!! History Commons Alert, Exciting News

Context of 'February 2001: NSA Approaches Qwest, Other Telecoms, For Provision of Domestic Phone Records and Surveillance Access'

This is a scalable context timeline. It contains events related to the event February 2001: NSA Approaches Qwest, Other Telecoms, For Provision of Domestic Phone Records and Surveillance Access. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

Assistant Attorney General William Moschella informs the ranking members of the House and Senate Intelligence committees of the administration’s use of potentially unconstitutional data mining and electronic surveillance programs after the 9/11 attacks. Moschella tells the lawmakers, “The president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. One such program is the Novel Intelligence from Massive Data (NIMD) initiative (see After September 11, 2001). Moschella echoes the claims of National Security Agency director Michael Hayden and other administration officials, saying that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” [National Journal, 1/20/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002). Moschella informs the lawmakers of none of this.

Entity Tags: Senate Intelligence Committee, William E. Moschella, Michael Hayden, Bush administration (43), Foreign Intelligence Surveillance Act, Novel Intelligence from Massive Data, House Intelligence Committee

Timeline Tags: Civil Liberties

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Ira Winkler.Ira Winkler. [Source: Canadian Broadcasting Corporation]Former NSA analyst Ira Winkler, author of the 2005 book Spies Among Us, writes of his disgust with the NSA’s domestic surveillance program, saying that because it is warrantless, it is illegal. He argues the program violates both the NSA’s rules of engagement and its long-term missions.
Warrantless Surveillance is Illegal - Securing warrants under the Foreign Intelligence Surveillance Act is easily done, Winkler says: “FISA blocks no legitimate acquisition of knowledge. It doesn’t even slow the process down.” The problem, Winkler says, is that the program is so large that securing FISA warrants for every communication the NSA monitors “would [take] an army of lawyers to get all the warrants they’d need to be in compliance with FISA.” However: “[T]he law is the law. No president has the right to pick and choose which laws they find convenient to follow.” President Bush could have asked Congress to amend the FISA laws: “After all, after 9/11 Congress passed a wide variety of laws (without, for the most part, reading them) that were supposed to prevent another attack. They could have easily slipped something modifying FISA into all of that legislation. They did not, though recent revelations about this administration’s use of signing statements may indicate that they simply didn’t want to raise the possibility of questions.” Merely ignoring FISA “is illegal,” Winkler writes.
Weakens National Security - Another issue is national security. Not obtaining warrants actually weakens natural security, he argues, “since the process of obtaining the warrants has an effect on quality control.” For example: “To date, FBI agents have been sent out to do thousands of investigations based on this warrantless wiretapping. None of those investigations turned up a legitimate lead. I have spoken to about a dozen agents, and they all roll their eyes and indicate disgust with the man-years of wasted effort being put into physically examining NSA ‘leads.’ This scattershot attempt at data mining drags FBI agents away from real investigations, while destroying the NSA’s credibility in the eyes of law enforcement and the public in general. That loss of credibility makes the NSA the agency that cried wolf—and after so many false leads, should they provide something useful, the data will be looked at skeptically and perhaps given lower priority by law enforcement than it would otherwise have been given.” Winkler says the NSA’s claim that it does not retain any personal information is ludicrous. “Frankly, you have to be a complete moron to believe that,” he writes. “It is trivial to narrow down access to a phone number to just a few members of a household, if not in fact to exactly one person.”
Extortion - And the warrantless surveillance is not the only illegal action taken by the government. If the government did threaten one telecom firm, Qwest, for not cooperating (see February 2001), “[t]hat’s extortion—another crime.” Winkler writes that both Congress and the American people must demand answers, or the White House and the NSA will continue to usurp our freedom under the cloak of protecting freedoms.
Arguments For Program are Specious - Winkler says the arguments for the program that he hears are groundless. He hears three main threads:
bullet “I have nothing to worry about so I don’t care if they investigate me.” Winkler points out that plenty of people have been investigated and incarcerated in the US and abroad without doing anything wrong: “I believe that Saddam Hussein would cheerfully agree with the tired allegation that if you did nothing wrong, you shouldn’t mind the government looking at your calls. I think Lenin, Stalin, Hitler and the Chinese government would also agree with that line of thought. Is this the company we consent to keep in the name of safety?”
bullet “[W]e need to do everything we can to protect ourselves.” Protecting ourselves, Winkler argues, means letting law enforcement work to protect US citizens against real, ongoing crimes. The government is “watching for dragons while very real snakes multiply freely in our midst.”
bullet “[T]he NSA isn’t listening to the content of the calls, so there’s no harm.” Aside from the fact that Winkler believes the NSA is lying about not listening to the calls themselves, he says: “[The NSA] doesn’t need to hear your chatter to invade your privacy. By simply tying numbers together—an intelligence discipline of traffic analysis—I assure you I can put together a portrait of your life. I’ll know your friends, your hobbies, where your children go to school, if you’re having an affair, whether you plan to take a trip and even when you’re awake or asleep. Give me a list of whom you’re calling and I can tell most of the critical things I need to know about you.” The NSA is made up of mostly “good and honest people,” but it has “more than its share of bitter, vindictive mid- and senior-level bureaucrats. I would not trust my personal information with these people, since I have personally seen them use internal information against their enemies.” Winkler reminds his readers that the Bush administration deliberately outed CIA agent Valerie Plame Wilson because her husband dared debunk an administration claim about Iraq (see November 20, 2007), and tried to undermine the credibility of former counterterrorism chief Richard Clarke when he spoke out against the administration (see March 24, 2004). The NSA could easily provide the administration with damaging information about other administration enemies.
'Against Everything I Was Taught' - “NSA domestic spying is against everything I was ever taught working at the NSA,” Winkler writes. “I might be more for it if there was any credible evidence that this somehow provides useful information that couldn’t otherwise be had. However, the domestic spying program has gotten so massive that the well-established process of getting a warrant cannot be followed—and quantity most certainly doesn’t translate to quality. Quite the opposite.” The terrorists number in the hundreds, Winkler writes, but “the NSA is collecting data on hundreds of millions of people who are clearly not the enemy. These numbers speak for themselves.” [Computerworld, 5/16/2006]

Entity Tags: Qwest, George W. Bush, Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Ira Winkler, National Security Agency, Valerie Plame Wilson, Saddam Hussein, Richard A. Clarke, Vladimir Lenin, Josef Stalin

Timeline Tags: Civil Liberties

Judge Vaughn Walker of the US District Court of Northern California rejects a request by the Justice Department to dismiss a lawsuit by the Electronic Frontier Foundation (EFF—see January 31, 2006) against AT&T. The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government has asserted that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006 and June 23, 2006). According to AT&T whistleblower Mark Klein, working with the EFF in the lawsuit, Walker “ridicule[s]” the government’s request for dismissal on state secrets grounds, finding that “[t]he government has opened the door for judicial inquiry by publicly confirming and denying material information about its monitoring of communications content.… AT&T and the government have for all practical purposes already disclosed that AT&T assists the government in monitoring communication content. [T]he government has publicly admitted the existence of a ‘terrorist surveillance program’ (see After September 11, 2001, After September 11, 2001, October 2001, and September 2002).… Considering the ubiquity of AT&T telecommunications services, it is unclear whether this program could even exist without AT&T’s acquiescence and cooperation.” EFF had given Walker the ammunition for his finding by providing him with a raft of media stories about AT&T’s involvement in the NSA surveillance program, as well as media coverage of Klein’s assertions (see April 12, 2006 and May 17, 2006). “The very subject matter of this action is hardly a secret” any longer, Walker finds (see May 24, 2006). “[D]ismissing this case at the outset would sacrifice liberty for no apparent enhancement of security.” Walker also rejects a separate motion to dismiss by AT&T, which had argued that its relationship with the government made it immune from prosecution. Marc Rotenberg of the Electronic Privacy Information Center (EPIC) says: “This cases arises against the backdrop of the accountability of the government as it pursues its surveillance program. This is a significant victory for the principle of government accountability.” AT&T spokesman Walt Sharp refuses to give a direct comment about the ruling, but says that AT&T has always protected its customers’ privacy (see February 2001 and Beyond, February 2001, and Late 2002-Early 2003). The government will obtain a stay of Walker’s ruling while it files an appeal, preventing the EFF documents from being publicly disseminated. [New York Times, 7/21/2006; Klein, 2009, pp. 78-79]

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, Marc Rotenberg, US Department of Justice, Walter Sharp, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties


Time period

Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database


Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now


If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike