before the court. [Independent, 4/2/2004; Government Executive, 4/30/2004] The families, represented by the law firm Motley-Rice, allege that a number of banks and two members of the Saudi royal family provided financial support to al-Qaeda. [New York Times, 5/20/2004] Ashcroft’s order retroactively classifies information it provided Senators Chuck Grassley and Patrick Leahy (see June 17, 2002) concerning former FBI translator Sibel Edmonds and her allegations. Among the documents to be “reclassified” are the follow-up letters sent by Grassley and Leahy to the FBI which they posted on their website. Their staff members are prohibited from discussing the information, even though it is now public knowledge. The order bars Edmonds from answering even simple questions like, “When and where were you born?” “What languages do you speak?” and “Where did you go to school?” [New York Times, 5/20/2004; Boston Globe, 7/5/2004; Asia Times, 8/6/2004; Vanity Fair, 9/2005] In response to the announcement, Grassley says: “I think it’s ludicrous, because I understand that almost all of this information is in the public domain and has been very widely available. This classification is very serious, because it seems like the FBI would be attempting to put a gag order on Congress.” [New Republic, 6/7/2004]

Entity Tags: US Department of Justice, Sibel Edmonds, Charles Grassley, Patrick J. Leahy

Timeline Tags: Complete 911 Timeline, Civil Liberties

Newsweek reveals the existence of the January 9, 2002 draft memo written by Justice Department lawyers John Yoo and Robert Delahunty (see January 9, 2002). [Newsweek, 5/21/2004]

Entity Tags: Robert J. Delahunty, John C. Yoo

Timeline Tags: Torture of US Captives, Civil Liberties

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

Jack Goldsmith, once considered a rising star in the Bush administration (see October 6, 2003), resigns under fire from his position as chief of the Justice Department’s Office of Legal Counsel (OLC). In his nine-month tenure, Goldsmith fought against the administration’s warrantless wiretapping program, its advocacy of torture, and its policy of extrajudicial detention and trial for terror suspects. Goldsmith will not discuss his objections to the administration’s policy initiatives until September 2007, when he will give interviews to a variety of media sources in anticipation of the publication of his book, The Terror Presidency. Goldsmith led a small, in-house revolt of administration lawyers against what they considered to be the constitutional excesses of the legal policies advocated by the administration in its war on terrorism. “I was disgusted with the whole process and fed up and exhausted,” he will recall. Goldsmith chooses to remain quiet about his resignation, and as a result, his silence will be widely misinterpreted by media, legal, and administration observers. Some even feel that Goldsmith should be investigated for his supposed role in drafting the torture memos (see January 9, 2002, August 1, 2002, and December 2003-June 2004) that he had actually opposed. “It was a nightmare,” Goldsmith will recall. “I didn’t say anything to defend myself, except that I didn’t do the things I was accused of.” [New York Times Magazine, 9/9/2007] Goldsmith will not leave until the end of July, and will take a position with the Harvard University Law School. Unlike many other Justice Department officials, he will not be offered a federal judgeship, having crossed swords with White House lawyers too many times. [Savage, 2007, pp. 191]

Entity Tags: US Department of Justice, Office of Legal Counsel (DOJ), Jack Goldsmith

Timeline Tags: Civil Liberties

Yaser Esam Hamdi.Yaser Esam Hamdi. [Source: Associated Press]In the case of Yaser Esam Hamdi v. Donald Rumsfeld, the Supreme Court rules 8-1 that, contrary to the government’s position, Hamdi (see December 2001), as a US citizen held inside the US, cannot be held indefinitely and incommunicado without an opportunity to challenge his detention. It rules he has the right to be given the opportunity to challenge the basis for his detention before an impartial court. Justice Sandra Day O’Connor writes for the majority: “It would turn our system of checks and balances on its head to suggest that a citizen could not make his way to court with a challenge to the factual basis for his detention by his government, simply because the Executive opposes making available such a challenge. Absent suspension of the writ by Congress, a citizen detained as an enemy combatant is entitled to this process.” Hamdi, on the other hand, apart from military interrogations and “screening processes,” has received no process. Due process, according to a majority of the Court, “demands some system for a citizen detainee to refute his classification [as enemy combatant].” A “citizen-detainee… must receive notice of the factual basis for his classification, and a fair opportunity to rebut the government’s factual assertions before a neutral decision-maker.” However, O’Connor writes, “an interrogation by one’s captor… hardly constitutes a constitutionally adequate factfinding before a neutral decisionmaker.”
Conservative Dissent: President Has Inherent Power to Detain Citizens during War - Only Justice Clarence Thomas affirms the government’s opinion, writing, “This detention falls squarely within the federal government’s war powers, and we lack the expertise and capacity to second-guess that decision.” [Supreme Court opinion on writ of certiorari. Shafiq Rasul, et al. v. George W. Bush, et al., 6/28/2004] Thomas adds: “The Founders intended that the president have primary responsibility—along with the necessary power—to protect the national security and to conduct the nation’s foreign relations. They did so principally because the structural advantages of a unitary executive are essential in these domains.” [Dean, 2007, pp. 105]
'A State of War Is Not a Blank Check for the President' - The authority to hold Hamdi and other such US citizens captured on enemy battlefields derives from Congress’s Authorization to Use Military Force (AUMF—see September 14-18, 2001). Justice Antonin Scalia dissents from this portion of the majority ruling, saying that because Congress had not suspended habeas corpus, Hamdi should either be charged with a crime or released. The Court also finds that if Hamdi was indeed a missionary and not a terrorist, as both he and his father claim, then he must be freed. While the Court does not grant Hamdi the right to a full criminal trial, it grants him the right to a hearing before a “neutral decision-maker” to challenge his detention. O’Connor writes: “It is during our most challenging and uncertain moments that our nation’s commitment to due process is most severely tested; and it is in these times that we must preserve our commitment at home to the principles for which we fight abroad.… We have long made clear that a state of war is not a blank check for the president when it comes to the rights of the nation’s citizens.”
Affirms President's Right to Hold US Citizens Indefinitely - Although the media presents the ruling as an unmitigated defeat for the Bush administration, it is actually far more mixed. The White House is fairly pleased with the decision, insamuch as Hamdi still has no access to civilian courts; the administration decides that Hamdi’s “neutral decision-maker” will be a panel of military officers. Hamdi will not have a lawyer, nor will he have the right to see the evidence against him if it is classified. This is enough to satisfy the Court’s ruling, the White House decides. In 2007, author and reporter Charlie Savage will write: “[T]he administration’s legal team noted with quiet satisfaction that, so long as some kind of minimal hearing was involved, the Supreme Court had just signed off on giving presidents the wartime power to hold a US citizen without charges or a trial—forever.” The Justice Department says of the ruling that it is “pleased that the [Court] today upheld the authority of the president as commander in chief of the armed forces to detain enemy combatants, including US citizens.… This power, which was contested by lawyers representing individuals captured in the War on Terror, is one of the most essential authorities the US Constitution grants the president to defend America from our enemies.” [Savage, 2007, pp. 193-194]

Entity Tags: Sandra Day O’Connor, Antonin Scalia, Donald Rumsfeld, Yaser Esam Hamdi, Clarence Thomas, Charlie Savage

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Sibel Edmonds.Sibel Edmonds. [Source: Linda Spillers/ Getty]US District Judge Reggie B. Walton, appointed by George W. Bush, dismisses Sibel Edmonds’ lawsuit (see June 2002) against the Justice Department, accepting the government’s argument that allowing the case to proceed would jeopardize national security [Associated Press, 7/6/2004; CNN, 7/7/2004] and infringe upon its October 2002 declaration (see October 18, 2002) that classified everything related to Edmonds’ case. Walton refuses to explain his ruling, insisting that to do so would expose sensitive secrets. “The Court finds that the plaintiff is unable to establish her First Amendment, Fifth Amendment, and Privacy Act claims without the disclosure of privileged information, nor would the defendants be able to defend against these claims without the same disclosures… the plaintiff’s case must be dismissed, albeit with great consternation, in the interests of national security,” Walton says in his ruling. [CNN, 7/7/2004] Walton never heard evidence from Edmonds’ lawyers. [Associated Press, 7/6/2004; Associated Press, 7/7/2004]

Entity Tags: Reggie B. Walton, Federal Bureau of Investigation, Sibel Edmonds

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Navy General Counsel Alberto J. Mora writes a secret, but unclassified, memo to Vice Admiral Albert Church, who led a Pentagon investigation into abuses at the US detention facility at Guantanamo Bay. Mora writes the memo in an attempt to stop what he sees as a disastrous and unlawful policy of authorizing cruel and inhuman treatment of terror suspects. The memo details in chronological fashion Mora’s earlier attempts to speak out against the Bush administration’s decision to circumvent the Geneva Conventions (see January 9, 2002 and January 11, 2002).
Specific Problems - Mora, a veteran of the Reagan and George H. W. Bush administrations and a strong supporter of the “war on terror,” argues that a refusal to outlaw cruelty toward US-held terrorist suspects is an implicit invitation to abuse. Mora also writes that the Bush administration’s legal arguments that justify an expansion of executive power in everything from interrogations to warrantless wiretapping are “unlawful,” “dangerous,” and “erroneous” legal theories. Not only are they wrong in granting President Bush the right to authorize torture, he warns that they may leave US personnel open to criminal prosecution. While the administration has argued that it holds to humane, legal standards in interrogation practices (see January 12, 2006), Mora’s memo shows that from the outset of the administration’s “war on terror,” the White House, the Justice Department, and the Defense Department intentionally skirted and at times ignored domestic and international laws surrounding interrogation and detention of prisoners.
Cruelty and Torture - Mora will later recall the mood in the Pentagon: “The mentality was that we lost three thousand Americans [on 9/11], and we could lose a lot more unless something was done. It was believed that some of the Guantanamo detainees had knowledge of other 9/11-like operations that were under way, or would be executed in the future. The gloves had to come off. The US had to get tougher.” But, Mora will say, the authorization of cruel treatment of detainees is as pernicious as any defined torture techniques that have been used. “To my mind, there’s no moral or practical distinction,” he says. “If cruelty is no longer declared unlawful, but instead is applied as a matter of policy, it alters the fundamental relationship of man to government. It destroys the whole notion of individual rights. The Constitution recognizes that man has an inherent right, not bestowed by the state or laws, to personal dignity, including the right to be free of cruelty. It applies to all human beings, not just in America—even those designated as ‘unlawful enemy combatants.’ If you make this exception, the whole Constitution crumbles. It’s a transformative issue.… The debate here isn’t only how to protect the country. It’s how to protect our values.” [Mora, 7/7/2004 pdf file; New Yorker, 2/27/2006]

Entity Tags: Geneva Conventions, Richard (“Dick”) Cheney, US Department of Defense, Alberto Mora, Albert T. Church III, US Department of Justice, Bush administration (43)

Timeline Tags: Torture of US Captives, Civil Liberties

Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel (OLC), sends a classified memo to Attorney General John Ashcroft. The contents of the memo remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo concerns the ramifications of a recent Supreme Court decision on gathering foreign intelligence. Presumably, Goldsmith is writing about the Hamdi decision, in which the Court ruled that enemy combatants and detainees have the right to due process in the US justice system (see June 28, 2004), but this is by no means certain. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Jack Goldsmith, American Civil Liberties Union, US Supreme Court, US Department of Justice, Office of Legal Counsel (DOJ), John Ashcroft

Timeline Tags: Civil Liberties

Jacob Hornberger.Jacob Hornberger. [Source: Institute for Historical Review]Jacob Hornberger, the president of the Future of Freedom Foundation, writes that the Pentagon has learned “when the judiciary issues an order, the Pentagon is required to obey it,” which is “why the government is now permitting Ali Saleh al-Marri to meet with his attorney as part of his habeas corpus proceeding in federal district court in South Carolina.” Al-Marri is one of three “enemy combatants” (see June 23, 2003) designated by President Bush. Until recently, the Pentagon had refused to allow al-Marri to contact his lawyers, who have been challenging his detention and enemy combatant status in the US courts, but a recent Supreme Court decision scotched that procedure (see June 28, 2004). Hornberger compares al-Marri’s treatment to that of ousted Iraqi dictator Saddam Hussein, whom Iraqi and US officials have restricted from consulting with his own lawyers in Iraq. Al-Marri, before being removed from the US judicial system, “would have been entitled to all the rights and guarantees recognized in the Constitution and Bill of Rights, including being informed of the charges against him, compulsory process of witnesses, cross-examination of adverse witnesses, assistance of counsel, and a jury trial,” Hornberger writes. “If the jury had acquitted him, as juries recently did with defendants in federal terrorism cases brought in Detroit and Boise, he would have walked away from the federal courtroom a free man. By removing al-Marri from the jurisdiction of the federal court on the eve of his trial and placing him into military custody as an ‘enemy combatant,’ the Justice Department and the Pentagon, working together, effectively hijacked our criminal justice system and sabotaged our constitutional order.” [Atlanta Inquirer, 8/21/2004; Future of Freedom Foundation, 2007]

Entity Tags: George W. Bush, Ali Saleh Kahlah al-Marri, US Department of Defense, Saddam Hussein, Jacob Hornberger

Timeline Tags: Torture of US Captives

Vice President Dick Cheney says that a victory by Democratic presidential candidate John Kerry in the upcoming election will put the US at risk of another “devastating” terrorist attack along the lines of 9/11. Kerry’s running mate, John Edwards, calls Cheney’s remarks “un-American.” Cheney tells a group of Republican supporters in Iowa that they need to make “the right choice” in the November 2 election. “If we make the wrong choice, then the danger is that we’ll get hit again—that we’ll be hit in a way that will be devastating from the standpoint of the United States,” Cheney says. “And then we’ll fall back into the pre-9/11 mindset, if you will, that in fact these terrorist attacks are just criminal acts and that we’re not really at war. I think that would be a terrible mistake for us.” Edwards responds: “Dick Cheney’s scare tactics crossed the line.… What he said to the American people was that if you go to the polls in November and elect anyone other than us, and another terrorist attack occurs, then it’s your fault. This is un-American. The truth is that it proves once again that they will do anything and say anything to keep their jobs.” Edwards says that a Kerry administration “will keep the American people safe, and we will not divide the country to do it.” Cheney spokeswoman Anne Womack says Cheney’s comments merely reflect “a difference in policy” between the Bush/Cheney and Kerry/Edwards tickets, and adds: “This is nothing new. This is nothing inconsistent with his views. This is an overreaction to something we have used repeatedly and consistently. This is something that both the president and vice president have talked about consistently, the need to learn the lessons of 9/11. He was not connecting the dots.” Later, Womack complains that Cheney’s remarks were taken out of context: “If you take the whole quote, the vice president stands by his statement. But if you just take a chunk, that’s not what he meant.” [CNN, 9/7/2004]

Entity Tags: Richard (“Dick”) Cheney, Anne Womack, John Kerry, John Edwards

Timeline Tags: Complete 911 Timeline, 2004 Elections

Accused terrorist Yaser Esam Hamdi returns to Saudi Arabia aboard a US military jet. Earlier in 2004, the US Supreme Court ruled that the US government could not continue to hold Hamdi, a US citizen, as an enemy combatant without allowing him to challenge that status (see June 28, 2004). The US government was still free to bring charges against him but instead chose to negotiate with his attorneys about a release. In exchange for his release, Hamdi agrees to renounce his US citizenship and pledge never to travel to Afghanistan, Iraq, Israel, Pakistan, Syria, the Palestinian West Bank, or Gaza. He must also report any intent to travel outside Saudi Arabia. [CNN, 10/14/2004]
'Shocking Admission' of Lack of Criminal Case against Hamdi - Andrew Cohen comments in the Los Angeles Times, “If Hamdi is such a minor threat today that he can go back to the Middle East without a trial or any other proceeding, it’s hard not to wonder whether the government has been crying wolf all these years.” He calls the release “a shocking admission from the government that there is not now, and probably never has been, a viable criminal case against Hamdi.” [Los Angeles Times, 8/16/2004]
Hamdi Case Used to Set Favorable Precedent? - Author and reporter Charlie Savage will agree with Cohen. “Hamdi’s release meant that a prisoner who the White House had once sworn was too dangerous to be allowed access to a lawyer was now going free—just like hundreds of prisoners from Guantanamo who were held without trial for years and then quietly released,” Savage will write. He will note that many administration critics believe Hamdi’s case had been used as a tool by the administration to get a favorable judicial precedent and, once that precedent had been put in place, the administration had no more use for Hamdi and threw him out of the country rather than actually continue with a problematic trial or legal proceeding. [Savage, 2007, pp. 199-200]

Entity Tags: Charlie Savage, Yaser Esam Hamdi, Andrew Cohen

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The New York Times agrees to a White House request to withhold publication of a potential “bombshell” story: an in-depth article revealing an enormous, and possibly illegal, warrantless wiretapping program executed by the NSA at President Bush’s behest after the 9/11 attacks. The Times will publish the story almost a year later (see December 15, 2005). In August 2006, the Times’s public editor, Byron Calame, will confirm the delay, and note that he has been “increasingly intrigued” by the various descriptions of the delay by Times editor Bill Keller (see December 16, 2005) and others. Keller will tell Calame that, contrary to some statements he and others have made, the story was originally scheduled to be published just days before the November 2004 presidential election. “The climactic discussion about whether to publish was right on the eve of the election,” Keller will say, though he will refuse to explain why he makes the final decision to hold the story. However, he will say that at this time he is not sure the story’s sources are reliable enough to warrant its publication before a close election. [New York Times, 8/13/2006]

Entity Tags: Bush administration (43), Bill Keller, New York Times, Byron Calame, National Security Agency

Timeline Tags: Civil Liberties

Salim Ahmed Hamdan.Salim Ahmed Hamdan. [Source: Public domain]US District Judge James Robertson rules that the Combatant Status Review Tribunal being held at the Guantanamo base in Cuba to determine the status of detainee Salim Ahmed Hamdan is unlawful and cannot continue. At the time of the decision, Hamdan is before the Guantanamo military commission. [Washington Post, 11/9/2004; USA Today, 11/9/2004] The commission system, as set up by White House lawyers David Addington and Timothy Flanigan three years before (see Late October 2001), gives accused terrorists such as Hamdan virtually no rights; in author and reporter Charlie Savage’s words, “the [Bush] administration had crafted rules that would make it easy for prosecutors to win cases.” [Savage, 2007, pp. 195-196]
Violation of Geneva Conventions - Robertson, in his 45-page opinion, says the government should have conducted special hearings to determine whether detainees qualified for prisoner-of-war protections under the Geneva Conventions at the time of capture. [USA Today, 11/9/2004] He says that the Bush administration violated the Geneva Conventions when it designated prisoners as enemy combatants, denied them POW protections, and sent them to Guantanamo. [Boston Globe, 11/9/2004] The Combatant Status Review Tribunals that are currently being held in response to a recent Supreme Court decision (see June 28, 2004) are inadequate, Robertson says, because their purpose is to determine whether detainees are enemy combatants, not POWs, as required by the Third Geneva Convention. [USA Today, 11/9/2004]
Rejects Claims of Presidential Power - Robertson also rejects the administration’s claim that the courts must defer to the president in a time of war. “The president is not a ‘tribunal,’” the judge says. [USA Today, 11/9/2004] Robertson, a Clinton appointee, thus squarely opposes both the president’s military order of November 13, 2001 (see November 13, 2001) establishing the possibility of trial by military tribunal, and his executive order of February 7, 2002 (see February 7, 2002) declaring that the Geneva Conventions do not to apply to Taliban and al-Qaeda prisoners. “The government has asserted a position starkly different from the positions and behavior of the United States in previous conflicts,” Robertson writes, “one that can only weaken the United States’ own ability to demand application of the Geneva Conventions to Americans captured during armed conflicts abroad.” [USA Today, 11/9/2004; Washington Post, 11/9/2004; Boston Globe, 11/9/2004]
Orders Military Courts-Martial - Robertson orders that until the government conducts a hearing for Hamdan before a competent tribunal in accordance with the Third Geneva Conventions, he can only be tried in courts-martial, according to the same long-established military rules that apply to trials for US soldiers. [Washington Post, 11/9/2004; Boston Globe, 11/9/2004] Robertson’s ruling is the first by a federal judge to assert that the commissions are illegal. [Washington Post, 11/9/2004]
Hearings Immediately Recessed - When word of Robertson’s ruling comes to Guantanamo, Colonel Peter Brownback, presiding over a pretrial hearing for Hamdan, immediately gavels the hearing closed, declaring an “indefinite recess” for the tribunal. [Savage, 2007, pp. 195-196]
Ruling Applauded by Civil Libertarians, Rejected by Bush Lawyers - Anthony Romero, director of the American Civil Liberties Union; Eugene Fidell, president of the National Institute of Military Justice; and Michael Ratner, president of the Center for Constitutional Rights, all applaud Robertson’s ruling. [Boston Globe, 11/9/2004] The Bush administration rejects the court’s ruling and announces its intention to submit a request to a higher court for an emergency stay and reversal of the decision. “We vigorously disagree.… The judge has put terrorism on the same legal footing as legitimate methods of waging war,” Justice Department spokesman Mark Corallo says. “The Constitution entrusts to the president the responsibility to safeguard the nation’s security. The Department of Justice will continue to defend the president’s ability and authority under the Constitution to fulfill that duty.” [Washington Post, 11/9/2004; Boston Globe, 11/9/2004] He also says that the commission rules were “carefully crafted to protect America from terrorists while affording those charged with violations of the laws of war with fair process.” [Boston Globe, 11/9/2004]
Ruling May Affect Other Detainees - Though the ruling technically only applies to Hamdan, his civilian attorney, Neal Katyal, says it could affect other detainees. “The judge’s order is designed only to deal with Mr. Hamdan’s case,” Katyal says. “But the spirit of it… extends more broadly to potentially everything that is going on here at Guantanamo.” [USA Today, 11/9/2004]

Entity Tags: Mark Corallo, Neal Katyal, James Robertson, George W. Bush, Anthony D. Romero, Peter Brownback, Charlie Savage, US Supreme Court, American Civil Liberties Union, Salim Ahmed Hamdan

Timeline Tags: Torture of US Captives, Civil Liberties

Referring to the recent appointment of former White House counsel Alberto Gonzales as US Attorney General (see November 10, 2004), retired chief judge of the Army Court of Appeals Brigadier General James Cullen says, “When you encounter a person who is willing to twist the law… even though for perhaps good reasons, you have to say you’re really undermining the law itself.” [Village Voice, 11/29/2004]

Entity Tags: James Cullen, Alberto R. Gonzales

Timeline Tags: Torture of US Captives, Civil Liberties

Congress expands the Patriot Act (see October 26, 2001) by approving an intelligence spending bill with a provision that gives the FBI the power to subpoena business documents and transactions from a broad range of businesses and entities—including libraries, travel agencies, and even eBay—without court warrants. This reduces oversight of the FBI and shifts power away from the judiciary. The Patriot Act already allows the FBI to acquire bank records and communications records by issuing a National Security Letter (NSL) affirming that the information it seeks is relevant to an open investigation; the targeted institution is legally “gagged,” unable to inform anyone, especially the subject of the investigation, of the subpoena. The new law expands the use of NSLs by redefining “financial institution” to include insurance companies, real estate agents, the US Postal Service, travel agencies, casinos, pawn shops, car dealers and any other business whose “cash transactions have a high degree of usefulness in criminal, tax or regulatory matters.” The provision is one of the most controversial parts of the so-called “Patriot II” act (see February 7, 2003) that was withdrawn after the public learned of its elements. Like most intelligence spending bills, this one was drafted in secret and passed with little debate or public comment. Law professor Chris Schroeder, a former Justice Department assistant attorney general, says the insertion of the provision shows that “people who want to expand the powers of the FBI didn’t want to stop after Patriot II was leaked. They are going to insert these provisions on a stealth basis. It’s insidious.” James Dempsey of the Center for Democracy and Technology agrees: “On its face, it’s a cryptic and seemingly innocuous amendment. It wasn’t until after it passed both houses that we saw it. The FBI and CIA like to try to graft things like this into intelligence bills.” CIA Director Porter Goss, when he was chairman of the House Intelligence Committee, defended the provision, saying it is necessary to keep pace with terrorists and the changing economy. “This provision brings the definition of ‘financial institution’ up to date with the reality of the financial industry,” Goss told House members. “This provision will allow those tracking terrorists and spies to ‘follow the money’ more effectively and thereby protect the people of the United States more effectively.” Timothy Edgar of the American Civil Liberties Union says the bill goes too far in expanding executive branch powers. “The more that checks and balances against government abuse are eroded, the greater that abuse,” Edgar says. “We’re going to regret these initiatives down the road.” [Wired News, 11/24/2003]

Entity Tags: Tim Edgar, US Department of Justice, USA Patriot Act, Porter J. Goss, House Intelligence Committee, Central Intelligence Agency, Center for Democracy and Technology, American Civil Liberties Union, James Dempsey, Chris Schroeder, Federal Bureau of Investigation, Domestic Security Enhancement Act of 2003

Timeline Tags: Civil Liberties

2005: NSA Proposes New Data Mining Program

The National Security Agency calls for proposals in regard to a new electronic surveillance program, the Advanced Capabilities for Intelligence Analysis (ACIA). Like its cousin, the Novel Intelligence from Massive Data (NIMD) project (see After September 11, 2001), ACIA will use a huge electronic database of information on US citizens and foreign nationals to track potential terrorists and terror plots. Like NIMD, ACIA will look for ways “to construct and use plausible futures in order to provide additional, novel interpretations for today’s collection” of intelligence information, according to the call for proposals. [National Journal, 1/20/2006]

Entity Tags: National Security Agency, Advanced Capabilities for Intelligence Analysis, Novel Intelligence from Massive Data

Timeline Tags: Civil Liberties

Attorney general nominee Alberto R. Gonzales, currently serving as chief White House counsel, tells the Senate Judiciary Committee during his confirmation hearings that there had been some discussion within the administration about trying to rewrite the Geneva Conventions. While he is committed to “ensuring that the United States government complies with all of its legal obligations as it fights the war on terror, whether those obligations arise from domestic or international law,” he says, “these obligations include, of course, honoring the Geneva Conventions wherever they apply.” However, he adds: “We are fighting a new type of enemy and a new type of war. Geneva was ratified in 1949… and I think it is appropriate to revisit whether or not Geneva should be revisited. Now I’m not suggesting that the principles of Geneva regarding basic treatment—basic decent treatment of human beings—should be revisited.… That should always be the basis on which we look at this. But I am aware there’s been some very preliminary discussion as to whether or not—is this something that we ought to look at.” [Los Angeles Times, 1/7/2005; Savage, 2007, pp. 209]
Questioned about Involvement in Torture - During the hearing, Gonzales is grilled on his involvement in the administration’s decision to allow aggressive interrogations of terrorism detainees. Critics believe the interrogation policy developed by Gonzales and his colleagues created the conditions that allowed abuses, such as those at Abu Ghraib, to occur. Senator Edward Kennedy tells Gonzales, “It appears that legal positions that you have supported have been used by the administration, the military, and the CIA to justify torture and Geneva Convention violations by military and civilian personnel.” [Associated Press, 1/6/2006] Retired Admiral John Hutson, a former Navy judge advocate general (JAG) who testifies as a witness at the hearing, says, “I believe that the prisoners’ abuses that we’ve seen… found their genesis in the decision to get cute with the Geneva convention.” [Reuters, 1/7/2005]
Lack of Understanding of International Law - At certain points during the hearing, Gonzales demonstrates an apparent lack of understanding about US and international law. When he is asked if he thinks other world leaders can legitimately torture US citizens, he answers, “I don’t know what laws other world leaders would be bound by.” On another occasion he is asked whether “US personnel [can] legally engage in torture under any circumstances,” to which he answers, “I don’t believe so, but I’d want to get back to you on that.” He is also asked whether he agrees with John Ashcroft’s judgment that torture should not be used because it produces nothing of value. Gonzales responds, “I don’t have a way of reaching a conclusion on that.” [Washington Post, 1/7/2005]

Entity Tags: John D. Hutson, John Ashcroft, Alberto R. Gonzales, Edward M. (“Ted”) Kennedy

Timeline Tags: Torture of US Captives, Civil Liberties

The Senate Judiciary Committee brings in several experts to expand upon the testimony of attorney general nominee Alberto Gonzales (see January 6, 2005 and January 6, 2005). One of the most outspoken critics is Yale Law School dean Harold Koh. Koh had worked in the Justice Department’s Office of Legal Counsel (OLC) under Ronald Reagan, and later served as assistant secretary of state for democracy, human rights, and labor in the Clinton administration. He is a vocal critic of the Bush administration’s detention policies at Guantanamo and elsewhere. Koh had once worked closely with OLC lawyer John Yoo, the author of numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002), but now, without explicitly mentioning Yoo by name, he repudiates his former student’s legal positions. Gonzales worked closely with Yoo to craft the administration’s positions on wiretapping, torture, the inherent power of the president, and other issues. “Having worked in both Democratic and Republican administrations, and for more than two years as an attorney in the Office of Legal Counsel, I am familiar with how legal opinions like this are sought and drafted,” Koh states. “I further sympathize with the tremendous pressures of time and crisis that government lawyers face while drafting such opinions. Nevertheless, in my professional opinion, the August 1, 2002 OLC memorandum [drafted by Yoo at Gonzales’s behest—see August 1, 2002] is perhaps the most clearly erroneous legal opinion I have ever read.” The August 1 memo, as well as other opinions by Yoo and Gonzales, “grossly overreads the inherent power of the president” as commander in chief, Koh testifies. The memos raise profound questions about the legal ethics of everyone involved—Gonzales, Yoo, and others in the Justice Department and White House. “If a client asks a lawyer how to break the law and escape liability, the lawyer’s ethical duty is to say no,” Koh testifies. “A lawyer has no obligation to aid, support, or justify the commission of an illegal act.” [Senate Judiciary Committee, 1/7/2005 pdf file; Savage, 2007, pp. 211-212]

Entity Tags: Senate Judiciary Committee, US Department of Justice, Harold Koh, Alberto R. Gonzales, Bush administration (43), John C. Yoo, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

The FBI office in New Haven, Connecticut receives an e-mail that looks like a terrorist threat. The agents there follow the normal routine: they ask the service provider, a group of Connecticut public libraries, for the real name, street address, and Internet logs of the sender. The agents have no search warrant, grand jury subpoena, or court order. What they do have is a National Security Letter (NSL) that describes the records needed. According to the expanded USA Patriot Act, the NSL is all the FBI needs, and the NSL statute bars the librarians from disclosing the request to anyone. The librarians will refuse to hand over the information, and will file a federal lawsuit challenging the NSL as an unconstitutional infringement on free speech (see July 13, 2005). The e-mailed threat will turn out to be a hoax. Kevin O’Connor, the US attorney in Connecticut, later says the FBI suspected that the threat was a hoax from the outset, but believed they had an “obligation” to pursue it. “We weren’t tying up librarians or reading through books,” he will say. “All we wanted was identifying information. God forbid it isn’t a hoax.” The librarians who challenge the NSL, however, feel differently. George Christian, the point man in the librarians’ legal challenge, will say, “The idea that the government can secretly investigate what the public is informing itself about is chilling.” A judge will strike down the NSL gag order, allowing Christian and his three colleagues (by now dubbed the “Connecticut Four” by the media) to disclose the fact that they had received an NSL, with a judge calling the NSL gag order “antithetical to democratic concepts”. In April 2006, the government will drop its NSL request (see August 2005-May 2006). Christian will be unmollified. “The fact that I can speak now is a little like being permitted to call the Fire Department only after a building has burned to the ground,” he will say. [USA Today, 7/6/2006]

Entity Tags: Connecticut Four, American Civil Liberties Union, Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, Kevin O’Connor, National Security Letters, USA Patriot Act, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

Zacarias Moussaoui wants captured al-Qaeda leaders Khalid Shaikh Mohammed and Ramzi bin al-Shibh to testify in his trial. However, an appeals court in April 2004 had only allowed indirect access to those prisoners, and further appeals court decisions in September and October 2004 had reaffirmed that ruling. On this date, the US Supreme Court, without comment, refuses to hear a further appeal. This was expected because the Supreme Court typically doesn’t hear such appeals until after the case goes to trial. [Washington Post, 9/14/2004; Washington Post, 10/14/2004; Washington Post, 3/22/2005] Moussaoui’s guilty plea one month later (see April 22, 2005) may lead to a new round of appeals. Presiding judge Leonie Brinkema has indicated she believes witness access is “highly relevant to the sentencing phase,” which will begin next, and could constitute “mitigating evidence” that could make the difference between Moussaoui receiving the death penalty or not. [Washington Post, 4/23/2005]

Entity Tags: Zacarias Moussaoui, Khalid Shaikh Mohammed, US Supreme Court, Ramzi bin al-Shibh, Leonie Brinkema

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The DC federal appeals court rules in favor of the attorney general’s use of the state secrets privilege (see March 9, 1953, October 18, 2002 and May 19, 2004) to prevent the court from hearing Sibel Edmonds’ lawsuit (see June 2002). Lawyers for the Justice Department had addressed the judge behind sealed doors. [Vanity Fair, 9/2005]

Entity Tags: Sibel Edmonds, US Department of Justice

Timeline Tags: Complete 911 Timeline

Zacarias Moussaoui.
Zacarias Moussaoui. [Source: Sherburne County Sheriffs Office]In an unexpected move, Zacarias Moussaoui pleads guilty to all six terrorism conspiracy charges against him. Moussaoui had been arrested weeks before 9/11, and was formally charged in December 2001 for his role in the 9/11 plot. He says it is “absolutely correct” that he is guilty of the charges: conspiracy to commit acts of terrorism transcending national boundaries; to commit aircraft piracy; to destroy aircraft; to use weapons of mass destruction; to murder US government employees; and to destroy US government property. However, he says, “I was not part of 9/11,” but rather claims he was part of a “broader conspiracy” aimed at post-9/11 attacks. He says he was personally directed by bin Laden to pilot a 747 and “strike the White House” with it, but as part of a “different conspiracy than 9/11.” His plea means there will be no trial to determine guilt, but there will still be a trial to determine his sentencing, which could be as severe as the death penalty. He promises to fight in the sentencing phase, stating he doesn’t deserve death because he was not directly connected to the 9/11 plot. [CNN, 4/23/2005; Washington Post, 4/23/2005] A CNN legal analyst notes that Moussaoui’s guilty plea “makes little sense.” Moussaoui may have actually had a chance to be proven not guilty because of the many thorny legal issues his case raises (two suspected members of the al-Qaeda Hamburg cell have been found not guilty in German courts because they have not been allowed access to testimony from al-Qaeda prisoners who might exonerate them, and Moussaoui so far has been denied access to those same prisoners (see March 22, 2005)). It is pointed out that Moussaoui gave a guilty plea without “any promise of leniency in exchange for his plea,” and that he is unlikely to gain any sympathetic advantage from it in the death penalty trial. CNN’s analyst notes that the statements in his plea “suggest that Moussaoui [mistakenly] thought he had tricked the prosecution.” Doubts still remain whether Moussaoui is fully mentally sound and capable of legally defending himself. [CNN, 4/28/2005] A counterterrorism expert for RAND Corporation says of Moussaoui’s rather confusing statements, “If we thought by the end of the day we would find the holy grail as to exactly what the genesis of 9/11 was and what Moussaoui’s role in it was, we have been sorely disappointed. This contradiction in his behavior raises more questions than it answers.” The Washington Post notes that, “It remains uncertain” whether the death penalty trial “will divulge much new information about the plot.” [Washington Post, 4/23/2005]

Entity Tags: Zacarias Moussaoui, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI and Justice Department quietly open an investigation into whether Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, improperly colluded with the American Israel Public Affairs Committee (AIPAC) to win reappointment as the committee’s ranking member. The investigation is not revealed to the public until October 2006 (see October 20, 2006). The investigation centers on allegations that Harman and AIPAC arranged for wealthy supporters to lobby House Minority Leader Nancy Pelosi (D-CA) on Harman’s behalf. The case is an outgrowth of a probe that has already led to the felony conviction of former DIA official Larry Franklin, who pled guilty to giving classified information to two AIPAC lobbyists (see October 5, 2005), and the lobbyists, Steve Rosen and Keith Weissman, who still face charges of passing that information on to Israel (see April 13, 1999-2004). The investigation has now expanded to determine if Harman’s campaign to persuade Pelosi to reappoint her to the committee may have involved AIPAC, and whether Harman promised to return the favor by using her influence to persuade the Justice Department to ease up on the AIPAC lobbyists. Reporter Timothy Burger will write: “If that happened, it might be construed as an illegal quid pro quo, depending on the context of the situation. But the sources caution that there has been no decision to charge anyone and that it is unclear whether Harman and AIPAC acted on the idea.” Both Harman and Pelosi are outspoken supporters of Israel, and have praised AIPAC for its efforts to further cement ties between Israel and the US. However, Congressional sources will say that Pelosi is furious at attempts by major donors to lobby on behalf of Harman. The LA Weekly reported in May that Harman “had some major contributors call Pelosi to impress upon her the importance of keeping Jane in place. According to these members, this tactic, too, hasn’t endeared Harman to Pelosi.” Another powerful figure has lobbied for Harman: entertainment industry billionaire Haim Saban, who made his fortune through the Mighty Morphin Power Rangers children’s entertainment franchise. It is unclear whether Saban had any contact with AIPAC, and if his efforts to lobby on Harman’s behalf were part of a larger, more orchestrated plan. [Time, 10/20/2006] When the story becomes public in October 2006, Harman will deny any improper or illegal conduct (see October 20, 2006). The investigation will eventually be dropped, supposedly for “lack of evidence.” In April 2009, evidence will surface that the NSA wiretapped Harman discussing a quid pro quo with a suspected Israeli agent, and that the investigation was not dropped because of lack of evidence, but because of the intervention of Attorney General Alberto Gonzales (see October 2005, Late 2005, and April 19, 2009). [Congressional Quarterly, 4/19/2009]

Entity Tags: Nancy Pelosi, Haim Saban, Federal Bureau of Investigation, American Israel Public Affairs Committee, Alberto R. Gonzales, House Intelligence Committee, Jane Harman, Steve Rosen, Timothy Burger, US Department of Justice, Keith Weissman, National Security Agency, Larry Franklin

Timeline Tags: Civil Liberties

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

Months after the Bush administration successfully convinced the New York Times to hold off publishing its report on the administration’s warrantless wiretapping program (see Early November 2004, December 6, 2005, and December 15, 2005), one of the reporters on the story, Eric Lichtblau, attempts to get a response on the program from one of the few Democrats briefed on it, House Intelligence Committee ranking member Jane Harman (D-CA). In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau will write about covering a House hearing where Harman launches into a passionate call for stronger civil liberties safeguards in the reauthorization of the USA Patriot Act (see March 9, 2006). According to his recollection, Lichtblau approaches Harman and says, “I’m trying to square what I heard in there with what we know about that program.” He will write: “Harman’s golden California tan turned a brighter shade of red. She knew exactly what I was talking about. Shooing away her aides, she grabbed me by the arm and drew me a few feet away to a more remote section of the Capitol corridor. ‘You should not be talking about that here,’ she scolded me in a whisper. ’ They don’t even know about that,’ she said, gesturing to her aides, who were now looking on at the conversation with obvious befuddlement.” Harman tells Lichtblau, “The Times did the right thing by not publishing that story,” but will not discuss the details. When asked what intelligence capabilities would be lost by informing the public about something the terrorists already knew—that the government was listening to them—she simply replies, “This is a valuable program, and it would be compromised.” Lichtblau will add: “This was clearly as far as she was willing to take the conversation, and we didn’t speak again until months later, after the NSA story had already run. By then, Harman’s position had undergone a dramatic transformation. When the story broke publicly, she was among the first in line on Capitol Hill to denounce the administration’s handling of the wiretapping program, declaring that what the NSA was doing could have been done under the existing FISA law.” [TPM Muckraker, 3/19/2008]

Entity Tags: Eric Lichtblau, Bush administration (43), New York Times, House Intelligence Committee, Jane Harman

Timeline Tags: Civil Liberties

George Christian.George Christian. [Source: PBS]Librarian and data manager George Christian is served with a so-called “National Security Letter” (NSL) from the FBI demanding that his firm turn over private information on its patrons because of an apparent terrorist threat e-mailed from one of his libraries (see February 2005). Christian is the executive director of Library Connection, Inc., which manages catalog information, patron records, and circulation information for 27 libraries in and around Hartford, Connecticut, as well as providing telecommunications services to many of its member libraries. Christian is given the NSL, as well as a gag order preventing them from ever mentioning their receipt of the letter, or any details surrounding it. Christian is notified of the letter five days before actually receiving it; he spends those days frantically learning more about NSLs and the laws surrounding them (see October 25, 2005). He learns that a district court in New York had found the entire NSL statute unconstitutional because of what Christian calls “prima facie violations of the 1st, 4th and 5th amendments.” By the time they receive the letter, he has decided to oppose it. The letter, delivered by two FBI agents, orders Christian and Library Connection to turn over information about a specific IP address registered to the firm. One of the agents warns Christian that the gag order prohibits anyone in the firm from telling anyone that the FBI is attempting to secure information from its library business records. Christian, who will testify before the Senate Judiciary Committee about the NSL in April 2007 (see April 11, 2007), says neither he nor his colleagues could “fathom any ‘exigent’ nature for the FBI request.” The letter was dated May 19, nearly two months before its delivery, was not addressed to Christian, and requested information from the use of the IP address five months earlier, February 15. Christian later says that while he and his colleagues want to assist the FBI in any way they can, and have no desire to “impede the investigation of a perilous situation that endanger[s] my country or my fellow citizens,” because of the date of the letter and the IP usage, they conclude that the FBI has not been in any rush to get the information. Christian tells the FBI agents that he believes the use of NSLs is unconstitutional and that he will consult his attorney. Library Connection’s attorney says that the only way to contest compliance with an NSL is to take the Attorney General, Alberto Gonzales, to court. Christian is understandably reluctant to involve his firm in such a court challenge without authorization, and takes the case to the Executive Committee of the firm’s board of directors. The three members, Barbara Bailey, Peter Chase, and Janet Nocek (who will soon be dubbed the “Connecticut Four” by the media), after conferring with the attorney and reviewing the New York court’s decision against NSLs, decide to go forward with the complaint. They secure representation from the American Civil Liberties Union (ACLU). Together, they decide to ask for relief from the NSL, to seek a broader ruling that the use of NSLs is unconstitutional, and to have the gag order lifted so they can publicly discuss the incident as “part of the national debate over renewal of the Patriot Act” (see March 9, 2006). Christian will tell the Senate Judiciary Committee, “We… felt we were defending our democracy by insisting that the checks and balances established in the Constitution be observed. We had no court order, and there was no evidence that an independent judge had examined the FBI’s evidence and found there to be probable cause justifying their request for information.… [W]e did not want to aid terrorists or criminals.… But we did not feel we would be helping the country or making anyone safer by throwing out the Constitution either.” Because of the way the computer system is set up, to give the FBI the information about the specific IP address and usage it required, Christian would have to give the FBI information about everyone using every computer in the particular library on the day in question. He later says, “[S]ince there was no way of determining who was using the computers in the library five months after the fact, we felt that [the FBI wanted] information we had on all the patrons of that library. That seemed like a rather sweeping request. Some would call it a fishing expedition.” The case goes to trial in August 2005 (see August 2005-May 2006). [Senate Judiciary Committee, 4/11/2007] It is later learned that the original e-mailed threat is a hoax. [USA Today, 7/6/2006]

Entity Tags: Peter Chase, National Security Letters, Senate Judiciary Committee, Library Connection, Inc., Barbara Bailey, George Christian, American Civil Liberties Union, Janet Nocek, Alberto R. Gonzales, Federal Bureau of Investigation, Connecticut Four

Timeline Tags: Civil Liberties

The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey.The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey. [Source: Robert Deutsch/ USA Today]A case filed against Attorney General Alberto Gonzales by four plaintiffs from Connecticut’s Library Connection, Inc.—George Christian, Barbara Bailey, Peter Chase, and Janet Nocek—goes to trial in federal district court (see July 13, 2005). The trial is filed as Doe v. Gonzales because the government has filed a gag order against the plaintiffs forbidding them from identifying themselves or discussing the case publicly. The case involves a demand for information from the FBI for information concerning library usage by patrons of a Connecticut library; the four plaintiffs, on behalf of their data management firm Library Connection, have refused. The case revolves around the use of a National Security Letter (NSL) by the FBI; the plaintiffs, with support from the American Civil Liberties Union, want the NSL voided, the gag order lifted, and such use of NSLs found unconstitutional. Christian and his three colleagues are not allowed to attend the hearings in person because of the possibility that they might be identified as the plaintiffs; they are forced to watch the proceedings on a closed-circuit broadcast from a locked room in the Hartford courthouse. When the judge in the proceeding asks to review the government’s evidence for keeping the gag rule in place, Justice Department lawyers insist on submitting secret evidence directly to the judge, without providing that evidence to the plaintiff’s lawyers. The judge is not pleased, and rules, as did her predecessor in New York, that a perpetual gag order amounts to prior restraint, and thereby is unconstitutional. She adds that her review of the secret evidence gives no national security rationale for keeping the plaintiffs gagged. The Justice Department immediately appeals the ruling, and the plaintiffs stay silent and gagged. While the four plaintiffs remain silent about the NSL and the court case, the Justice Department’s primary lawyer, Kevin O’Conner, does not: O’Conner has frequently debated one of the plaintiffs, Chase, about the Patriot Act, and though Chase is now required to remain silent, O’Conner continues to make frequent public appearances touting the Patriot Act. Christian later says, in 2007 testimony before the Senate Judiciary Committee (see April 11, 2007), that the continuing gag order causes the four “John Does” considerable professional and personal distress, especially after the national media begins reporting the story. The media eventually learns, through the careless redaction of information by government lawyers, of Chase’s identity as one of the four plaintiffs, and reveals that Library Connection is the firm involved in the lawsuit. Christian’s name comes to light shortly thereafter. The attorneys warn Christian and the others that even though their identities and their firm have been revealed, they still cannot comment at all on the case. Christian, for one, wants to testify before Congress in regards to the upcoming reauthorization of the Patriot Act (see March 9, 2006), but cannot. The four plaintiffs quickly become known in the media as the “Connecticut John Does” or the “Connecticut Four.”
Appeals Court - In November 2005, a New York court of appeals hears the case. Christian and his colleagues are allowed to be present at the case this time, but are required to conceal their identities by entering and leaving the court building separately, are not allowed to sit together, and are not allowed to confer with, or even make eye contact with, each other or their attorneys. The Justice Department lawyers argue that even revealing themselves as recipients of a NSL would violate national security, an argument refuted by submission of the raft of news articles identifying Christian, Chase, and Library Connection. The government argues that those news reports don’t matter because no one in Connecticut reads the primary newspaper carrying the story, the New York Times, and that surveys prove that most people don’t believe what they read in the news anyway. The Justice Department also tries to get the news articles to be kept under seal in court papers. Christian characterizes the entire proceeding as “absurd.” The court refuses to admit the plaintiff’s claim that 48 states, including Connecticut, have laws protecting the privacy of library patrons, but does admit into evidence the claims by Gonzales that there is no statutory justification for claims of privacy. In an attempt to get the gag order lifted before the Patriot Act reauthorization, the plaintiff’s attorneys make an emergency appeal directly to the Supreme Court, but are rebuffed. [Senate Judiciary Committee, 4/11/2007] In June 2006, Nocek tells a reporter, “Imagine the government came to you with an order demanding that you compromise your professional and personal principles. Imagine then being permanently gagged from speaking to your friends, your family or your colleagues about this wrenching experience.… Under the Patriot Act, the FBI demanded Internet and library records without showing any evidence or suspicion of wrongdoing to a court of law. We were barred from speaking to anyone about the matter and we were even taking a risk by consulting with lawyers.” [Interview: George Christian, 6/2/2006]
Gag Order Lifted, Case Dropped - Weeks after President Bush signs into law the Patriot Act reauthorization (see March 9, 2006), the FBI voluntarily lifts the gag order without waiting for a court order. The agency then tries to get the original ruling against the gag order vacated, an attempt that the appeals court refuses. The appellate judges are clearly disturbed by the breadth of the NSL gag provisions; one appellate judge writes, “A ban on speech and a shroud of secrecy in perpetuity are antithetical to democratic concepts and do not fit comfortably with the fundamental rights guaranteed American citizens… Unending secrecy of actions taken by government officials may also serve as a cover for possible official misconduct and/or incompetence.” The appeals court refers the case back to district court, allowing the original opinion to stand. Weeks later, the FBI withdraws its NSL, saying that it no longer needs the information it originally requested. Christian later testifies, “In doing so, they removed the Patriot Act from the danger of court review.” Christian later says that he believes the entire procedure was managed as an attempt to prevent the case from becoming public knowledge before Congress could vote on the reauthorization of the Patriot Act. [Senate Judiciary Committee, 4/11/2007]

Entity Tags: Peter Chase, Senate Judiciary Committee, National Security Letters, US Department of Justice, Library Connection, Inc., George Christian, George W. Bush, American Civil Liberties Union, Barbara Bailey, Connecticut Four, Alberto R. Gonzales, Federal Bureau of Investigation, Kevin O’Conner

Timeline Tags: Civil Liberties

Lawyers for Sibel Edmonds file a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urges the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. In May, the federal appeals court had closed the courtroom to the public and media. Edmonds’ lawyers include the American Civil Liberties Union and Mark Zaid of Krieger and Zaid, PLLC. If the Supreme Court rules in favor of Edmonds, she will return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 pdf file; Government Executive, 8/8/2005]

Entity Tags: US Supreme Court, American Civil Liberties Union, Mark Zaid

Timeline Tags: Complete 911 Timeline

Representative Jane Harman (D-CA) is recorded telling a suspected Israeli agent that she would intervene with the Justice Department to try to get charges against two Israeli lobbyists reduced. In return, the Israeli agent promises to help Harman secure the chairmanship of the House Intelligence Committee. The Israeli agent will remain unidentified; the two lobbyists, Steve Rosen and Keith Weissman, are charged with espionage after they allegedly passed along classified information to the American Israel Public Affairs Committee (AIPAC—see April 13, 1999-2004). The conversation between Harman and the Israeli agent is recorded on an wiretap, reportedly by the NSA, mounted as part of a federal investigation into AIPAC’s potential espionage operations against the US (see October 5, 2005). According to transcripts of the wiretapped conversation, Harman agrees to “waddle into” the AIPAC case “if you think it’ll make a difference.” The Israeli agent asks Harman if she could speak with Attorney General Alberto Gonzales on Rosen’s and Weissman’s behalf. Harman replies that Gonzales might not cooperate, because he “just follows White House orders,” but other officials might be more pliable. In return, the Israeli agent promises to contact House Minority Leader Nancy Pelosi (D-CA) and attempt to persuade her to name Harman as chairwoman of the Intelligence Committee if the Democrats win control of the House in the November 2006 elections. Harman tells the agent, “This conversation doesn’t exist,” and hangs up. The contents of the conversation will later be confirmed by three separate sources, including two former senior national security officials. [Congressional Quarterly, 4/19/2009] Reporter Marc Ambinder will later write that Harman’s conversation may have been recorded by the FBI, and not the NSA, as part of the its investigation into Rosen and Weissman. [Atlantic Monthly, 4/20/2009]

Entity Tags: Nancy Pelosi, Bush administration (43), American Israel Public Affairs Committee, Alberto R. Gonzales, Jane Harman, Marc Ambinder, Steve Rosen, Keith Weissman, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

The Fourth Circuit Court of Appeals rules that President Bush, as commander in chief, can continue to hold Jose Padilla (see June 9, 2002), a US citizen arrested on US soil (see June 8, 2002), indefinitely as an enemy combatant. Padilla is to be treated the same as an American captured on a foreign battlefield (see June 28, 2004). The majority ruling is written by Judge J. Michael Luttig, often thought of as a potential Bush Supreme Court nominee. Luttig rules there is “no difference in principle between [Yaser Esam] Hamdi (see June 28, 2004) and Padilla.” Bush’s “powers include the power to detain identified and committed enemies such as Padilla, who associated with al-Qaeda and the Taliban regime, and who entered the United States for the avowed purpose of further prosecuting [terrorism] by attacking American citizens and targets on our own soil.” Luttig ignores the fact that Padilla has never been charged, much less convicted, of any crime. When the Bush administration later charges Padilla as an ordinary criminal—and does not charge him with with any of the terrorist activities it had long alleged he had committed—many administration critics will conclude that, just as in the Hamdi case, the administration had used inflammatory rhetoric and baseless charges to obtain a judicial decision it wanted (see October 10, 2004). When Luttig learns of the administration’s actions, he will issue a supplementary opinion excoriating the White House (see December 21, 2005). [Savage, 2007, pp. 200]

Entity Tags: Jose Padilla, J. Michael Luttig

Timeline Tags: Civil Liberties

President Bush signs Executive Order 13388, which dramatically expands the powers of the US government to monitor and collect data on US citizens. [Executive Order 13388 of October 25, 2005, 10/25/2005] The order augments the power of “National Security Letters,” authorized in 1981 by then-President Ronald Reagan (see December 4, 1981), but rarely used against US citizens until the advent of the Bush administration and the USA Patriot Act. Thanks to the order, the data files are even more accessible to what the order calls “state, local, and tribal” governments as well as the undefined “appropriate private sector entities,” presumably private data-mining corporations that collect personal and financial data on US citizens for the government.
Over 30,000 NSLs a Year - The FBI now issues over 30,000 NSLs a year, a hundredfold increase from earlier administration usages. NSLs are issued by FBI field supervisors at their discretion without court warrant or oversight by the judiciary or Congress. NSLs force their recipients—librarians, booksellers, employers, Internet providers, and others—to turn over any and all personal data on their customers and employees and are legally required not to tell the targets of the investigations about the letters or the data collection. An FBI supervisor can, without oversight or reasonable suspicion of terrorist activity, collect data on what a citizen makes, spends, invests, gambles, reads in books and on the Internet, buys online, and with whom that citizen lives, works, associates, telephones, and exchanges e-mails. Senior FBI officials admit that the huge spike in NSLs stems from the FBI’s new authority to collect tremendous amounts of data on US citizens not accused of criminal activities. And NSLs are now used to generate leads against terrorist suspects and not merely pursue them.
NSLs Handled With Discretion, Officials Insist - FBI and White House officials insist that NSLs are handled with discretion and with a recognizance of Americans’ right to privacy. Joseph Billy Jr, the FBI’s deputy director for counterterrorism, says he understand that “merely being in a government or FBI database… gives everybody, you know, neck hair standing up.” But innocent Americans “should take comfort at least knowing that it is done under a great deal of investigative care, oversight, within the parameters of the law.” [Washington Post, 11/6/2005]

Entity Tags: US Department of Justice, Bush administration (43), USA Patriot Act, Federal Bureau of Investigation, National Security Letters, George W. Bush

Timeline Tags: Civil Liberties

David Addington.David Addington. [Source: Richard A. Bloom / Corbis]David Addington, the chief counsel for Vice President Dick Cheney, is named Cheney’s chief of staff to replace Lewis “Scooter” Libby, who was convicted of perjury and obstruction of justice in the Valerie Plame Wilson case (see February 13, 2002). [National Journal, 10/30/2005; MSNBC, 11/4/2005] Addington is described by one White House official as “the most powerful man you never heard of.” A former Justice Department official says of Addington, “He seems to have his hand in everything, and he has these incredible powers, energy, reserves in an obsessive, zealot’s kind of way.” He is, according to former Solicitor General Theodore Olson, Cheney’s “eyes, ears, and voice.” [US News and World Report, 5/21/2006] Addington is a neoconservative ideologue committed to dramatically expanding the power of the presidency, and a powerful advocate of the “unitary executive” theory of presidential power. He has been with Cheney for years, ever since Cheney chose him to serve as the Pentagon’s chief counsel while Cheney was Defense Secretary under Ronald Reagan. During that time, Addington was an integral part of Cheney’s battle to keep the Iran-Contra scandal from exploding (see 1984). [Washington Post, 10/11/2004; National Journal, 10/30/2005; MSNBC, 11/4/2005; US News and World Report, 5/21/2006] According to Larry Wilkerson, the former chief of staff to former Secretary of State Colin Powell, documentary evidence shows that Cheney’s office, and Addington in particular, were responsible for giving at least tacit approval for US soldiers to abuse and torture prisoners in Iraq (see January 9, 2002). In an administration devoted to secrecy, Addington stands out in his commitment to keeping information away from the public. [Washington Post, 10/11/2004] Though Addington claims to have a lifelong love affair with the Constitution, his interpretation of it is somewhat unusual. One senior Congressional staffer says, “The joke around here is that Addington looks at the Constitution and sees only Article II, the power of the presidency.” [US News and World Report, 5/21/2006] Addington’s influence in the White House is pervasive. He scrutinizes every page of the federal budget, hunting for riders that might restrict the power of the president. He worked closely with Gonzales to oppose attempts by Congress to pry information from the executive branch, and constantly battles the State Department, whose internationalist philosophy is at odds with his and Cheney’s own beliefs. [Washington Post, 10/11/2004] Former Reagan Justice Department official Bruce Fein calls Addington the “intellectual brainchild” of overreaching legal assertions that “have resulted in actually weakening the presidency because of intransigence.” According to Fein, Addington and Cheney are doing far more than reclaiming executive authority, they are seeking to push it farther than it has ever gone under US constitutional authority. They have already been successful in removing executive restraints formerly in place under the War Powers Act, anti-impoundment legislation, the legislative veto and the independent counsel statute. “They’re in a time warp,” Fein says. “If you look at the facts, presidential powers have never been higher.” [Washington Post, 10/11/2004] “He thinks he’s on the side of the angels,” says a former Justice Department official. “And that’s what makes it so scary.” [US News and World Report, 5/21/2006]

Entity Tags: Saddam Hussein, US Department of State, Theodore (“Ted”) Olson, US Department of Justice, US Department of Defense, Ronald Reagan, Lewis (“Scooter”) Libby, National Security Council, Bruce Fein, Bradford Berenson, 9/11 Commission, Richard (“Dick”) Cheney, David S. Addington, John Bellinger, Jack Goldsmith, Lawrence Wilkerson, John C. Yoo, Valerie Plame Wilson

Timeline Tags: Civil Liberties, Niger Uranium and Plame Outing

Brett Tolman.Brett Tolman. [Source: ABC4 (.com)]Brett Tolman, a Republican Senate Judiciary Committee official, tells Assistant Attorney General William Moschella that he will perform a “comprehensive fix” to the USA Patriot Act reauthorization coming up for approval in Congress (see March 9, 2006). Tolman and Moschella are referring to a provision in the reauthorization legislation that would allow the attorney general to appoint interim US Attorneys on an indefinite basis without having them go through Senate confirmation, and remove the ability of a federal court to appoint a US Attorney (see July 2005 - March 2006). Moschella suggests Tolman use the “comprehensive fix” of repealing Section 546 of Title 28 of the United States Code, subsections C and D, and replacing them with the following language: “A person appointed as United States Attorney under this section may serve until the qualification of a United States Attorney for such district appointed by the president under section 541 of this title.” Late the same evening, Tolman receives an email from Moschella instructing him to quietly insert the provision in the USA Patriot Act reauthorization bill that would eliminate a 120-day limit for “interim” US Attorneys to serve without Senate confirmation. In essence, the provision would allow such “interims” to serve indefinitely, cutting the Senate entirely out of the process of naming US Attorneys and allowing the attorney general to make political appointments without oversight. Tolman replies, “I will get the comprehensive fix done.” He slips the provision into a draft of the bill while it is in conference committee. None of the members notice the provision, and it is part of the bill as signed into law in March 2006 (see March 9, 2006). Tolman himself is one of the first beneficiaries of the new provision, becoming the US Attorney for Utah. When the new provision comes to light in early 2007, both chambers of Congress vote overwhelmingly to repeal it. This is one of numerous “stealth provisions” the White House will have inserted into legislation with the help of compliant Congressional Republicans and staffers. [Savage, 2007, pp. 316; US Department of Justice, 3/23/2007 pdf file] Moschella will later take the credit for the provision, and will tell reporters that he made the change on behalf of the Justice Department “without the knowledge or coordination of his superiors at the Justice Department or anyone at the White House.” [Talking Points Memo, 2011]

Entity Tags: William E. Moschella, USA Patriot Act, Senate Judiciary Committee, Bush administration (43), Brett Tolman, US Department of Justice

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales sends a letter to a federal judge in Montana, assuring him that US Attorney William W. Mercer is not violating federal law by spending almost all of his time in Washington as a temporary Justice Department official. The same day, Mercer has a Republican Senate staffer insert language into the USA Patriot reauthorization bill (see March 9, 2006) that would retroactively change the rules and allow federal prosecutors such as himself to live outside their districts and serve in other positions. Congress will include the language in the bill when it passes the legislation. Mercer and a small number of other Justice Department employees are the only ones to benefit from the provision. In 2007, when the provision is revealed to the public, Justice Department officials will say the provision was necessary to ensure that prosecutors such as Mercer could fill temporary positions in Washington, Iraq, and elsewhere. Critics will accuse Gonzales of being, in the Washington Post’s words, “less than truthful” about the actions of himself, his staff, and the White House. The question surrounding Mercer involves residency. Mercer is the US Attorney for Montana, appointed in 2001. In June 2005, he was appointed to serve as principal associate deputy attorney general, at Gonzales’s request. US District Chief Judge Donald W. Molloy of Billings has become increasingly irked at Mercer’s absence from Montana for the last two years. In October, Molloy wrote Gonzales to say that Mercer was violating federal law because he “no longer resides in Montana” and was living with his family in the Washington area. Gonzales replies three weeks later to tell Molloy that Mercer “is in compliance with the residency requirement” under federal law because he “is domiciled there, returns there on a regular basis, and will live there full-time as soon as his temporary assignment is completed.” At the same time Gonzales writes Molloy, Mercer has a Senate staffer, Brett Tolman, insert the provision into the Patriot Act legislation. Tolman is the counsel for Senator Arlen Specter (R-PA), chairman of the Senate Judiciary Committee. Tolman will later be named the US Attorney for Utah. Specter’s office will characterize the provision as “unremarkable” and aboveboard. Mercer currently serves as acting associate attorney general and has been nominated for the position on a permanent basis. He spends only about three days a month in Montana and delegates almost all of his duties as US Attorney to underlings. [ePluribus Media, 3/26/2007; Washington Post, 5/2/2007] Mercer will be nominated to serve as associate attorney general, the third-highest position in the Justice Department, in September 2006. He will not be confirmed for the position by the Senate, as confirmation would require his leaving the position of US Attorney. In June 2007, Mercer will resign from the associate attorney general position, retaining his position as US Attorney for Montana (see June 22, 2007). [ePluribus Media, 3/26/2007; Washington Post, 6/22/2007]

Entity Tags: Donald W. Molloy, Alberto R. Gonzales, Brett Tolman, Washington Post, Arlen Specter, Senate Judiciary Committee, William W. Mercer, US Department of Justice

Timeline Tags: Civil Liberties

Jose Padilla being escorted by federal agents in January 2006.Jose Padilla being escorted by federal agents in January 2006. [Source: Alan Diaz / Associated Press]Jose Padilla, a US citizen and “enemy combatant” alleged to be an al-Qaeda terrorist (see May 8, 2002) and held without charges for over three years (see October 9, 2005), is charged with being part of a North American terrorist cell that sent money and recruits overseas to, as the indictment reads, “murder, maim, and kidnap.” The indictment contains none of the sensational allegations that the US government has made against Padilla (see June 10, 2002), including his supposed plan to detonate a “dirty bomb” inside the US (see Early 2002) and his plans to blow up US hotel and apartment buildings (see March 2002). Nor does the indictment accuse Padilla of being a member of al-Qaeda. Attorney General Alberto Gonzales says, “The indictment alleges that Padilla traveled overseas to train as a terrorist (see September-October 2000) with the intention of fighting a violent jihad.” He refuses to say why the more serious charges were not filed. Some provisions of the Patriot Act helped the investigation, Gonzales adds: “By tearing down the artificial wall that would have prevented this kind of investigation in the past, we’re able to bring these terrorists to justice,” he says. The Padilla case has become a central part of the dispute over holding prisoners such as Padilla without charge; by charging Padilla with lesser crimes, the Bush administration avoids the possibility of the Supreme Court ruling that he and other “enemy combatants,” particularly American citizens, must either be tried or released. Law professor Eric Freedman says the Padilla indictment is an effort by the administration “to avoid an adverse decision of the Supreme Court.” Law professor Jenny Martinez, who represents Padilla, says: “There’s no guarantee the government won’t do this again to Mr. Padilla or others. The Supreme Court needs to review this case on the merits so the lower court decision is not left lying like a loaded gun for the government to use whenever it wants.” Padilla’s lawyers say the government’s case against their client is based on little more than “double and triple hearsay from secret witnesses, along with information allegedly obtained from Padilla himself during his two years of incommunicado interrogation.” Padilla will be transferred from military custody to the Justice Department, where he will await trial in a federal prison in Miami. He faces life in prison if convicted of conspiracy to murder, maim, and kidnap overseas. The lesser charges—providing material support to terrorists and conspiracy—carry maximum prison terms of 15 years each. [Associated Press, 11/22/2005; Fox News, 11/23/2005]
'Dirty Bomb' Allegations 'Not Credible,' Says Former FBI Agent - Retired FBI agent Jack Cloonan, an expert on al-Qaeda, later says: “The dirty bomb plot was simply not credible. The government would never have given up that case if there was any hint of credibility to it. Padilla didn’t stand trial for it, because there was no evidence to support it.” [Vanity Fair, 12/16/2008]
Issue with CIA Videotapes - In 2002, captured al-Qaeda leader Abu Zubaida identified Padilla as an al-Qaeda operative (see Mid-April 2002) and the government cited Zubaida as a source of information about Padilla after Padilla’s arrest. Yet, sometime this same month, the CIA destroys the videotapes of Zubaida’s interrogations from the time period where he allegedly identified Padilla (see November 2005). The Nation’s Aziz Huq will later comment: “Given the [Bush] administration’s reliance on Zubaida’s statements as evidence of Padilla’s guilt, tapes of Zubaida’s interrogation were clearly relevant to the Padilla trial.… A federal criminal statute prevents the destruction of any record for a foreseeable proceeding, even if the evidence is not admissible.… [I]t seems almost certain that preservation of the tapes was legally required by the Jose Padilla prosecution.” [Nation, 12/11/2007]

Entity Tags: Jenny Martinez, Jose Padilla, US Supreme Court, Jack Cloonan, Eric Freedman, Alberto R. Gonzales, Bush administration (43), Al-Qaeda, Aziz Huq, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The Supreme Court declines, without comment, to hear the case (see August 4, 2005) brought by former FBI translator Sibel Edmonds. [New York Times, 11/28/2005; Reuters, 11/28/2005] The decision puts an end to Edmonds’ legal efforts to hold the bureau accountable for its failure to address several security issues raised by Edmonds in late 2001 and early 2002 (see December 2, 2001 and Afternoon February 12, 2002, respectively). On August 4, Edmonds had filed a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urged the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. (In May, the federal appeals court had closed the courtroom to the public and media.) Had the Supreme Court had ruled in favor of Edmonds, she would have been able to return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 pdf file; Government Executive, 8/8/2005]

Entity Tags: US Supreme Court, Sibel Edmonds

Timeline Tags: Complete 911 Timeline

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

An FBI investigation into Jane Harman (D-CA), the ranking minority member of the House Intelligence Committee, is halted by Attorney General Alberto Gonzales, according to three former top national security officials. The investigation was to determine whether she agreed to use her influence on behalf of accused Israeli spies in return for Israeli support in being named chairman of the committee (see Summer 2005, October 2005 and December 2, 2006). In contrast to the former officials’ claims, the media will report that the investigation is ended due to “lack of evidence” of impropriety or illegal behavior on Harman’s part. However, according to the former officials, Gonzales wants Harman to help defend the administration’s warrantless wiretapping program, which is about to be revealed by a long-simmering New York Times story (see December 15, 2005). The evidence against Harman includes NSA wiretaps of a conversation between her and an Israeli agent. Reporter Jeff Stein will write, “As for there being ‘no evidence’ to support the FBI probe, a source with first-hand knowledge of the wiretaps called that ‘bull****.’” Another former national security officer will confirm Harman’s presence on the wiretaps. “It’s true,” the official will say. “She was on there.” Justice Department attorneys in the intelligence and public corruption units have concluded that Harman had committed what they called a “completed crime,” meaning there was evidence to show that she had attempted to complete it; they were prepared to open a case on her that would include wiretaps approved by the Foreign Intelligence Surveillance Court (FISC). CIA Director Porter Goss certified the FISA wiretapping request, and decided to inform House Speaker Dennis Hastert (R-IL) and ranking House Democrat Nancy Pelosi (D-CA) of the impending FBI investigation. At this point, say Stein’s sources, Gonzales intervenes to stop the investigation. Two officials with knowledge of the events will say that, in Gonzales’s words, he “needed Jane” to help support the warrantless wiretapping program once it became public knowledge. Gonzales tells Goss that Harman had helped persuade the Times to refrain from publishing the story in late 2004 (see Early November 2004, December 6, 2005, and Mid-2005), and although the Times would no longer wait on the story, Harman could be counted on to help defend the program. She will do just that (see December 21, 2005 and February 8-12, 2006). Hastert and Pelosi are never told of the FBI investigation. Stein will also learn that Goss’s successor, Michael Hayden, will later be informed of the potential investigation, but choose to take no action. Likewise, Director of National Intelligence John Negroponte will oppose any such investigation. Former officials who will pursue the Israeli espionage case for years will say, in Stein’s words, that “Harman dodged a bullet… [s]he was protected by an administration desperate for help.” A recently retired national security official closely involved in the investigation will add: “It’s the deepest kind of corruption. It’s a story about the corruption of government—not legal corruption necessarily, but ethical corruption.” [Congressional Quarterly, 4/19/2009]

Entity Tags: Jeff Stein, Federal Bureau of Investigation, Dennis Hastert, Alberto R. Gonzales, Foreign Intelligence Surveillance Court, Jane Harman, Michael Hayden, Porter J. Goss, John Negroponte, House Intelligence Committee, New York Times, Nancy Pelosi

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Former Senate Majority Leader Tom Daschle (D-SD) writes that Congress explicitly rejected several attempts by the Bush administration to provide him with war-making authority and the authority to wiretap and monitor US citizens “in the United States” when it approved the September 18, 2001 authorization to use military force (AUMF) against terrorists (see September 14-18, 2001). Instead, the Bush administration merely usurped that authority and launched—or expanded (see Spring 2001)—its warrantless wiretapping program, conducted by the NSA. Since then, the Bush administration and the Justice Department have both repeatedly asserted that the AUMF gave them the right to conduct the wiretapping program, an assertion that Daschle says is flatly wrong. On December 21, the Justice Department admitted in a letter that the October 2001 presidential order authorizing warrantless eavesdropping on US citizens did not comply with “the ‘procedures’ of” the law that has regulated domestic espionage since 1978, known as the Foreign Intelligence Surveillance Act (FISA). FISA established a secret intelligence court and made it a criminal offense to conduct electronic surveillance without a warrant from that court, “except as authorized by statute.” However, the letter, signed by Assistant Attorney General William Moschella, argues that the AUMF gave the administration the authority to conduct the program. [Washington Post, 12/22/2005] The letter continues the argument that Congress gave President Bush the implict authority to create an exception to FISA’s warrant requirements, though the AUMF resolution did not mention surveillance and made no reference to the president’s intelligence-gathering authority. The Bush administration kept the program secret until it was revealed by the New York Times on December 15, 2005. Moschella argues that secret intelligence-gathering, even against US citizens, is “a fundamental incident to the use of military force” and that its absence from the resolution “cannot be read to exclude this long-recognized and essential authority to conduct communications intelligence targeted at the enemy.” Such eavesdropping, he argued, must by necessity include conversations in which one party is in the United States. [William Moschella, 12/22/2005 pdf file] Daschle, one of the primary authors of the resolution, says that Moschella and the Bush administration are wrong in their assertions: “I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance” (see September 12-18, 2001). [Washington Post, 12/23/2005]

Entity Tags: National Security Agency, Bush administration (43), Authorization to Use Military Force (AUMF), Al-Qaeda, Foreign Intelligence Surveillance Act, George W. Bush, Osama bin Laden, US Department of Justice, Foreign Intelligence Surveillance Court, New York Times, William E. Moschella, Richard (“Dick”) Cheney, Tom Daschle

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The National Security Agency’s ‘Trailblazer’ program (see Late 1999), envisioned in 1999 as an overarching state-of-the-art data-mining system capable of sorting through millions of telephone and Internet communications and pluck out items relevant to national security and counterterrorism, is an abject failure, according to multiple sources and reports. The program has soaked up six years of effort and $1.2 billion in taxpayer dollars, with nothing to show except some schematic drawings and a few isolated technological and analytical gadgets, and little hope of much future progress. Matthew Aid, who has advised three federal commissions and panels investigating the 9/11 attacks, says that Trailblazer is “the biggest boondoggle going on now in the intelligence community.” Part of the problem is that over its six years of development, Trailblazer has passed through three separate NSA divisions, each with its own priorities and design goals. Its overseers have failed to exert the proper authority to clearly define the program’s goals and keep the project on track. In 2003, the NSA’s inspector general found that the program suffered from “inadequate management and oversight” of private contractors and overpayment for the work that was done. The lead private contractor for the project, Science Applications International Corporation (SAIC), has not provided the technical and managerial expertise necessary to create the system. While the Bush administration has touted the NSA wiretapping program (see December 15, 2005) as vital to protecting the nation from terrorism, it allows the agency to mismanage Trailblazer, in essence allowing the agency to go increasingly “deaf” as millions of items of unimportant information overwhelm the agency’s ability to sort out key bits of information, according to a government official. A Congressional investigation of intelligence failures surrounding the 9/11 attacks found that the NSA did not sift out “potentially vital” information that could have predicted or even prevented the attacks—a lapse that Trailblazer was intended to correct. Aid says that the problem is akin to searching for a needle in a haystack that doubles in size every few months. Intelligence experts say that the problem with Trailblazer is like deciding whether to keep a piece of mail or throw it out based only on what is on the outside of the envelope. Approximately 95% of the information gathered by the NSA is discarded without ever being translated from its original binary form; the remaining 5% is turned into plain text for human analysts to survey. Trailblazer was designed to sort through this information to identify patterns, keywords, and links to other data. The program would, in theory, translate all of the information into plain text or voice data, analyze the results to identify items of interest, store the results in an easily searchable database, and forward selected items to the appropriate analysts for follow-up. But after six years of work, there will still be no consensus among agency managers and experts as how to create a system to do this. Interestingly, another, less grandiose program, code-named Thinthread, appeared promising—a 2004 Pentagon report found that Thinthread could work better and be put to use more quickly than Trailblazer—but NSA managers disagreed with the Pentagon report and canceled Thinthread. Instead, Hayden pushed the agency to get Trailblazer up and running after the 9/11 attacks, cutting into time needed for review and corrections. Internal and external warnings that the program was going off-course were ignored; because of its secrecy and technological sophistication, neither Congress nor the NSA was able to effectively monitor the progress of the program’s development. And the agency lost track of much of the $1.2 billion that was allocated by Congress for the program. NSA Inspector General Joel Brenner blames the waste and inefficiency on “inadequate management and oversight.” As of 2006, the Government Accountability Office, the investigative arm of Congress, has not investigated Trailblazer simply because no one in Congress had asked it to. Because of the impact of the 9/11 attacks, and the war in Iraq, Congress has never seriously considered cutting back or reviewing any programs such as Trailblazer that might provide information on further terrorist attacks. [Baltimore Sun, 1/29/2006]

Entity Tags: Matthew Aid, Bush administration (43), Joel Brenner, Trailblazer, US Department of Defense, Government Accountability Office, Michael Hayden, Thinthread, National Security Agency, Science Applications International Corporation (SAIC)

Timeline Tags: Civil Liberties

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

John Yoo’s ‘The Powers of War and Peace.’John Yoo’s ‘The Powers of War and Peace.’ [Source: University of Maryland]Libertarian law professor Cass Sunstein reviews a recent book by former Bush legal adviser John Yoo, who authored several of the Bush administration’s most controversial legal opinions concerning terrorism and executive power (see September 21, 2001, September 25, 2001, September 25, 2001, October 4, 2001, October 23, 2001, October 23, 2001, November 2, 2001, November 6-10, 2001, November 15, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24, 2002, January 24-26, 2002, March 13, 2002, April 8, 2002, June 27, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and October 11, 2002). Yoo’s book, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11, is a compendium of his pre-9/11 academic writings that landed him his job at the Justice Department’s Office of Legal Counsel. Sunstein notes that Yoo, perhaps more than any other single legal scholar, has reshaped the government’s legal stance on any number of issues. He argued for the president’s unilateral ability to declare war without the approval of Congress, the use of “enhanced interrogation techniques” on suspected terrorists, the withdrawal of essential civil liberties and legal rights from suspected terrorists and enemy collaborators, the right of the administration to electronically eavesdrop on the American citizenry without judicial consent or oversight, the ability to ignore or withdraw from international treaties without congressional approval, and more besides. Sunstein writes: “[T]aken as a whole, the claims of the Bush administration may be properly regarded as an effort to create a distinctive set of constitutional understandings for the post-September 11 era. The White House is attempting to create a kind of 9/11 Constitution. A defining feature of these understandings is a strong commitment to inherent presidential authority over national security, including a belief that in crucial domains the president can act without congressional permission, and indeed cannot be checked by congressional prohibitions.” Yoo is a key figure in that effort. Sunstein calls his work interesting but completely one-sided, simply ignoring “the mountainous counter-evidence” against most of his constitutional claims. “Yoo’s reading would require us to ignore far too many statements by prominent figures in the founding generation,” Sunstein writes. “There are not many issues on which James Madison, Thomas Jefferson, John Marshall, Alexander Hamilton, George Washington, James Wilson, John Adams, and Pierce Butler can be said to agree. Were all of them wrong?” Sunstein concludes: “[W]ith respect to war, there is no reason for a 9/11 Constitution. The old one, read in the light of our traditions, will do just fine.” [New Republic, 1/9/2006; Savage, 2007, pp. 81-82]

Entity Tags: Bush administration (43), Office of Legal Counsel (DOJ), John C. Yoo, Cass Sunstein

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” [Dean, 2006, pp. 170-171; Talking Points Memo, 1/17/2006]

Entity Tags: Albert Arnold (“Al”) Gore, Jr., George W. Bush, Joshua Micah Marshall

Timeline Tags: Civil Liberties

The Congressional Research Service (CRS) finds that the Bush administration broke the law when it refused to provide timely and complete briefings to the appropriate members of Congress on the National Security Agency’s domestic wiretapping program. The CRS’s legal analysis concludes that the administration’s limited briefings are “inconsistent with the law.” The CRS performed the analysis at the request of Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee and a member of the so-called “Gang of Eight,” the eight members of Congress that Bush allows to receive limited information on the NSA program. Harman, who calls the CRS report “a solid piece of work,” wrote to Bush on January 4, 2006, to inform him that she believes the information should be provided to all the members of the House and Senate Intelligence Committees. The briefings, which are intentionally limited in scope, are provided only to eight members of Congress: the Speaker of the House, the House Minority Leader, the Senate Majority and Minority Leaders, and the ranking members of the House and Senate Intelligence Committees. Harman says that an upcoming briefing, scheduled for February 6, should include all members of the intelligence committees. The briefings on the NSA program are held through the office of Vice President Dick Cheney. Though Harman is in agreement with the CRS that the briefings are legally inadequate, House Intelligence Committee chairman Peter Hoekstra (R-MI) has said he believes the briefings are adequate for Congressional oversight.
bullet The CRS finding is based on the requirements of the 1947 National Security Act, that mandates that all of the members of the House and Senate Intelligence Committees be “fully and currently informed” of intelligence activities. The Act says that “covert actions” can only be revealed to the “Gang of Eight,” but, the CRS finds, since the NSA’s domestic surveillance program does not appear to be covert, limiting the briefings to just eight members of Congress “would appear to be inconsistent with the law.” The memo gives several options for the administration to bring itself into compliance with the law, noting, for example, that “[t]he executive branch may assert that the mere discussion of the NSA program generally could expose certain intelligence sources and methods to disclosure.” [New York Times, 1/18/2006; Washington Post, 1/19/2006]

Entity Tags: Jane Harman, “Gang of Eight”, Bush administration (43), House Intelligence Committee, National Security Act, Peter Hoekstra, National Security Agency, Congressional Research Service, Richard (“Dick”) Cheney, Senate Intelligence Committee

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

President Bush at the National Security Agency.President Bush at the National Security Agency. [Source: Eric Draper / White House]President George Bush uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Bush says: “We know that two of the hijackers who struck the Pentagon [Nawaf Alhazmi and Khalid Almihdhar] were inside the United States communicating with al-Qaeda operatives overseas. But we didn’t realize they were here plotting the attack until it was too late.” Bush also quotes former NSA Director Michael Hayden, who previously said, “Had this program been in effect prior to 9/11… we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such” (see January 23, 2006). Bush and other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005). [White House, 1/25/2006] Bush made similar remarks at Kansas State University two days previously. [White House, 1/23/2006]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

Electronic Frontier Foundation logo.Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Entity Tags: Electronic Frontier Foundation, Foreign Intelligence Surveillance Act, National Security Agency, AT&T, US Department of Justice, Kevin Bankston

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Entity Tags: US Department of Justice, Tasia Scolinos, H. Marshall Jarrett, National Security Agency, George W. Bush, Bush administration (43), Maurice Hinchey, Office of Professional Responsibility

Timeline Tags: Civil Liberties

Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]

Entity Tags: National Security Agency, MCI, WorldCom, Al-Qaeda, AT&T, Verizon Wireless, Sprint/Nextel

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales says he will sharply limit the testimony of former attorney general John Ashcroft and former deputy attorney general James Comey before the Senate Judiciary Committee. The committee is preparing for hearings on the warrantless wiretapping program authorized by President Bush several months after the 9/11 attacks (see Early 2002). Gonzales says that “privilege issues” will circumscribe both men’s testimony: “As a general matter, we would not be disclosing internal deliberations, internal recommendations. That’s not something we’d do as a general matter, whether or not you’re a current member of the administration or a former member of the administration.” He adds, “You have to wonder what could Messrs. Comey and Ashcroft add to the discussion.” Comey was an observer to the late-night visit by Gonzales and then-White House chief of staff Andrew Card to Ashcroft’s hospital room, where Gonzales and Card unsuccessfully attempted to persuade the heavily sedated Ashcroft to reauthorize the program after Comey, as acting attorney general, determined the program was likely illegal (see March 10-12, 2004). Committee chairman Arlen Specter (R-PA) says he has asked Gonzales for permission to call Comey and Ashcroft to testify, but has not yet received an answer. Specter says, “I’m not asking about internal memoranda or any internal discussions or any of those kind of documents which would have a chilling effect.” Specter will ask Ashcroft and Comey to talk about the legal issues at play in the case, including the events surrounding the hospital visit. In the House Judiciary Committee, Republicans block an attempt by Democrats to ask Gonzales to provide legal opinions and other documents related to the program. [Washington Post, 2/16/2006]

Entity Tags: Andrew Card, Alberto R. Gonzales, Arlen Specter, George W. Bush, John Ashcroft, House Judiciary Committee, James B. Comey Jr., Senate Judiciary Committee

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

Page 3 of 5 (467 events)
previous | 1, 2, 3, 4, 5 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike