!! History Commons Alert, Exciting News

Context of 'August 5, 2007: Protect America Act Becomes Law, Gives Government Broad New Surveillance Powers'

This is a scalable context timeline. It contains events related to the event August 5, 2007: Protect America Act Becomes Law, Gives Government Broad New Surveillance Powers. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A Time magazine profile lambasts the racist, anti-Communist John Birch Society (JBS—see December 2011), in what is many Americans’ first exposure to the group. It delineates the organization’s penchant for secrecy, its domination by its “dictatorial” leader, Robert Welch, and its hardline battle against almost every element of the federal government as “agents of Communism.” Forty to 60 percent of the federal government is controlled by Communism, the JBS believes. Time calls the organization “a tiresome, comic-opera joke” that nonetheless has cells in 35 states and an ever-widening influence. In Wichita, Kansas, JBS student members are trained to inform their cell leaders of “Communist” influences they may detect in their classroom lectures, and the offending teacher is berated by parents. A Wichita businessman who wanted to give a donation to the University of Wichita decided not to donate after being hounded by local JBS members, who wanted the university to fire professors and remove selected books from its library. “My business would be wrecked,” the businessman explains, “if those people got on the phone and kept on yelling that I am a Communist because I give money to the school.” Nashville, Tennessee, JBS members organize community members to verbally attack neighbors whom they suspect of Communist affiliations. JBS’s current priority, Time writes, is to bring about the impeachment of Chief Justice Earl Warren. Welch, who obtained his wealth from his brother’s candymaking business, believes that Social Security and the federal income tax are all part of the “creeping socialism” that is taking over the federal government. He retired from the business in 1957 and founded the JBS shortly thereafter, naming it for a US Navy captain killed by Chinese Communist guerrillas after the end of World War II. Welch’s seminal tract, “The Politician,” accuses President Eisenhower and his brother Milton Eisenhower of being Communist plants, and accuses both men of treason against the nation. [Time, 3/10/1961]

Entity Tags: Milton Eisenhower, John Birch Society, Time magazine, Dwight Eisenhower, Robert Welch, Earl Warren

Timeline Tags: Domestic Propaganda

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Issuetsdeah, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

David Hicks.David Hicks. [Source: Associated Press]In the case of Rasul v. Bush, involving Guantanamo detainees Shafiq Rasul, Mamdouh Habib, David Hicks, and Asif Iqbal, the Supreme Court holds in a 6-3 ruling that the US exercises “complete jurisdiction and control” over Guantanamo Bay, and thus, that the Guantanamo prisoners have the right to challenge their detentions before a judge. Under the habeas corpus statute, Justice John Paul Stevens writes for the majority that “aliens held at the base, no less than American citizens, are entitled to invoke the federal courts’ authority.” [Supreme Court opinion on writ of certiorari. Shafiq Rasul, et al. v. George W. Bush, et al., 6/28/2004] It is unclear whether the court’s ruling is intended to extend to detainees held in other parts of the world, but given the court’s reasoning, it appears that decision applies to detainees both in Guantanamo and elsewhere. [New York Times, 6/29/2004]
Conservative Dissent - The three dissenting justices are conservatives William Rehnquist, Antonin Scalia, and Clarence Thomas. Scalia says the decision is “an irresponsible overturning of settled law in a matter of extreme importance to our forces currently in the field.” He acknowledges that the location of Guantanamo has in fact been intended to keep detainees outside of the reach of the judiciary. “Today, the court springs a trap on the executive, subjecting Guantanamo Bay to the oversight of federal courts even though it has never before been thought to be within their jurisdiction, and thus making it a foolish place to have housed alien wartime detainees,” Scalia writes. Stevens writes that it does not matter what status the Guantanamo inmates have regarding the question of whether they should have access to a US court. “What is presently at stake is only whether the federal courts have jurisdiction to determine the legality of the executive’s potentially indefinite detention of individuals who claim to be wholly innocent of wrongdoing.” And this, he writes, they do. The case is subsequently sent back to a lower court to consider the prisoners’ claims. [Guardian, 6/28/2004]
Side-Stepping the Ruling - The media characterizes the decision as a rebuke for the Bush administration, which had argued that the courts have no right to interfere in the commander in chief’s decisions involving wartime policies. However, the decision says nothing about what rights the detainees might have once they get inside a courtroom, and therefore actually places little real restraint on the government. White House officials will decide that the detainees have no rights in the courtroom whatsoever—although the Court has ruled that they can file lawsuits, those lawsuits must be dismissed out of hand because the detainees have no right to actually present a case. The Republican-led Congress will later pass a law stripping courts of jurisdiction over Guantanamo lawsuits. [Savage, 2007, pp. 192]

Entity Tags: William Rehnquist, Shafiq Rasul, Mamdouh Habib, Antonin Scalia, David Hicks, Asif Iqbal, John Paul Stevens, Clarence Thomas

Timeline Tags: Torture of US Captives, Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004) is gladdened to see the New York Times’s reports on the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 24, 2005). Klein has known since 2002 that the National Security Agency (NSA) has been using AT&T facilities to illegally eavesdrop on American citizens’ telephone and Internet communications (see Late 2002, January 2003, October 2003, Fall 2003, Late 2003, Late 2003, and January 16, 2004). He has considered going public with his knowledge, but has so far refrained because, he will later explain, “[t]he atmosphere was still kind of scary.” He will later say of the Times report, “They seemed to be talking mainly about phone calls, but anyway, it was revealed that there was an illegal spying program going on, and I thought, ‘Ah, this would probably blow the whole thing,’ and I thought it would all come out, and I don’t need to do anything.” However, Klein is horrified to see the government’s response. He will say: “[W]hat came out was the government turned around and went on the offensive against anybody who would dare to criticize them.… They’re issuing threats: Anyone who has a security clearance and spills any beans here is in for prosecution. That was deliberately said by them several times on TV to intimidate anybody in, say, the NSA who knew the truth, intimidate them so they would not come forward. So that silenced anybody in the intelligence community” (see December 17, 2005, December 19, 2005, December 21, 2005, December 30, 2005, and January 25-26, 2006). In his 2009 book Wiring Up the Big Brother Machine… and Fighting It, Klein will write that the Justice Department’s December 2005 investigation into the leak of classified information that led to the Times reports (see December 30, 2005) “was obviously intended to silence Congress, the media, and any potential whistleblowers inside the NSA who might have been tempted to come forward. The administration was manipulating the secrecy oath which people had taken to get security clearances, turning it into a weapon to silence anyone who had knowledge of wrongdoing.” Klein decides that he must come forward. He never received a security clearance, so he cannot be threatened with legal action over violating such clearance. He will explain: “All I had and still have are some company documents and some knowledge of some illicit NSA installation at AT&T’s network. And if anybody—say, Congress—was willing to follow the trail, I can give them all the names they want, and they can go up the hierarchy of AT&T all the way up to Dave Dorman, who was the president back then, and they can go even higher, and they can find out who is responsible for this, and they can ask them under oath and subpoena what the heck is going on here, if they had the will to do it.” Klein later admits to some hesitation and trepidation at undertaking such an effort, and will cite the “McCarthyite” atmosphere he says the government has created in which “dissidents become the target of a lynch mob searching for ‘terrorists.’” But, he will write, he believes the Times stories are “a political indication of a shift at the top of government, a split of some kind which could provide an opening.… Maybe they would publish my material, I thought, and that would provide some protection.” By December 31, Klein writes a preface to his memo from almost two years before (see January 16, 2004 and December 31, 2005). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 52-53]

Entity Tags: New York Times, AT&T, Bush administration (43), National Security Agency, US Department of Justice, Mark Klein

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]

Entity Tags: National Security Agency, MCI, WorldCom, Al-Qaeda, AT&T, Verizon Wireless, Sprint/Nextel

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Two public interest lawyers sue Verizon Communications for $5 billion, claiming the telecommunications firm violated privacy laws by giving the phone records of its customers to the NSA for that agency’s secret, warrantless domestic surveillance program. Lawyers Bruce Afran and Carl Mayer are asking that Verizon stop turning over its records to the NSA without either a court order or the consent of the customer. Afran says of the NSA program, “This is the largest and most vast intrusion of civil liberties we’ve ever seen in the United States.” [CBS News, 5/12/2006] Days later, AT&T and BellSouth are added to the lawsuit. [CNN, 5/17/2006]
Verizon Helped Build an NSA Database? - The day before, the press reports that the NSA has built a database of millions of domestic phone records since shortly after the 9/11 attacks, using records from Verizon, BellSouth, and AT&T (see May 11, 2006). Former Qwest CEO Joe Nacchio, whose firm refused to cooperate with the NSA, says that he was approached months before the attacks to help set up such a program (see February 27, 2001). The NSA has the power, under President Bush’s interpretation of his wartime authority, to have the agency eavesdrop on international calls made to or from the US, but cannot legally eavesdrop on internal calls unless it has a court order. The lawsuit claims that the telecoms violated the Constitution and the Telecommunications Act by giving its records to the government without court authorization. The lawsuit seeks $1,000 for each violation of the Telecommunications Act, or $5 billion if the case is certified as a class-action suit. The lawyers are seeking documents detailing the origins of the NSA program, as well as Bush’s own role in authorizing the program. “Federal law prohibits the phone companies from giving records to the government without a warrant,” says Afran. “There was no warrant, nor was there any attempt to get warrants, which is in violation of the constitution and the Telecommunications Act.” [CBS News, 5/12/2006; CNET News, 5/15/2006] Afran says, “One of the purposes of this case is to, quite frankly, hold the threat of financial destruction over the heads of the phone companies to make them abandon this policy of cooperating with warrantless searches by the government.” [National Public Radio, 5/17/2006] The lawsuit alleges that Verizon constructed a dedicated fiber optic line from New Jersey to a large military base in Quantico, Virginia, that allowed government officials to gain access to all communications flowing through the carrier’s operations center. A former consultant who worked on internal security will later say he had tried numerous times to install safeguards on the line to prevent hacking on the system, as he was doing for other lines at the operations center, but he was prevented from doing so by a senior security official. One of the allegations against Verizon in the lawsuit is made by Philadelphia resident Norman LeBoon, who says after he read of the alleged surveillance of US citizens, he began asking Verizon if his landline communications were being shared. LeBoon says he eventually spoke with “Ellen” in Verizon customer service, who told him, “I can tell you, Mr. LeBoon, that your records have been shared with the government, but that’s between you and me.… They [Verizon] are going to deny it because of national security. The government is denying it and we have to deny it, too. Around here we are saying that Verizon has ‘plausible deniability.’” [Truthdig, 8/9/2007]
AT&T Grants Unlimited Access? - The lawsuit claims that in February 2001, days before Qwest was approached, NSA officials met with AT&T officials to discuss replicating an AT&t network center to give the agency access to all the global phone and e-mail traffic that ran through it (see February 2001).
Earlier Reporting Made Key Error - Earlier reporting of the NSA’s cooperation with the telecoms got a key detail wrong, says telecom analyst Scott Cleland: “What I think people got wrong with the original reporting, was that this was local phone companies tracking local phone calls. What is clear now is they were tracking long distance calls.” [National Public Radio, 5/17/2006]

Entity Tags: Norman LeBoon, Qwest, National Security Agency, George W. Bush, Joe Nacchio, Michael Hayden, Bruce Afran, Carl Mayer, Verizon Communications

Timeline Tags: Civil Liberties

Lawyers file court documents alleging that the National Security Agency (NSA) worked with AT&T to set up a domestic wiretapping site seven months before the 9/11 attacks. The papers are filed as part of a lawsuit, McMurray v. Verizon Communications, which cites as plaintiffs AT&T, Verizon, and BellSouth customers whose privacy was allegedly violated by the NSA warrantless wiretapping program (see May 12, 2006); it also alleges that the firms, along with the NSA and President Bush, violated the Telecommunications Act of 1934 and the US Constitution. AT&T, Verizon, and BellSouth have been accused of working with the NSA to set up domestic call monitoring sites (see October 2001). Evidence that the NSA set up domestic surveillance operations at least seven months before the 9/11 attacks is at the core of the lawsuit (see Spring 2001). The suit is similar to one filed against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006) and other such lawsuits. A lawyer for the plaintiffs in McMurray, Carl Mayer, says: “The Bush administration asserted this [the warrantless wiretapping program] became necessary after 9/11. This undermines that assertion.” AT&T spokesman Dave Pacholczyk responds, “The US Department of Justice has stated that AT&T may neither confirm nor deny AT&T’s participation in the alleged NSA program because doing so would cause ‘exceptionally grave harm to national security’ and would violate both civil and criminal statutes.” Verizon has denied being asked by the NSA for its customer phone records, and has refused to confirm or deny “whether it has any relationship to the classified NSA program.” BellSouth spokesman Jeff Battcher says: “We never turned over any records to the NSA. We’ve been clear all along that they’ve never contacted us. Nobody in our company has ever had any contact with the NSA.” The NSA domestic wiretapping program is known as “Pioneer Groundbreaker,” a part of the larger “Project Groundbreaker” (see February 2001). According to Mayer and his fellow lawyer Bruce Afran, an unnamed former employee of AT&T provided them with information about NSA’s approach to AT&T. (That former employee will later be revealed as retired technician Mark Klein—see Late 2002, July 7, 2009, December 15-31, 2005, and April 6, 2006). The lawsuit is on a temporary hiatus while a judicial panel rules on a government request to assign all of the telecommunications lawsuits to a single judge. [Bloomberg, 6/30/2006]

Entity Tags: Verizon Wireless, US Department of Justice, National Security Agency, George W. Bush, Jeff Battcher, Bruce Afran, BellSouth, AT&T, Mark Klein, Carl Mayer, Electronic Frontier Foundation, Dave Pacholczyk

Timeline Tags: Civil Liberties

Salim Ahmed Hamdan in 1999.Salim Ahmed Hamdan in 1999. [Source: Pubic domain via the New York Times]In the Hamdan v. Rumsfeld case, the Supreme Court rules 5-3 to strike down the Bush administration’s plans to try Guantanamo detainees before military commissions. Ruling in favor of detainee Salim Ahmed Hamdan (see November 8, 2004), the Court rules that the commissions are unauthorized by federal statutes and violate international law. Writing for the majority, Justice John Paul Stevens says, “The executive is bound to comply with the rule of law that prevails in this jurisdiction.” The opinion throws out each of the administration’s arguments in favor of the commissions, including its assertion that Congress had stripped the Supreme Court of the jurisdiction to decide the case. One of the major flaws in the commissions, the Court rules, is that President Bush unilaterally established them without the authorization of Congress. [New York Times, 6/30/2006] During the oral arguments three months before, Hamdan’s lawyer, Neal Katyal, told the Court: “The whole point of this [proceeding] is to say we’re challenging the lawfulness of the tribunal [the military commissions] itself. This isn’t a challenge to some decision that a court makes. This is a challenge to the court itself, and that’s why it’s different than the ordinary criminal context that you’re positing.” [Savage, 2007, pp. 274-275]
Major Defeat for Bush Administration - Civil libertarian and human rights organizations consider the ruling a shattering defeat for the administration, particularly in its assertions of expansive, unfettered presidential authority. Bush says in light of the decision, he will work with Congress to “find a way forward” to implement the commissions. “The ruling destroys one of the key pillars of the Guantanamo system,” says Gerald Staberock, a director of the International Commission of Jurists. “Guantanamo was built on the idea that prisoners there have limited rights. There is no longer that legal black hole.” The ruling also says that prisoners held as “enemy combatants” must be afforded rights under the Geneva Conventions, specifically those requiring humane treatment for detainees and the right to free and open trials in the US legal system. While some form of military trials may be permissible, the ruling states that defendants must be given basic rights such as the ability to attend the trial and the right to see and challenge evidence submitted by the prosecution. Stevens writes that the historical origin of military commissions was in their use as a “tribunal of necessity” under wartime conditions. “Exigency lent the commission its legitimacy, but did not further justify the wholesale jettisoning of procedural protections.” [New York Times, 6/30/2006] In 2007, author and reporter Charlie Savage will write, “Five justices on the Supreme Court said Bush had broken the law.” [Savage, 2007, pp. 275]
Hardline Conservative Justices Dissent - Stevens is joined by Justices David Souter, Stephen Breyer, and Ruth Bader Ginsburg. Justice Anthony Kennedy issues a concurring opinion. Dissenting are Justices Samuel Alito, Antonin Scalia, and Clarence Thomas. Thomas, in a dissent signed by Scalia and Alito, calls the decision “untenable” and “dangerous.” Chief Justice John Roberts recused himself from the case because of his participation in a federal appeals court that ruled in favor of the administration (see November 8, 2004).
Not Charged for Three Years - Hamdan is a Guantanamo detainee from Yemen, captured in Afghanistan in November 2001 and taken to Guantanamo in June 2002. He is accused of being a member of al-Qaeda, in his function as driver and bodyguard for Osama bin Laden. He was not charged with a crime—conspiracy—until mid-2004. [New York Times, 6/30/2006]

Entity Tags: Samuel Alito, US Supreme Court, Salim Ahmed Hamdan, Stephen Breyer, Ruth Bader Ginsburg, John G. Roberts, Jr, Al-Qaeda, Antonin Scalia, Bush administration (43), Center for Constitutional Rights, Anthony Kennedy, John Paul Stevens, David Souter, International Commission of Jurists, Gerald Staberock, Geneva Conventions, Clarence Thomas

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]

Entity Tags: Geneva Conventions, Barack Obama, Bush administration (43), Foreign Intelligence Surveillance Act, Glenn Greenwald, US Department of Justice, US Supreme Court, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Federal district court judge Anna Diggs Taylor rules that the NSA’s warrantless wiretapping program (see Early 2002) is unconstitutional and orders it ended. She amends her ruling to allow the program to continue while the Justice Department appeals her decision. The decision is a result of a lawsuit filed by the American Civil Liberties Union (ACLU) and other civil liberties groups. Taylor rules that the NSA program violates US citizens’ rights to privacy and free speech, the Constitutional separation of powers among the three branches of government, and the Foreign Intelligence Surveillance Act (see 1978). Taylor writes: “It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. There are no hereditary Kings in America and no powers not created by the Constitution. So all ‘inherent powers’ must derive from that Constitution.” [Verdict in ACLU et al v. NSA et al, 8/17/2006 pdf file; Washington Post, 8/18/2006] The program “violates the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth amendments to the United States Constitution, the FISA and Title III,” Taylor writes, and adds, “[T]he president of the United States… has undisputedly violated the Fourth in failing to procure judicial orders.” [CNN, 8/17/2006]
Judge Lets One Portion Stand - Taylor rejects one part of the lawsuit that seeks information about the NSA’s data mining program (see October 2001), accepting the government’s argument that to allow that portion of the case to proceed would reveal state secrets (see March 9, 1953). Other lawsuits challenging the program are still pending. Some legal scholars regard Taylor’s decision as poorly reasoned: national security law specialist Bobby Chesney says: “Regardless of what your position is on the merits of the issue, there’s no question that it’s a poorly reasoned decision. The opinion kind of reads like an outline of possible grounds to strike down the program, without analysis to fill it in.” The White House and its Republican supporters quickly attack Taylor, who was appointed to the bench by then-President Jimmy Carter, as a “liberal judge” who is trying to advance the agenda of Congressional Democrats and “weaken national security.” For instance, Senator Mike DeWine (R-OH) says that halting the program “would hamper our ability to foil terrorist plots.” [Washington Post, 8/18/2006]
Democrats, Civil Libertarians Celebrate Ruling - But Democrats defend the ruling. For instance, Senator John Kerry (D-MA) says the ruling provides a much-needed check on the unfettered power of the Bush White House. “[N]o one is above the law,” says Kerry. [Washington Post, 8/18/2006] Lawyers for some of the other cases against the NSA and the Bush administration laud the decision as giving them vital legal backing for their own court proceedings. “We now have a ruling on the books that upholds what we’ve been saying all along: that this wiretapping program violates the Constitution,” says Kevin Bankston, who represents the Electronic Frontier Foundation (EFF) in its class-action case against AT&T for its role in the NSA’s surveillance program (see January 31, 2006). [Washington Post, 8/18/2006] Legal expert and liberal commentator Glenn Greenwald writes that Taylor’s ruling “does not, of course, prohibit eavesdropping on terrorists; it merely prohibits illegal eavesdropping in violation of FISA. Thus, even under the court’s order, the Bush administration is free to continue to do all the eavesdropping on terrorists it wants to do. It just has to cease doing so using its own secretive parameters, and instead do so with the oversight of the FISA court—just as all administrations have done since 1978, just as the law requires, and just as it did very recently when using surveillance with regard to the [British] terror plot. Eavesdropping on terrorists can continue in full force. But it must comply with the law.” Greenwald writes: “[T]he political significance of this decision cannot be denied. The first federal court ever to rule on the administration’s NSA program has ruled that it violates the constitutional rights of Americans in several respects, and that it violates criminal law. And in so holding, the court eloquently and powerfully rejected the Bush administration’s claims of unchecked executive power in the area of national security.” [Salon, 8/17/2006]
White House Refuses to Comply - The Bush administration refuses to comply with Taylor’s ruling, asserting that the program is indeed legal and a “vital tool” in the “war on terrorism.” It will quickly file an appeal, and law professors on both sides of the issue predict that Taylor’s ruling will be overturned. [Savage, 2007, pp. 206]
Lawsuit Ends with White House 'Compromise' - The lawsuit will end when the White House announces a “compromise” between the wiretapping program and FISC (see January 17, 2007).

Entity Tags: John Kerry, Kevin Bankston, Mike DeWine, US Department of Justice, Peter Hoekstra, Glenn Greenwald, National Security Agency, George W. Bush, James Earl “Jimmy” Carter, Jr., Foreign Intelligence Surveillance Act, Alberto R. Gonzales, American Civil Liberties Union, AT&T, Anna Diggs Taylor, Bush administration (43), Bobby Chesney, Foreign Intelligence Surveillance Court, Electronic Frontier Foundation

Timeline Tags: Civil Liberties

Bush administration officials tell Senate Intelligence Committee members that they will not promise to continue seeking warrants for surveillance on US citizens, as the administration agreed to do in January 2007. They insist that President Bush has the Constitutional authority to decide whether or not to order the NSA to conduct surveillance without warrants if he desires. The secret wiretapping program was revealed to the public just weeks before the agreement (see December 15, 2005), and immediately drew tremendous outcries of criticism from civil libertarians, from lawmakers from all across the political spectrum, and from much of the public. Since the January agreement, the Foreign Intelligence Surveillance Act (FISA) court has issued warrants for domestic wiretaps after being given evidence showing some kind of probable cause to justify the proposed surveillance. Previously, the wiretapping program had ignored the FISA restrictions. Now Bush officials, most notably the new director of national intelligence, Mike McConnell, are saying that Bush has the authority under Article II of the Constitution to order warrantless wiretaps on US citizens.
Invoking Presidential Authority - In Senate testimony on this day, Russ Feingold (D-WI) asks McConnell if he is willing to promise that the administration will no longer ignore the law and the court when monitoring citizens. McConnell replies, “Sir, the president’s authority under Article II is in the Constitution. So if the president chose to exercise Article II authority, that would be the president’s call.” McConnell is echoing previous arguments made by Bush and other officials, who have said that Bush has the power to order wiretaps without court review, both under the Constitution and under the September 2001 Congressional authorization to use military force against al-Qaeda. McConnell says that the administration is conducting surveillance against Americans only with court warrants, and has no plans “that we are formulating or thinking about currently” to resume domestic wiretapping without warrants. “But I’d just highlight,” he adds, “Article II is Article II, so in a different circumstance, I can’t speak for the president what he might decide.” [New York Times, 5/2/2007] Article II is the section of the Constitution that delineates the powers of the executive branch, and establishes the fundamental “separation of powers” doctrine that governs American democracy. Constitutional expert Steve Mount notes that the “Constitution is deliberately inefficient; the “Separation of Powers devised by the framers of the Constitution was designed to do one primary thing: to prevent the majority from ruling with an iron fist.” [Mount, 1995]
White House Seeking Congressional Authorization - While the administration continues to argue that it has the power to eavesdrop on US citizens without warrants, it also continues to seek Congressional legislation affirming and perhaps expanding that power. The White House justifies that hoped-for legislation by pointing to national security and the war on terrorism, as well as the challenges posed by new communications technologies such as e-mail and wireless communications. White House officials have consistently refused to go into specifics as to what communications gaps they feel need plugging. And they have consistently ignored Congressional requests for information and documents related to the NSA’s domestic spy program, now being called the “Terrorist Surveillance Program” by White House officials and their Republican colleagues. Many Congressional Democrats say they would be reluctant to support any such legislation until they receive the information they have requested. “To this day, we have never been provided the presidential authorization that cleared that program to go or the attorney general-Department of Justice opinions that declared it to be lawful,” says Senator Sheldon Whitehouse (D-RI). “Where’s the transparency as to the presidential authorizations for this closed program? That’s a pretty big ‘we’re not going to tell you’ in this new atmosphere of trust we’re trying to build.” [New York Times, 5/2/2007]

Entity Tags: Steve Mount, Sheldon Whitehouse, Senate Intelligence Committee, National Security Agency, Al-Qaeda, Bush administration (43), Foreign Intelligence Surveillance Court, Russell D. Feingold, Mike McConnell, George W. Bush

Timeline Tags: Civil Liberties

The Protect America Act (PAA) (see August 5, 2007), an amendment to the Foreign Intelligence Surveillance Act (FISA—see 1978), is introduced in Congress. With limited debate and no committee hearings, it passes both houses with substantial majorities. [US Senate, 8/5/2007; Boston Globe, 8/6/2007; House Judiciary Committee, 9/18/2007 pdf file] Congressional Democrats quickly capitulate on the bill, submitting to what the Washington Post later calls “a high-pressure campaign by the White House to change the nation’s wiretap law, in which the administration capitalized on Democrats’ fears of being branded weak on terrorism and on Congress’s desire to act on the issue before its August recess.” [Washington Post, 8/5/2007] Indeed, one Republican senator, Trent Lott, warns during the initial debate that lawmakers should pass the law quickly and get out of Washington before they could be killed in a terrorist attack (see August 2, 2007). McConnell tells the Senate, “Al-Qaeda is not going on vacation this month.” And Democrat Joseph Lieberman (D-CT), a supporter of the bill, told his colleagues: “We’re at war. The enemy wants to attack us. This is not the time to strive for legislative perfection.” [Slate, 8/6/2007]
Some Democrats Unhappy - One Democratic lawmaker responds angrily: “There are a lot of people who felt we had to pass something. It was tantamount to being railroaded.” Many House Democrats feel betrayed by the White House; Democratic leaders had reached what they believed was a deal on the bill with the Director of National Intelligence, Mike McConnell, only to have the White House throw out the deal and present a new list of conditions at the last minute. Both McConnell and the White House deny that any such deal was reached. Jan Schakowsky (D-IL), a member of the House Intelligence Committee, says, “I think the White House didn’t want to take ‘yes’ for an answer from the Democrats.” Representative Jerrold Nadler (R-NY) says lawmakers were “stampeded by fear-mongering and deception” into voting for the bill. Fellow House Democrat Jane Harman (D-CA) warns that the PAA will lead to “potential unprecedented abuse of innocent Americans’ privacy.” [Washington Post, 8/5/2007] The ACLU’s Caroline Fredrickson has a succinct explanation of why the Democrats folded so quickly: “Whenever the president says the word terrorism, they roll over and play dead.” [Slate, 8/6/2007]
AT&T Whistleblower: Democratic Leadership Colluded in Passing PAA - AT&T whistleblower Mark Klein (see July 7, 2009 and December 15-31, 2005) will later write that the Democrats played a far more active role in getting the PAA passed than others acknowledge. He will quote a 2008 column by liberal civil liberties advocate Glenn Greenwald, who will write: “[I]n 2006, when the Congress was controlled by [then-Senate Majority Leader] Bill Frist [R-TN] and [then-House Speaker] Denny Hastert [R-IL], the administration tried to get a bill passed legalizing warrantless eavesdropping and telecom amnesty, but was unable. They had to wait until the Congress was controlled by [House Majority Leader] Steny Hoyer [D-MD], [House Speaker] Nancy Pelosi [D-CA], and [Senate Majority Leader] Harry Reid [D-NV] to accomplish that.” According to Klein, once the Democrats took control of Congress in January 2007, they engaged in “pure theater, posturing as opponents of the illegal NSA program while seeking a way to protect the president.” The few principled Democrats to actively oppose the legislation, such as Senator Christopher Dodd (D-CT), were, Klein will write, “hamstrung by their own leadership.” The PAA passage was accompanied by refusals from the Democratic leaders of “the relevant Intelligence and Judiciary Committees, which were now led by Democrats such as [John D.] Rockefeller, [Dianne] Feinstein (see February 1-6, 2006), and [Patrick] Leahy in the Senate, and John Conyers and Sylvestre Reyes in the House,” who “quickly decided not to launch any serious investigations into the NSA spying.” Klein will later add that at the time of the PAA passage, he was unaware of how thoroughly Democrats had been briefed on the NSA program (see October 1, 2001, October 11, 2001, October 25, 2001 and November 14, 2001, July 17, 2003, and March 10, 2004), “and thus were in on the secret but took no action to stop it.” [Salon, 6/19/2008; Klein, 2009, pp. 86-87]

Entity Tags: Trent Lott, Mike McConnell, Protect America Act, Joseph Lieberman, Mitch McConnell, Jane Harman, Jerrold Nadler, Caroline Fredrickson, Bush administration (43), Jan Schakowsky, House Intelligence Committee

Timeline Tags: Civil Liberties

During the Senate debate over the controversial Protect America Act (see August 5, 2007), Minority Leader Trent Lott (R-MS) says that the threat from terrorism is so dire, and so imminent, that lawmakers should pass the law and then get out of Washington as soon as they can to save their own lives. (Congress goes into recess in a few days.) Lott says that Congress needs to pass the PAA, otherwise, “the disaster could be on our doorstep.” He continues, “I think it would be good to leave town in August, and it would probably be good to stay out until September the 12th.” Lott provides no information about any predictions of an imminent terrorist attack on Washington or anywhere else. [Roll Call, 8/2/2007]

Entity Tags: Protect America Act, Trent Lott

Timeline Tags: Civil Liberties

Congressional Democrats attempt to short-circuit the Protect America Act (see August 5, 2007) currently under debate. They introduce their own bill, the Improving Foreign Intelligence Surveillance to Defend the Nation and the Constitution Act, that would address the administration’s concerns that the Foreign Intelligence Surveillance Act imposed unwieldy limitations on the NSA’s ability to electronically monitor foreign communications that were transmitted through communications networks inside the US. The Democrats’ bill redefines “electronic surveillance” to allow the NSA to monitor such communications without a FISA warrant if it “reasonably believes” the targets of those communications to be outside the US. This would give the NSA new surveillance powers, so the Democrats’ bill provides for oversight by the FISA Court, audits by the Justice Department’s Inspector General, and restrictions on domestic surveillance. However, the Bush administration does not want the bill to become law. President Bush announces that he opposes the bill, and threatens to hold Congress in session past its August adjournment date until he can get the Protect America Act passed. The Democrats’ bill dies before ever coming up for a full vote in Congress. [US House of Representatives, 8/3/2007 pdf file; Slate, 8/6/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Bush administration (43), Foreign Intelligence Surveillance Act, US Department of Justice, National Security Agency, Protect America Act, George W. Bush

Timeline Tags: Civil Liberties

Mitch McConnell.Mitch McConnell. [Source: US Senate]President Bush signs the controversial Protect America Act (PAA) into law. The bill, which drastically modifies the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978), was sponsored by two Senate Republicans, Mitch McConnell (R-KY) and Christopher Bond (R-MO), but written by the Bush administration’s intelligence advisers. [US Senate, 8/5/2007; Washington Post, 8/5/2007] It passed both houses of Congress with little debate and no hearings (see August 1-4, 2007). “This more or less legalizes the NSA [domestic surveillance] program,” says Kate Martin, director of the Center for National Security Studies. [New York Times, 8/6/2007] Slate’s Patrick Radden Keefe adds ominously, “The Foreign Intelligence Surveillance Act is now dead, and it’s never coming back.” [Slate, 8/6/2007] The PAA expires in six months, the only real concession Congressional Democrats were able to secure. Though the Bush administration and its allies in Congress insist that the law gives the government “the essential tools it needs” to conduct necessary surveillance of foreign-based terrorists while protecting Americans’ civil liberties, many Democrats and civil liberties organizations say the bill allows the government to wiretap US residents in communication with overseas parties without judiciary or Congressional oversight. Bush calls the bill “a temporary, narrowly focused statute to deal with the most immediate shortcomings in the law” that needs to be expanded and made permanent by subsequent legislation. The administration says that the lack of judiciary oversight in the new law will be adequately covered by “internal bureaucratic controls” at the National Security Agency. [Associated Press, 8/5/2007; Washington Post, 8/5/2007]
Reining in FISA - The PAA allows FISA to return “to its original focus on protecting the rights of Americans, while not acting as an obstacle to conducting foreign intelligence surveillance on foreign targets located overseas.” Before the PAA, the White House says, FISA created unnecessary obstacles in allowing US intelligence to “gain real-time information about the intent of our enemies overseas,” and “diverted scarce resources that would be better spent safeguarding the civil liberties of people in the United States, not foreign terrorists who wish to do us harm.” The PAA no longer requires the government to obtain FISA warrants to monitor “foreign intelligence targets located in foreign countries” who are contacting, or being contacted by, US citizens inside US borders. FISA will continue to review the procedures used by US intelligence officials in monitoring US citizens and foreign contacts by having the attorney general inform the FISA Court of the procedures used by the intelligence community to determine surveillance targets are outside the United States.”
Allows Third Parties to Assist in Surveillance, Grants Immunity - The PAA also allows the director of national intelligence and the attorney general to secure the cooperation of “third parties,” particularly telecommunications firms and phone carriers, to “provide the information, facilities, and assistance necessary to conduct surveillance of foreign intelligence targets located overseas.” It provides these firms with immunity from any civil lawsuits engendered by such cooperation.
Short Term Legislation - The White House says that Congress must pass further legislation to give telecommunications firms permanent and retroactive immunity against civil lawsuits arising from their cooperation with the government’s domestic surveillance program. [White House, 8/6/2006]
Temporary Suspension of the Constitution? - Representative Rush Holt (D-NJ), a member of the House Intelligence Committee, says: “I’m not comfortable suspending the Constitution even temporarily. The countries we detest around the world are the ones that spy on their own people. Usually they say they do it for the sake of public safety and security.” [Washington Post, 8/5/2007]

Entity Tags: Christopher (“Kit”) Bond, National Security Agency, Foreign Intelligence Surveillance Act, George W. Bush, Foreign Intelligence Surveillance Court, Mitch McConnell, Al-Qaeda, Terrorist Surveillance Program, Kate Martin, Patrick Radden Keefe, Rush Holt, Protect America Act

Timeline Tags: Civil Liberties

Ryan Singel.Ryan Singel. [Source: Wired]According to Ryan Singel of Wired, the new Protect America Act (PAA—see August 5, 2007) gives the Bush administration “the power to order the nation’s communication service providers—which range from Gmail, AOL IM, Twitter, Skype, traditional phone companies, ISPs, internet backbone providers, Federal Express, and social networks—to create possibly permanent spying outposts for the federal government.” He adds: “These outposts need only to have a ‘significant’ purpose of spying on foreigners, would be nearly immune to challenge by lawsuit, and have no court supervision over their extent or implementation. Abuses of the outposts will be monitored only by the Justice Department, which has already been found to have underreported abuses of other surveillance powers to Congress.” In addition, Singel says the PAA redefines any monitoring of US citizens’ telephone and Internet communications “reasonably believed” to be outside the country as not surveillance, allows telecommunications firms to target both foreign and domestic parties for surveillance, and forces those firms to give assistance in secret, without informing Congress or the targeted parties. [Wired News, 8/6/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Bush administration (43), US Department of Justice, Ryan Singel, Terrorist Surveillance Program, Protect America Act

Timeline Tags: Civil Liberties

Aziz Huq.Aziz Huq. [Source: American Prospect]Aziz Huq, an author and the director of the Brennan Center for Justice at New York University, writes that the Protect America Act (PAA-see August 5, 2007) came about as a result of what he calls “the most recent example of the national security waltz, a three-step administration maneuver for taking defeat and turning it into victory.” Step one is a court defeat for the administration, for example regarding detainees at Guantanamo (see June 28, 2004), or the overruling of military commissions in 2006 (see June 30, 2006). The second step, which comes weeks or months later, is an announcement that the ruling has created a security crisis and must be “remedied” through immediate legislation. The third and final step is the administration pushing legislation through Congress, such as the Detainee Treatment Act (see December 15, 2005) or the Military Commissions Act, that, Huq writes, “not only undoes the good court decision but also inflicts substantial damage to the infrastructure of accountability.”
Step One: FISC Refuses to Approve NSA's Surveillance Program - In January 2007, the administration announced that it was submitting the NSA’s domestic surveillance program to the Foreign Intelligence Surveillance Court (FISC), the secret court that issues FISA warrants for surveillance (see May 1, 2007). This was due to pending court cases threatening to rule the program in violation of FISA and the Fourth Amendment; the administration wanted to forestall, or at least sidestep, those upcoming rulings. In June, FISC refused to approve parts of the NSA program that involved monitoring overseas communications that passed through US telecom switches. Since a tremendous amount of overseas communications are routed through US networks, this ruling jeopardized the NSA’s previous ability to wiretap such communications virtually at will without a warrant. The administration objected to the NSA having to secure such warrants.
Step Two: The Drumbeat Begins - Months later, the drumbeat for new legislation to give the NSA untrammeled rights to monitor “overseas” communications, which not only traveled through US networks, but often began or ended with US citizens, began with appearances in the right-wing media by administration supporters, where they insisted that the FISC ruling was seriously hampering the NSA’s ability to garner much-needed intelligence on terrorist plots against the US. The White House and Congressional Republicans drafted legislation giving the NSA what it wanted, and presented it during the last week of the Congressional session, minimizing the time needed for scrutiny of the legislation as well as reducing the time available for meaningful debate.
Step Three: Passing a Law With Hidden Teeth - The legislation that would become the Protect America Act was carefully written by Bush officials, and would go much farther than giving the NSA the leeway it needed to wiretap US citizens. Instead, as Huq writes, “the Protect America Act is a dramatic, across-the-board expansion of government authority to collect information without judicial oversight.” Democrats believed they had negotiated a deal with the administration’s Director of National Intelligence, Mike McConnell, to limit the law to addressing foreign surveillance wiretaps, but, Huq writes, “the White House torpedoed that deal and won a far broader law.” The law removes any real accountability over domestic surveillance by either Congress or the judiciary. Former CIA officer Philip Giraldi says that the PAA provides “unlimited access to currently protected personal information that is already accessible through an oversight procedure.” The law is part of the administration’s continual attempts to “eviscerat[e]” the checks and balances that form the foundation of US democracy.
Ramifications - The law includes the provision that warrantless surveillance can be “directed at a person reasonably believed to be located outside of the United States.” Huq writes that this is a tremendously broad and vague standard that allows “freewheeling surveillance of Americans’ international calls and e-mails.” He adds: “The problem lies in the words ‘directed at.’ Under this language, the NSA could decide to ‘direct’ its surveillance at Peshawar, Pakistan—and seize all US calls going to and from there.… Simply put, the law is an open-ended invitation to collect Americans’ international calls and e-mails.” The law does not impose any restrictions on the reason for surveillance. National security concerns are no longer the standard for implementing surveillance of communications. And the phrase “reasonably believe” is uncertain. The provisions for oversight are, Huq writes, “risibly weak.” Surveillance need only be explained by presentations by the Director of National Intelligence and the Attorney General to FISC, which has little room to invalidate any surveillance, and furthermore will not be informed of any specific cases of surveillance. As for Congress, the Attorney General only need inform that body of “incidents of noncompliance” as reported by the administration. Congress must rely on the administration to police itself; it cannot demand particulars or examine documentation for itself. The law expires in six months, but, Huq notes, that deadline comes up in the middle of the 2008 presidential campaign, with all the pressures that entails. And the law allows “the NSA to continue wielding its new surveillance powers for up to a year afterward.” The law, Huq writes, “does not enhance security-related surveillance powers. Rather, it allows the government to spy when there is no security justification. And it abandons all but the pretense of oversight.” [Nation, 8/7/2007]

Entity Tags: Mike McConnell, Detainee Treatment Act, Bush administration (43), Aziz Huq, Foreign Intelligence Surveillance Court, Military Commissions Act, National Security Agency, US Supreme Court, Philip Giraldi, Protect America Act

Timeline Tags: Civil Liberties

Former Nixon White House counsel John Dean considers the newly passed Protect America Act (PAA—see August 5, 2007) a dire threat to American civil liberties. Dean writes that the ire of rank-and-file Democrats with their Congressional leadership is well earned, that the Democrats meekly lined up and voted it into law after some pro forma protestations. Dean notes that editorialists from around the country, and organizations as politically disparate as the ACLU (see August 6, 2007), the Cato Institute, and the John Birch Society (see March 10, 1961 and December 2011) all agree that the new law is a serious threat to civil liberties. They all agree that the law violates the Fourth Amendment while at the same time hides its operations under the rubric of national security secrecy. Dean notes, “Congress was not even certain about the full extent of what it has authorized because President Bush and Vice President Cheney refused to reveal it.”
Executive Power Grab - Dean writes that as much of a threat as the PAA is to citizens’ privacy, it is more threatening because it is another step in the Bush administration’s push for enhancing the powers of the executive branch at the expense of the legislative and judiciary branches, a move towards a so-called “unitary executive.” Bush and Cheney have worked relentlessly “to weaken or eliminate all checks and balances constraining the executive,” Dean writes, pointing to “countless laws enacted by the Republican-controlled Congresses during the first six years of the administration, and in countless signing statements added by the president interpreting away any constraints on the Executive.” The new law “utterly fails to maintain any real check on the president’s power to undertake electronic surveillance of literally millions of Americans. This is an invitation to abuse, especially for a president like the current incumbent.”
Repairing the Damage - Dean is guardedly optimistic about the Democrats’ stated intentions to craft a new law that will supersede the PAA, which expires in February 2008, and restore some of the protections the PAA voids. Any such legislation may be quickly challenged by the Bush administration, which wants retroactive legislative immunity from prosecution for both US telecommunications firms cooperating with the government in monitoring Americans’ communications, and for government officials who may have violated the law in implementing domestic surveillance. Dean writes: “[B]efore Congress caved and gave Bush power to conduct this surveillance, he and telecommunication companies simply opted to do so illegally. Now, Bush will claim, with some justification, that because Congress has now made legal actions that were previously illegal, it should retroactively clear up this nasty problem facing all those who broke the law at his command.” Dean writes that Democrats need only do one thing to “fix [this] dangerous law: [add] meaningful accountability.” He continues: “They must do so, or face the consequences. No one wants to deny the intelligence community all the tools it needs. But regardless of who sits in the Oval Office, no Congress should trust any president with unbridled powers of surveillance over Americans. It is not the way our system is supposed to work.” [FindLaw, 8/10/2007]

Entity Tags: John Birch Society, Richard (“Dick”) Cheney, Protect America Act, Cato Institute, American Civil Liberties Union, John Dean, George W. Bush

Timeline Tags: Civil Liberties

Room 641A, the NSA’s secret room at AT&T’s Folsom Street facility.Room 641A, the NSA’s secret room at AT&T’s Folsom Street facility. [Source: Wired]Former AT&T network technician Mark Klein (see December 15-31, 2005 and July 7, 2009) gives a press conference with the Electronic Frontier Foundation (EFF) in Washington, DC, in an effort to lobby Congress and prevent an immunity bill for the telecoms from passing. The next day, Klein appears in the audience during a Senate Judiciary Committee meeting as part of his lobbying effort in Washington to reveal his knowledge of a secret NSA electronic surveillance operation at AT&T’s San Francisco operations center (see January 2003). The NSA has monitored an enormous volume of telephone and Internet traffic through this secret operation. “I have first-hand knowledge of the clandestine collaboration between one giant telecommunications company, AT&T, and the National Security Agency to facilitate the most comprehensive illegal domestic spying program in history,” Klein tells reporters. “I think they committed a massive violation not only of the law but of the Constitution. That’s not the way the Fourth Amendment is supposed to work.” [New York Times, 11/6/2007; BetaNews, 11/8/2007; Democracy Now!, 7/7/2008] Klein states his four main points of information: that AT&T provided the NSA with all varieties of electronic communications, from telephone conversations to emails, text messages, Web browsing activities, and more; AT&T provided the NSA with billions of purely domestic communications; the program involved everyone using the Internet and not just AT&T customers, because of the interconnected nature of the Internet; and AT&T had 15 to 20 NSA “spy rooms” in facilities across the nation. Brian Reid, a telecommunications and data networking expert who served as one of the New York Times’s experts on the NSA allegations (see April 12, 2006), appears with Klein at the press conference. Reid told Klein in the days before the conference, “My job is to make people believe you.” Reid tells reporters, “The most likely use of this [AT&T/NSA] infrastructure is wholesale, untargeted surveillance of ordinary Americans at the behest of the NSA.” Hours after the press conference, Klein appears as a guest on MSNBC’s political talk show Countdown, where host Keith Olbermann asks him if his experience “felt like finding yourself in a scene from the sci-fi flick Invasion of the Body Snatchers—did it have that sort of horror quality to it?” Klein replies, “My thought was George Orwell’s 1984 and here I am being forced to connect the Big Brother machine.” [Klein, 2009, pp. 93-100]
Key Witness - Klein is a key witness in the lawsuit against AT&T by the EFF (see January 31, 2006 and Early January 2006). He is offering to testify against efforts by the Bush administration and its Congressional Republican allies to amend the Foreign Intelligence Surveillance Act to grant immunity to telecom companies like AT&T from prosecution for surveillance acts. Such an immunity grant would likely result in the dismissal of such lawsuits. But no committee of Congress invites him to testify. [New York Times, 11/6/2007; BetaNews, 11/8/2007; Democracy Now!, 7/7/2008]
NSA Secure Room - Part of Klein’s information is from a deposition that was entered into evidence in the lawsuit, and is now made available to individual members of Congress (see February 23-28, 2006, June 26, 2006, and June 13, 2007). Klein relates that during a tour of the AT&T-controlled floors of the Folsom Street facility of what was then SBC Communications, he saw Room 641A, categorized as the “SG3Secure Room” (see October 2003 and Late 2003). That fall, when he was hired to work at the facility, he saw an NSA agent who came to interview a field support specialist for clearance to be able to work in the Secure Room. “To my knowledge, only employees cleared by the NSA were permitted to enter the SG3 Secure Room,” Klein says. “To gain entry to the SG3 Secure Room required both a physical key for the cylinder lock and a combination code number to be entered into an electronic keypad on the door. To my knowledge, only [two field support specialists] had both the key and the combination code.” Klein installed new circuits to a fiber-optic “splitter cabinet” that had only one purpose: to duplicate Internet traffic from WorldNet’s service into SG3, thereby allowing the NSA access to all traffic on that circuit. “What I saw is that everything’s flowing across the Internet to this government-controlled room,” he now says. [New York Times, 11/6/2007; BetaNews, 11/8/2007]
EFF Lobbyists - The EFF secures the services of two professional lobbyists, Adam Eisgrau and former Congressman Thomas Downey (D-NY), who escort Klein and EFF officials Cindy Cohn and Kevin Bankston around Capitol Hill during the two-day period. EFF also works with a professional media company to prepare the media for the November 7 press conference. After the conference, Klein is introduced to a number of Democratic lawmakers, though he says only a few are truly interested in his evidence; he names Senator Barbara Boxer (D-CA) and Representative Rush Holt (D-NJ), a former physicist who had actually worked with some of the technology Klein cites in his statements, as two of those willing to give him more than a handshake and a quick photo opportunity. Klein later regrets being unable to meet with Senator Christopher Dodd (D-CT), whom he considers to be one of the few real champions of civil liberties in Congress. Dodd cited Klein’s evidence, and Klein by name, in his unsuccessful filibuster of the FISA amendment bill (see July 10, 2008). [Klein, 2009, pp. 91-95] The lobbyists are able to gain access for Klein to the Congressional hearings. Some media outlets later report, mistakenly, that Klein actually testifies before the panel. [Klein, 2009, pp. 100-101]

Entity Tags: Foreign Intelligence Surveillance Act, Electronic Frontier Foundation, AT&T, Mark Klein, Bush administration (43), Senate Judiciary Committee

Timeline Tags: Civil Liberties

Michael McConnell, the director of national intelligence, writes an op-ed for the New York Times pushing for Congressional immunity for US telecommunications firms over their cooperation with the NSA’s warrantless wiretapping program. Under August’s Protect America Act, McConnell writes, the country is “safer” from terrorist attacks while the privacy of US citizens is protected (see August 5, 2007). The government has “greater understanding of international [al-]Qaeda networks, and the law has allowed us to obtain significant insight into terrorist planning.” But the Act expires in two months, and McConnell wants it re-enacted and significantly expanded “if we are to stay ahead of terrorists who are determined to attack the United States.” Echoing the arguments of Bush administration officials, McConnell attacks the “outdated” Foreign Intelligence Surveillance Act as significantly hindering the government’s “ability to collect timely foreign intelligence.” McConnell complains: “Our experts were diverted from tracking foreign threats to writing lengthy justifications to collect information from a person in a foreign country, simply to satisfy an outdated statute that did not reflect the ways our adversaries communicate. The judicial process intended to protect the privacy and civil liberties of Americans was applied instead to foreign intelligence targets in foreign countries. This made little sense, and the Protect America Act eliminated this problem.” McConnell calls for new legislation that would obviate the need for intelligence agencies such as the NSA to seek warrants to monitor US citizens’ telephone and e-mail communications: “The intelligence community should spend its time protecting our nation, not providing privacy protections to foreign terrorists and other diffuse international threats.” He also calls for retroactive immunity for “private parties”—i.e. the US telecommunications companies—that are subject to lawsuits over their cooperation with the NSA in monitoring US communications. “The intelligence community cannot go it alone,” he writes. “Those in the private sector who stand by us in times of national security emergencies deserve thanks, not lawsuits.” Two days later, new Attorney General Michael Mukasey will write a virtually identical op-ed for the Los Angeles Times (see December 12, 2007). [New York Times, 12/10/2007]

Entity Tags: Foreign Intelligence Surveillance Act, Bush administration (43), Mike McConnell, New York Times, Protect America Act

Timeline Tags: Civil Liberties

Michael Mukasey, the new Attorney General, writes an op-ed for the Los Angeles Times pushing for Congressional immunity for US telecommunications firms over their cooperation with the NSA’s warrantless wiretapping program. Mukasey supports the NSA program, echoing the administration’s long insistence that the surveillance program is “crucial” in protecting the country against terrorist attacks. He also reiterates the administration’s criticism of the “outdated” Foreign Intelligence Surveillance Act, which he says hampers the government’s ability to collect needed intelligence and does little to protect the privacy of US citizens. Mukasey calls for Congress to pass a Senate bill that would grant the telecommunications firms retroactive immunity to civil lawsuits and criminal charges surrounding their cooperation with the NSA, and would no longer require court orders for the government to “direct surveillance at foreign targets overseas”—surveillance that would target US citizens. Mukasey says the US will “need the full-hearted help of private companies in our intelligence activities; we cannot expect such cooperation to be forthcoming if we do not support companies that have helped us in the past.” Mukasey strongly opposes another Senate bill that would grant no immunity and would continue to require the government to obtain FISA Court warrants before wiretapping domestic communications. Two days earlier, the director of national intelligence, Michael McConnell, penned a virtually identical op-ed for the New York Times (see December 10, 2007). [Los Angeles Times, 12/12/2007]

Entity Tags: Foreign Intelligence Surveillance Act, Bush administration (43), Los Angeles Times, Michael Mukasey, National Security Agency

Timeline Tags: Civil Liberties

The Bush administration begins a push to get Congress to pass legislation to protect telecommunications companies from lawsuits over their assistance with the NSA’s warrantless wiretapping program. This is part of the administration’s long and sometimes uneasy partnership with the telecom industry to conduct a wide range of secret anti-terrorism surveillance operations. The firms fear further lawsuits and more public exposure, and some have refused outright to cooperate (see February 27, 2001 and 1990s).
Fiber Optics - Twenty years ago, the NSA had little difficulty in monitoring telephone communications because older technology relied on broadcast signals carried by microwave towers and satellite relays; the agency used its own satellite dishes to cull the signals. But fiber optic communications are much more difficult to tap, forcing the agency to seek the cooperation of the telecoms to monitor their signals.
Relationship - “It’s a very frayed and strained relationship right now, and that’s not a good thing for the country in terms of keeping all of us safe,” says an industry official in favor of immunity for the telecoms. “This episode has caused companies to change their conduct in a variety of ways.” Both the director of national intelligence, Mike McConnell, and the new Attorney General, Michael Mukasey, write virtually identical op-eds in recent days calling for passage of legislation to grant immunity to the telecoms and remove the need to obtain warrants to wiretap Americans’ communications (see December 10, 2007 and December 12, 2007).
Two Bills - Currently, two bills are before Congress: one largely crafted by Republicans and passed on by the Senate Intelligence Committee that would grant retroactive immunity to the telecoms, and another from the House Judiciary Committee that would not. The White House says President Bush will veto any legislation that does not grant immunity to the telecoms. [New York Times, 12/16/2007]

Entity Tags: Mike McConnell, Bush administration (43), Center for National Security Studies, Michael Mukasey, National Security Agency, Senate Intelligence Committee

Timeline Tags: Civil Liberties

Director of National Intelligence Michael McConnell says that the 9/11 hijackers could not be monitored in the US because they did not commit any crimes. He says in a speech: “[I]f Mohamed Atta had been in Pakistan and we were tracking him, some way to track him—he went to Turkey, went to Europe, got over to Canada, we’d track him as foreign intelligence target, and he crosses into the United States, he’s now a US person; he gets all of the rights and privileges that you get. He’s invisible to your intelligence community. As long as he doesn’t break the law, law enforcement can’t conduct surveillance because they don’t have a probable cause. Al-Qaeda recognized that and that is why 9/11 happened in my view.” [Director of National Intelligence, 1/17/2008 pdf file] The 9/11 hijackers committed various offenses for which they could have been arrested in the US, such as lying on visa application forms (see August 29, 2001), overstaying their visas (see January 18, 2001, May 20, 2001 and January 10, 2001), driving without a license (note: a warrant for Mohamed Atta’s arrest was even issued in the summer of 2001—see June 4, 2001), and having a known role in blowing up the USS Cole, thereby murdering 17 US servicemen (see Around October 12, 2000). The Foreign Intelligence Surveillance Act was also specifically designed so that the FBI and other agencies could monitor agents of foreign powers in the US even if they did not commit a crime (see 1978).

Entity Tags: Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Mike McConnell, Mohamed Atta, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The House of Representatives votes to hold White House Chief of Staff Joshua Bolten and former White House counsel Harriet Miers in contempt of Congress. Bolten and Miers have refused to testify to a House committee investigating the firing of several US attorneys. Many House Republicans walk off the House floor before the vote is cast, ostensibly because they want to work on reauthorizing the Protect America Act (see August 5, 2007) rather than deal with the contempt citation. Minority Leader John Boehner complains, “We have space on the calendar today for a politically charged fishing expedition, but no space for a bill that would protect the American people from terrorists who want to kill us.” [Associated Press, 2/14/2008] “We will not stand for this, and we will not stay for this. And I would ask my House Republican colleagues and those who believe we should be protecting the American people, to not vote on this bill. Let’s just get up and leave.” [Think Progress, 2/14/2008] (Before they walk out, Lincoln Diaz-Balart (R-FL) attempts to disrupt the memorial service for the recently deceased Tom Lantos (D-CA), taking place in Statuary Hall just a few steps from the House chambers, by calling for a procedural vote during the memorial service. An MSNBC reporter says Diaz-Balart’s action is apparently the result of “pique.”) [MSNBC, 2/14/2008] The contempt citation will be forwarded to the US Attorney for the District of Columbia. The two resolutions passed hold Bolten and Miers in contempt, and allow for the House to file a civil suit against the Bush administration to compel the aides’ testimony. “I hope this administration will realize this Congress is serious about its constitutional role of oversight,” says House Speaker Nancy Pelosi (D-CA). Pelosi says she “had hoped that this day would never have come,” and adds that if the White House instructs Justice Department attorneys not to prosecute the contempt citations, “we will have power to go to federal court and seek civil enforcement of our subpoenas.” [The Hill, 2/14/2008; Associated Press, 2/14/2008]
White House Conditions 'Beyond Arrogance' - The White House has already said it will not allow the Justice Department to pursue the contempt charges, claiming that the information is off-limits because of executive privilege, and that Bolten and Miers are immune from prosecution. House Democrats such as Judiciary Committee chairman John Conyers (D-MI) had tried for months to work with the White House to win its approval for the aides’ testimony, but were unwilling to accept the White House’s restrictive conditions—investigators would not have been allowed to make transcripts of the testimony, to copy documents presented in the testimony, or to seek any more information after the single session. Pelosi said of the White House’s conditions, “This is beyond arrogance. It’s hubris taken to the ultimate degree.”
Republicans Say Testimony Would 'Undermine' Power of Executive Branch - Republicans such as David Dreier (R-CA) warn that such a case might “undermine the power of the first [executive] branch of government.” [The Hill, 2/14/2008; Associated Press, 2/14/2008]
Miller: Bush Attempting to 'Decide by Decree' - Representative Brad Miller (D-NC) says during the deliberations, “The president cannot decide by decree. The president cannot announce with absolute unreviewable authority what information the administration will provide or withhold. The framers of our Constitution had just fought a war against an autocratic king. It is inconceivable that they intended to create an executive branch with the power the Bush administration now claims and that the minority now supports.” [Speaker of the House, 2/14/2008]

Entity Tags: Harriet E. Miers, Bush administration (43), John Boehner, Joshua Bolten, Brad Miller, US Department of Justice, Tom Lantos, Nancy Pelosi

Timeline Tags: Civil Liberties

Admiral Mike McConnell, the director of national intelligence, admits during a radio interview that the main issue over the renewal of the Protect America Act (PAA) (see August 5, 2007) is not the security and safety of the nation, but the need to extend liability immunity to the nation’s telecommunications firms. In recent days, President Bush has said that unnamed terrorists are planning attacks on the US that will make 9/11 “pale by comparison,” and the only way to stop those attacks is to renew the PAA with new provisions that will grant telecommunications firms such as BellSouth, Verizon, and AT&T retroactive immunity from prosecution. Those firms are accused of illegally aiding the government in electronically monitoring the telephone and e-mail conversations of US citizens (see February 5, 2006). The PAA expires on February 16, but the government can operate under its provisions for another year. McConnell tells a National Public Radio reporter that the biggest issue surrounding the legislation is liability protection for the telecom firms. “We can’t do this mission without their help,” he says. “Currently there is no retroactive liability protection for them. They’re being sued for billions of dollars.” They did not break the law, McConnell asserts, but the lawsuits are curtailing their willingness to cooperate with the government. “The Senate committee that passed the bill examined the activities of the telecom companies and concluded they were not violating the law,” he says. By not extending retroactive immunity, McConnell says, “we’d lose the capability to protect the country.” [National Public Radio, 2/15/2008] Two days later, McConnell echoes his unusually frank admission. Interviewed on Fox News, he says: “Let me make one other point just—very important. The entire issue here is liability protection for the carriers. And so the old law and extended law are an expired law if we don’t have retroactive liability protection for the carriers. They are less inclined to help us, and so their support.… And therefore, we do not have the agility and the speed that we had before to be able to move and try to capture [terrorists’] communications to thwart their planning.” He also implies that the argument against granting immunity—if the telecoms’ actions were legal in the first place then they wouldn’t need immunity—is valid. Interviewer Chris Wallace says: “Isn’t the central issue here that you’ve lost your power to compel telecommunications companies to cooperate with you and also your ability to offer them legal immunity? Again, the Democrats would say, ‘Look, if the cooperation is legal, they don’t need legal immunity.’” McConnell replies: “Exactly right. The issue now is there’s uncertainty because the law has expired and the law of August, the Protect America Act, allowed us to compel—compel—support from a private carrier. That’s now expired.… [T]he private sector, although willingly helped us [sic] in the past, are now saying, ‘You can’t protect me. Why should I help you?’” Interestingly, after all of the talk of imminent terror attacks, when Wallace asks, “Do you believe al-Qaeda is more of a threat now than any time since 9/11?” McConnell says flatly: “No. Following 9/11, al-Qaeda’s leadership and operatives were degraded probably two-thirds or three-quarters.” House Majority Leader Steny Hoyer (D-MD) responds that the administration’s attempt to tie the renewal of the PAA into the threat of future terrorist attacks is “wrong, divisive and nothing but fear-mongering.” Senator Edward Kennedy (D-MA) adds that McConnell’s “latest comments show yet again the shamelessness of the administration’s tactics.” [Fox News, 2/17/2008]

Entity Tags: Protect America Act, BellSouth, Al-Qaeda, AT&T, Chris Wallace, George W. Bush, Edward M. (“Ted”) Kennedy, Verizon Communications, Steny Hoyer, Mike McConnell

Timeline Tags: Civil Liberties

The Protect America Act (PAA—see August 5, 2007) expires today. Congress has refused to pass a reauthorization of the legislation that contains a provision to grant retroactive immunity to US telecommunications firms to protect them from lawsuits arising from their previous cooperation with government eavesdroppers (see February 5, 2006). President Bush has warned for days that by refusing to reauthorize the bill, Congress is leaving the US “more in danger of attack.” The surveillance elements of the PAA will continue in force for another year after its passage even as the PAA itself expires, so the government’s capability to use electronic surveillance against suspected terrorists and citizens alike continues unabated through August 2008.
Republican Reaction - House Minority Leader John Boehner (R-OH) warns, “This is a grave problem, and the Democrat leaders ought to be held accountable for their inaction.” Senate Minority Leader Mitch McConnell (R-KY) says, “The companies have been waiting for six months for retroactive liability” protection. “They are under pressure from their directors, pressure from their shareholders, and you’re jeopardizing the entire existence of the company by continuing to do this.”
Democratic Reaction - But House Democrats seem to be in no mood to give in to Bush’s rhetoric. Speaker of the House Nancy Pelosi (D-CA) says Bush is “misrepresenting the facts on our nation’s electronic-surveillance capabilities.” “There is no risk the program will go dark,” says Silvestre Reyes (D-TX), chairman of the House Intelligence Committee. Many Democrats accuse the administration of putting the interests of telecom firms over national security—accusations that intensify after Bush’s Director of National Intelligence, Mike McConnell, admitted that the real issue behind the reauthorization is the immunity for telecoms (see February 15-17, 2008). Senator Edward Kennedy (D-MA) says that the entire argument is “nothing more than a scare tactic designed to avoid legal and political accountability and keep Americans in the dark about the administration’s massive lawbreaking.” House member Tim Walz (D-MN) says, “Coming from a military background, I sure don’t downplay that there are threats out there, but the president’s demagoguery on this is the equivalent of the boy crying wolf.” And Rahm Emanuel (D-IL), the head of the House Democratic Caucus, says bluntly: “This is not about protecting Americans. The president just wants to protect American telephone companies.”
Previous Depiction - When the law was signed into effect August 5, 2007, it was portrayed by the White House as “a temporary, narrowly focused statute to deal with the most immediate needs of the intelligence community to protect the country.” Now it is being portrayed by Bush officials as the cornerstone of the nation’s terrorist-surveillance program. The issue is sure to resurface when Congress returns from a week-long break in late February. [Associated Press, 2/14/2008; Washington Post, 2/16/2008]

Entity Tags: Nancy Pelosi, Mike McConnell, John Boehner, George W. Bush, Edward M. (“Ted”) Kennedy, Mitch McConnell, Protect America Act, Rahm Emanuel, Silvestre Reyes, Tim Walz

Timeline Tags: Civil Liberties

Director of National Intelligence Mike McConnell and Attorney General Michael Mukasey pen a letter to Silvestre Reyes (D-TX, the chairman of the House Intelligence Committee, claiming that because the Democratically led Congress has allowed the Protect America Act (PAA) to expire (see February 16, 2008), the government is losing critically needed intelligence on potential terrorist threats. McConnell and Mukasey do not include any evidence of the claim in their letter. In the six days since the PAA expired, the two write, some of the government’s “partners” in intelligence operations—US telecommunications firms—have “reduced [their] cooperation” in the government’s warrantless wiretapping program. The two officials do not name which firms they say have cut back on their cooperation. The telecom firms are more reluctant to continue their cooperation with the government because they do not have retroactive legal immunity from civil and criminal charges for their cooperation in the past. The Bush administration and Congressional Republicans allowed the PAA to expire rather than approve an extension of the law that did not include an immunity clause (see February 23, 2008). In their letter, McConnell and Mukasey claim that since the Protect America Act lapsed, telecom firms “have delayed or refused compliance with our requests to initiate new surveillances of terrorist and other foreign intelligence targets under existing directives issued pursuant to the Protect America Act.” They add, “Although most partners intend to cooperate for the time being, they have expressed deep misgivings about doing so in light of the uncertainty and have indicated that they may well cease to cooperate if the uncertainty persists.” McConnell and Mukasey write that if Congress does not extend immunity to the telecom firms, the firms will continue to be reluctant to cooperate with the surveillance program: “This uncertainty may well continue to cause us to miss information that we otherwise would be collecting.” A day later, the two retract their claim (see February 23, 2008). Reyes and other Democrats have accused the administration of exaggerating the claims of threats to national security because of their refusal to grant the telecoms immunity; some have accused the administration of “fearmongering” and employing “scare tactics.” [Newsweek, 2/22/2008; Newsweek, 2/22/2008; Politico, 2/22/2008]
Democrats Take 'Strong Offense' to Charges - In a joint statement, Reyes, Senator John D. Rockefeller (D-WV), and other Democrats respond to McConnell and Mukasey’s letter: “Further politicizing the debate, the administration today announced that they believe there have been gaps in security since the Protect America Act expired. They cannot have it both ways; if it is true that the expiration of the PAA has caused gaps in intelligence, then it was irresponsible for the president and congressional Republicans to openly oppose an extension of the law. Accordingly, they should join Democrats in extending it until we can resolve our differences.” [Newsweek, 2/22/2008] Reyes says: “President Bush has just been spoiled dealing with the Republican-controlled Congress before. I take strong offense at the president’s comments that somehow we’re less safe because the Protect America Act expired.” [Politico, 2/22/2008]
Republicans Refuse to Discuss Legislation - Democratic staffers in the House and Senate Intelligence Committees meet today to discuss how to iron out difference between the two chambers’ version of the proposed extension of the PAA; Republican aides refuse to attend. [Associated Press, 2/23/2008] Democrats also charge that, contrary to administration claims of wanting to work with Congress to pass an acceptable update to the law, the White House has refused to supply lawmakers with documents they have requested pertaining to the extension. [Politico, 2/22/2008]

Entity Tags: Mike McConnell, Protect America Act, House Intelligence Committee, Michael Mukasey, Bush administration (43), Silvestre Reyes, John D. Rockefeller

Timeline Tags: Civil Liberties

President Bush again demands that Congress reinstate the Protect America Act (PAA) (see August 5, 2007), with new provisions providing the nation’s telecommunications industry retroactive legal immunity from criminal and civil prosecution for possible crimes committed in the administration’s domestic wiretapping program (see May 12, 2006). Bush says that without such immunity, US telecom firms will be reluctant to help the administration spy on potential terrorists. The PAA is a central part of the legislative update of the 1978 Foreign Intelligence Surveillance Act (FISA) (see 1978) which mandates that any wiretaps must receive the approval of the FISA Court. Bush insists that he will veto an update to FISA without the immunity provisions, even as he asserts the country is at risk of further terrorist attacks without the FISA updates, and after letting the PAA lapse without signing an extension of the legislation into law. However, Bush blames Congress for not passing the FISA update with an immunity clause: “Congress’ failure to pass this legislation was irresponsible,” he says. “In other words, the House’s refusal to act is undermining our ability to get cooperation from private companies. And that undermines our efforts to protect us from terrorist attack.” He explains why the Democrats don’t want his bill: “House leaders are blocking this legislation, and the reason can be summed up in three words: class action lawsuits.” A spokesman for Congressional Democrats retorts: “They cannot have it both ways. If it is true that the expiration of the [surveillance law] has caused gaps in intelligence, then it was irresponsible for the president and Congressional Republicans to openly oppose an extension of the law.”
Democrats Put Trial Lawyers Before National Security? - Bush says: “The Senate bill would prevent plaintiffs’ attorneys from suing companies believed to have helped defend America after the 9/11 attacks. More than 40 of these lawsuits have been filed, seeking hundreds of billions of dollars in damages from these companies.… It is unfair and unjust to threaten these companies with financial ruin only because they are believed to have done the right thing and helped their country.” The lawsuits (see June 26, 2006) seek damages based upon violations of FISA, the Wiretap Act, the Communications Act, and the Stored Communications Act, among other laws. Bob Edgar of Common Cause says neither money nor punishment is the issue: “Innocent Americans who have had their rights violated by the telecoms deserve their day in court. If these companies did nothing wrong, then they have nothing to fear.” Bush is apparently attempting to refocus the issue as an attack on trial lawyers—traditionally a group supportive of Democrats—in saying: “Members of the House have a choice to make: They can empower the trial bar—or they can empower the intelligence community. They can help class action trial lawyers sue for billions of dollars—or they can help our intelligence officials protect millions of lives. They can put our national security in the hands of plaintiffs’ lawyers—or they can entrust it to the men and women of our government who work day and night to keep us safe.” House member John Conyers (D-MI) calls such characterizations “irresponsible” and “inaccurate.” [CBS News, 2/23/2008]

Entity Tags: Protect America Act, John Conyers, Foreign Intelligence Surveillance Court, Mike McConnell, George W. Bush, Michael Mukasey, Common Cause, Bob Edgar, Foreign Intelligence Surveillance Act, Dana Rohrbacher

Timeline Tags: Civil Liberties

Representative Peter Hoekstra (R-MI) pens a blistering op-ed for the conservative National Review that accuses House Democrats of allowing the Protect America Act to expire (PAA—see February 16, 2008) and thereby endangering the country by leaving it unprotected against terrorist attacks. This is the same argument President Bush and Republicans have advanced in recent days in favor of continued warrantless wiretapping (see February 23, 2008). Hoekstra calls the Democrats’ action “unprecedented irresponsibility.” The “burdensome paperwork, government lawyers, and court orders” that implementing wiretaps will now engender, Hoekstra writes, “could mean the difference in stopping a terrorist plot or saving the life of an American soldier.” Hoekstra quickly turns to another key agenda for reauthorizing the PAA—providing retroactive immunity from lawsuits for American telecommunications firms. He echoes the arguments of Bush and other officials such as Attorney General Michael Mukasey and Director of National Intelligence Mike McConnell (see February 22, 2008) by writing that without such immunity, “these companies obviously will be reluctant to cooperate with the government in the future.” But Hoekstra takes the argument even farther, equating the Democrats’ refusal to reauthorize the PAA with their support from trial lawyers, who “have contributed more $1.5 million to Democrat coffers.” He then says that US intelligence agents will suffer because, he asserts, “many of [them] have been forced to take out professional liability insurance to protect them from the actions of the Democratic Congress.” Hoekstra claims that Democrats consistently favor working to investigate global warming over protecting the nation. [National Review, 2/25/2008] Hoekstra continues the attack the next day with a piece in the Wall Street Journal co-authored with his House colleague Lamar Smith (R-TX) and his Senate colleague Christopher “Kit” Bond (R-MO). The three open this column with the rhetorical question, “Are Americans as safe today as they were before Congress allowed the Protect America Act to expire on Feb. 16?” and answer it with much the same arguments that Hoekstra advanced the day before. “We are less safe today and will remain so until Congress clears up the legal uncertainty for companies that assist in collecting intelligence for the government—and until it gives explicit permission to our intelligence agencies to intercept, without a warrant, foreign communications that pass through the US,” they claim. They also echo the claim asserted by McConnell and Mukasey that the nation’s intelligence community has lost valuable intelligence because of the lapse in legislation—without acknowledging that McConnell and Mukasey withdrew that claim within hours (see February 23, 2008). [Wall Street Journal, 2/26/2008]

Entity Tags: Michael Mukasey, Christopher (“Kit”) Bond, George W. Bush, Lamar Smith, Peter Hoekstra, Mike McConnell, Protect America Act

Timeline Tags: Civil Liberties

Attorney General Michael Mukasey refuses to refer a House contempt citation against two of President Bush’s top officials to a federal grand jury. The House has found former White House counsel Harriet Miers and White House Chief of Staff Joshua Bolten in contempt of Congress for refusing to answer Congressional subpoenas (see February 14, 2008), but Mukasey says neither Bolten nor Miers have committed any crimes. House Speaker Nancy Pelosi (D-CA) has, in return, given the House Judiciary Committee the authority to file a lawsuit against Miers and Bolten in federal court. Mukasey says Bolten and Miers were right to ignore the subpoenas because both were acting at President Bush’s behest. Pelosi retorts: “The American people demand that we uphold the law. As public officials, we take an oath to uphold the Constitution and protect our system of checks and balances and our civil lawsuit seeks to do just that.” Democrats want the filing to move swiftly so that a judge might rule before the November elections; a key tenet of Democratic political strategy is the accusation that the Bush administration has abused its executive powers and considers itself above the law. Bolten and Miers were subpoenaed to testify about the possible political motivations behind the 2006 firings of nine US attorneys. Mukasey agrees with the Bush administration in saying that neither Miers nor Bolten, as officials of the executive branch, are required to answer to Congress for their actions, “The contempt of Congress statute was not intended to apply and could not constitutionally be applied to an executive branch official who asserts the president’s claim of executive privilege,” he writes. “Accordingly, the department has determined that the noncompliance by Mr. Bolten and Ms. Miers with the Judiciary Committee subpoenas did not constitute a crime.” Judiciary Committee chairman John Conyers (D-MI) says of Mukasey’s decision: “Today’s decision to shelve the contempt process, in violation of a federal statute, shows that the White House will go to any lengths to keep its role in the US attorney firings hidden. In the face of such extraordinary actions, we have no choice but to proceed with a lawsuit to enforce the committee’s subpoenas.” [Associated Press, 2/29/2008]

Entity Tags: House Judiciary Committee, Bush administration (43), George W. Bush, John Conyers, Harriet E. Miers, Michael Mukasey, Joshua Bolten, Nancy Pelosi

Timeline Tags: Civil Liberties

A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.
Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:
bullet The NSA’s domestic surveillance activities;
bullet The CIA’s use of rendition and torture against terrorist suspects;
bullet The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and
bullet The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).
Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.
Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.
'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.” “It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”
Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]

Entity Tags: Nancy Pelosi, Gregory Nojeim, Center for Democracy and Technology, American Civil Liberties Union, Barry Steinhardt, Bush administration (43), Common Cause, Jane Harman

Timeline Tags: Civil Liberties, Inslaw and PROMIS

The online news site Wired News reveals that a “whistleblower” is alleging that the US government has had direct, high-speed access to a major wireless carrier’s systems, exposing US citizens’ telephone calls, data transmissions, and even physical movements to potentially illegal government surveillance. Babak Pasdar, the CEO of Bat Blue and a former computer security consultant, says he worked for the unnamed carrier in late 2003. “What I thought was alarming is how this carrier ended up essentially allowing a third party outside their organization to have unfettered access to their environment,” Pasdar says. “I wanted to put some access controls around it; they vehemently denied it. And when I wanted to put some logging around it, they denied that.” According to Wired News, while Pasdar refuses to name the carrier, his claims are virtually identical to allegations made in a 2006 federal lawsuit against four telecommunications firms and the US government (see January 31, 2006); the suit named Verizon Wireless as taking actions similar to those claimed by Pasdar. Pasdar has provided an affidavit to the nonprofit Government Accountability Project (GAP), which has begun circulating the affidavit along with talking points to Congressional staffers. Congress is working on legislation that would grant retroactive immunity to telecommunications firms that worked with the government to illegally wiretap American citizens’ communications (see July 10, 2008). Pasdar says he learned of the surveillance in September 2003, when he led a team hired to revamp security on the carrier’s internal network. When he asked about a so-called “Quantico Circuit” linking its network to an unnamed third party, the carrier’s officials became uncommunicative (see September 2003). Quantico is the center of the FBI’s electronic surveillance operations. “The circuit was tied to the organization’s core network,” Pasdar writes in his affidavit. “It had access to the billing system, text messaging, fraud detection, Web site, and pretty much all the systems in the data center without apparent restrictions.” The “Quantico Circuit” was unshielded, which would have given the recipient unfettered access to customer records, data, and information. Pasdar tells a Wired News reporter, “I don’t know if I have a smoking gun, but I’m certainly fairly confident in what I saw and I’m convinced it was being leveraged in a less than forthright and upfront manner.” Verizon Wireless refuses to comment on Pasdar’s allegations, citing national security concerns. Representative John Dingell (D-MI), the chairman of the House Committee on Energy and Commerce, writes in response: “Mr. Pasdar’s allegations are not new to the Committee on Energy and Commerce, but our attempts to verify and investigate them further have been blocked at every turn by the administration. Moreover, the whistleblower’s allegations echo those in an affidavit filed by Mark Klein (see December 15-31, 2005 and July 7, 2009), a retired AT&T technician, in the Electronic Frontier Foundation’s lawsuit against AT&T.… Because legislators should not vote before they have sufficient facts, we continue to insist that all House members be given access to the necessary information, including the relevant documents underlying this matter, to make an informed decision on their vote. After reviewing the documentation and these latest allegations, members should be given adequate time to properly evaluate the separate question of retroactive immunity.” [Wired News, 3/6/2008] Klein will assist Pasdar in writing a letter opposing immunity for the telecom firms based on Pasdar’s evidence, a letter which GAP provides to newspapers across the country. However, Klein will write, only a few smaller newspapers will publish the letter. [Klein, 2009, pp. 103]

Entity Tags: Wired News, Babak Pasdar, Government Accountability Project, Mark Klein, John Dingell, Verizon Wireless

Timeline Tags: Civil Liberties

The House Judiciary Committee asks a federal judge to compel two White House officials to testify about the firings of eight US attorneys in 2007. Former White House counsel Harriet Miers and current White House Chief of Staff Joshua Bolten have both refused to testify, ignoring subpoenas from the Judiciary Committee (see February 14, 2008), and Attorney General Michael Mukasey has refused to enforce the subpoenas (see February 29, 2008). The White House steered the refusals. Judge John D. Bates, a federal district court judge in Washington, is overseeing the case. The suit says that neither Miers nor Bolten may avoid testimony by citing executive privilege, as both they and the White House have asserted. White House press secretary Dana Perino calls the suit “partisan theater,” and adds, “The confidentiality that the president receives from his senior advisers and the constitutional principle of separation of powers must be protected from overreaching, and we are confident that the courts will agree with us.” Judiciary Committee chairman John Conyers (D-MI) vehemently disagrees, saying, “The administration’s extreme claim to be immune from the oversight processes are at odds with our constitutional principles.” Conyers warns, “We will not allow the administration to steamroll Congress.” House Minority Leader John Boehner (R-OH) calls the suit a waste of time and accuses the committee of “pandering to the left-wing swamps of loony liberal activists.” The case is central to the ongoing tension between the White House and Congress over the balance of power between the two branches. Constitutional law professor Orin S. Kerr says the case raises fresh issues. While the Supreme Court recognized executive privilege in 1974, it acknowledged that executive privilege was not absolute and could be overturned in some instances, such as a criminal investigation. No court has ruled whether a claim of executive privilege outweighs a Congressional subpoena. According to lawyer Stanley Brand, who is involved in the suit for the Democrats, the committee turned to the legal system to avoid the possibility of charging Miers and Bolten with contempt and trying them in Congress on the charges. Such an action, Brand says, would be unseemly. [House Judiciary Committee v. Miers & Bolten, 3/10/2008 pdf file; New York Times, 3/11/2008]

Entity Tags: House Judiciary Committee, Dana Perino, Harriet E. Miers, John Boehner, John Conyers, Orin S. Kerr, John D. Bates, Joshua Bolten, Michael Mukasey, Stanley Brand

Timeline Tags: Civil Liberties

Retired AT&T “whistleblower” Mark Klein (see December 15-31, 2005 and July 7, 2009) has a short essay published in Wired News, sharply criticizing the recently passed legislation that amended the Foreign Intelligence Surveillance Act (FISA—see July 10, 2008) and granted telecommunications firms immunity from prosecution for helping government agencies illegally spy on American citizens. Klein initially offered the essay in letter form to the New York Times, but although the editors there showed what Klein will call “some interest,” they rejected the letter. Instead, Wired News’s Ryan Singel accepted the letter for one of his “Threat Level” columns. Singel describes Klein as “furious” at the vote, and quotes Klein: “[Wednesday]‘s vote by Congress effectively gives retroactive immunity to the telecom companies and endorses an all-powerful president. It’s a Congressional coup against the Constitution. The Democratic leadership is touting the deal as a ‘compromise,’ but in fact they have endorsed the infamous Nuremberg defense: ‘Just following orders.’ The judge can only check their paperwork. This cynical deal is a Democratic exercise in deceit and cowardice.… Congress has made the FISA law a dead letter—such a law is useless if the president can break it with impunity. Thus the Democrats have surreptitiously repudiated the main reform of the post-Watergate era and adopted Nixon’s line: ‘When the president does it that means that it is not illegal.’ This is the judicial logic of a dictatorship. The surveillance system now approved by Congress provides the physical apparatus for the government to collect and store a huge database on virtually the entire population, available for data mining whenever the government wants to target its political opponents at any given moment—all in the hands of an unrestrained executive power. It is the infrastructure for a police state.” [Wired News, 6/27/2008; Klein, 2009, pp. 108]

Entity Tags: Mark Klein, Foreign Intelligence Surveillance Act, Wired News, Ryan Singel

Timeline Tags: Civil Liberties

President Bush signs the FISA Amendments Act of 2008 (FAA), a revamping and expansion of the original Foreign Intelligence Surveillance Act (see 1978). The legislation passed the House by a sweeping 293 to 129 votes, with most Democratic Congressional leaders supporting it over the opposition of the more liberal and civil liberties-minded Democrats. Republicans were almost unanimously supportive of the bill. Though Democratic Senators Russell Feingold (D-WI) and Christopher Dodd (D-CT) managed to delay the bill’s passage through the Senate, their attempt to modify the bill was thwarted by a 66-32 margin. (Dodd credits AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) as one of the very few people to make the public aware of the illegal NSA wiretapping program, which the FISA amendment would protect. Without Klein, Dodd states, “this story might have remained secret for years and years, causing further erosion of our rights.”) Senator Barack Obama (D-IL), the party’s presumptive presidential nominee, gave his qualified support to the bill, stating: “Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise, but do so with a firm pledge that as president, I will carefully monitor the program.” Obama had opposed an earlier Senate version that would have given “blanket immunity” to the telecommunications companies for their participation in the illegal NSA wiretapping program (see December 15, 2005). House Speaker Nancy Pelosi (D-CA), who organized Democratic support for the bill in the House, said that she supported the bill primarily because it rejects Bush’s argument that a wartime chief executive has the “inherent authority” to conduct some surveillance activity he considers necessary to fight terrorism. It restores the legal notion that the FISA law is the exclusive rule on government spying, she said, and added: “This is a democracy. It is not a monarchy.” Feingold, however, said that the bill granted “retroactive immunity to the telecommunications companies that may have engaged in President Bush’s illegal wiretapping program.” The amendments restore many of the provisions of the expired Protect America Act (PAA—see August 5, 2007) that drastically modify the original FISA legislation and grant the government broad new surveillance powers. Like the PAA, the FAA grants “third parties” such as telecommunications firms immunity from prosecution for engaging in illegal surveillance of American citizens if they did so in partnership with government agencies such as the National Security Agency (NSA). [Washington Post, 6/20/2008; CNN, 6/26/2008; US Senate, 7/9/2008; White House, 7/10/2008; Klein, 2009, pp. 95-97] Senate Majority Leader Harry Reid (D-NV) actually refused to honor a “hold” placed on the bill by Dodd, a highly unusual move. Klein will later note that Reid has in the past always honored holds placed on legislation by Republicans, even if Democrats were strongly supportive of the legislation being “held.” Klein will write that Pelosi crafted a “showpiece” FISA bill without the immunity provisions, garnering much praise for her from civil liberties organizations; however, Pelosi’s colleague House Majority Leader Steny Hoyer (D-MD) had secretly worked with the White House to craft a bill that preserved immunity for telecoms, and on June 10, Pelosi “rammed” that bill through the House. The final bill actually requires the judiciary to dismiss lawsuits brought against telecom firms if those firms can produce evidence that they had worked in collusion with the NSA. Feingold later observes that the final bill is not a “compromise, it is a capitulation.” [Klein, 2009, pp. 101-103] Klein will write that Democrats and Republicans have worked together to “unw[ind] one of the main reforms of the post-Watergate era and accepted the outrageous criminal rationalizations of [President] Nixon himself.” Klein will quote Nixon as saying, “If the president does it, that means it’s not illegal” (see April 6, 1977), and will say that is “the essence of the FISA ‘compromise’” and turned Congress into the White House’s “rubber stamp.… It is the twisted judicial logic of a dictatorship.” [Klein, 2009, pp. 107]

Entity Tags: Nancy Pelosi, Foreign Intelligence Surveillance Act, FISA Amendments Act of 2008, Christopher Dodd, Barack Obama, George W. Bush, Mark Klein, Russell D. Feingold, Richard M. Nixon, Harry Reid, Steny Hoyer, National Security Agency, Protect America Act

Timeline Tags: Civil Liberties

The Electronic Frontier Foundation (EFF) files a lawsuit challenging the constitutionality of the recently passed amendment to the Foreign Intelligence Surveillance Act (FISA—see July 10, 2008). The EFF is particularly concerned with the portion of the legislation that grants retroactive immunity from prosecution to telecommunications firms that worked with government agencies to illegally conduct electronic surveillance against American citizens (see December 15, 2005). The FISA Amendments Act of 2008, or FAA, violates the Constitution’s separation of powers, according to the EFF, and, the organization writes, “robs innocent telecom customers of their rights without due process of law.” The lawsuit was triggered by Attorney General Michael Mukasey’s recent submission of a classified certification in another EFF lawsuit about illegal electronic certification (see January 31, 2006) that claimed the electronic surveillance conducted on behalf of the National Security Agency by AT&T did not happen. EFF senior attorney Kevin Bankston says: “The immunity law puts the fox in charge of the hen house, letting the attorney general decide whether or not telecoms like AT&T can be sued for participating in the government’s illegal warrantless surveillance. In our constitutional system, it is the judiciary’s role as a co-equal branch of government to determine the scope of the surveillance and rule on whether it is legal, not the executive’s. The attorney general should not be allowed to unconstitutionally play judge and jury in these cases, which affect the privacy of millions of Americans.” Mukasey’s certification claimed the government has no “content-dragnet” program that surveills millions of domestic communications, though it does not deny having acquired such communications. EFF has provided the court with thousands of pages of documents proving the falsity of Mukasey’s assertions, the organization writes. EFF attorney Kurt Opsahl says: “We have overwhelming record evidence that the domestic spying program is operating far outside the bounds of the law. Intelligence agencies, telecoms, and the administration want to sweep this case under the rug, but the Constitution won’t permit it.” EFF spokesperson Rebecca Jeschke tells a reporter that the FAA “violates the federal government’s separation of powers and violates the Constitution. We want to make sure this unconstitutional law does not deny telecom customers their day in court. They have legitimate privacy claims that should be heard by a judge. Extensive evidence proves the existence of a massive illegal surveillance program affecting millions of ordinary Americans. The telecoms broke the law and took part in this. The FISA Amendments Act and its immunity provisions were an attempt to sweep these lawsuits under the rug, but it’s simply unconstitutional.” EFF lawyers fear the FAA will render their lawsuit invalid. [Electronic Frontier Foundation, 10/17/2008; Salon, 10/17/2008] The EFF has filed a related lawsuit against the NSA and senior members of the Bush administration (see September 18, 2008).

Entity Tags: Foreign Intelligence Surveillance Act, Electronic Frontier Foundation, AT&T, FISA Amendments Act of 2008, Kevin Bankston, Kurt Opsahl, National Security Agency, Michael Mukasey, Rebecca Jeschke

Timeline Tags: Civil Liberties

Judge Vaughn Walker rules that “sufficient facts” exist to keep alive a lawsuit brought by the defunct Islamic charity Al Haramain, which alleges it was subjected to illegal, warrantless wiretapping by the US government (see February 28, 2006). The lawsuit centers on a Top Secret government document accidentally disclosed to plaintiffs’ lawyers Wendell Belew and Asim Ghafoo that allegedly proves the claim of illegal wiretapping; previous court rulings forced Belew and Ghafoo to return the document to the government and prohibited its use in the lawsuit. The lawsuit is widely viewed as a test case to decide in court whether the Bush administration abused its power by authorizing a secret domestic spying program (see Spring 2004 and December 15, 2005). Jon Eisenberg, the lawyer for Belew and Ghafoo, says it does not matter whether the case pertains to the Bush administration or the incoming Obama administration. “I don’t want President Obama to have that power any more than I do President Bush,” he says. Because the lawsuit contains sufficient evidence even without the Top Secret document, Walker rules, it can continue. “The plaintiffs have alleged sufficient facts to withstand the government’s motion to dismiss,” he writes. Therefore, he adds, the law demands that they be allowed to review the classified document, and others, to determine whether the lawyers were spied on illegally and whether Bush’s spy program was unlawful. “To be more specific, the court will review the sealed document ex parte and in camera,” Walker writes. “The court will then issue an order regarding whether plaintiffs may proceed—that is, whether the sealed document establishes that plaintiffs were subject to electronic surveillance not authorized by FISA” (the Foreign Intelligence Surveillance Act—see 1978). [Wired News, 1/5/2009]

Entity Tags: Vaughn Walker, Al Haramain Islamic Foundation, Asim Ghafoo, Jon Eisenberg, Bush administration (43), Wendell Belew, Foreign Intelligence Surveillance Act, Obama administration

Timeline Tags: Civil Liberties

Constitutional lawyer and author Bruce Fein, a former official in the Justice Department under Ronald Reagan, writes that if President Obama wants to “restore the rule of law and to prevent future wrongdoing by high-level government officials,” he “should investigate, among others, former President George W. Bush, former Vice President Dick Cheney, former Defense Secretary Donald Rumsfeld, former Attorney General John Ashcroft, former White House counsel and Attorney General Alberto Gonzales, and former White House political adviser Karl Rove. The crimes to be investigated should include complicity in torture, illegal surveillance, illegal detention, perjury, obstruction of justice, and contempt of Congress. Prosecutions should follow if the evidence convinces a grand jury to indict.” Fein states that “[t]he best way to deter government criminality and to teach citizens the rule of law is to punish the perpetrators who are unanimously found guilty beyond a reasonable doubt by independent and impartial jurors.”
FBI, CIA Feared Prosecution for Torture - He notes that the FBI refused to participate in “enhanced interrogation techniques,” including waterboarding, for fear of being charged with war crimes. And the CIA required specific legal opinions from the Bush Justice Department—the so-called “golden shield” (see August 1, 2002)—and specific presidential authorization before it would allow its agents to torture detainees. And the White House ordered an end to waterboarding after it was warned that such tactics left its officials open to charges of torture and war crimes.
Attorney General Feared Prosecution under FISA - He goes on to note that Justice Department officials such as acting Attorney General James Comey “balked at approving… Bush’s warrantless surveillance program without modification in March 2004 probably because he feared criminal prosecution under the Foreign Intelligence Surveillance Act” (see 1978).
'Unpunished Lawlessness by Government Officials Invites Lawlessness Generally' - Fein asserts that “unpunished lawlessness by government officials invites lawlessness generally.” He quotes former Supreme Court Justice Louis Brandeis: “Decency, security, and liberty alike demand that government officials shall be subjected to the same rules of conduct that are commands to the citizen. In a government of laws, existence of the government will be imperiled if it fails to observe the law scrupulously. Our government is the potent, the omnipresent teacher. For good or for ill, it teaches the whole people by its example. Crime is contagious. If the government becomes a lawbreaker, it breeds contempt for law; it invites every man to become a law unto himself; it invites anarchy.” The best way to deter criminal behavior, he says, is to prosecute alleged criminals, and that process must start with government officials. [Washington Times, 1/20/2009]

Entity Tags: Bruce Fein

Timeline Tags: Civil Liberties

The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’ [Source: BookSurge / aLibris (.com)]Former AT&T technician Mark Klein self-publishes his book, Wiring Up the Big Brother Machine… and Fighting It. In his acknowledgements, Klein writes that he chose to self-publish (through BookSurge, a pay-to-publish venue) because “[t]he big publishers never called me,” and the single small publishing house that offered to publish his book added “an unacceptable requirement to cut core material.” Klein based his book on his experiences as an AT&T engineer at the telecom giant’s San Francisco facility, where he primarily worked with AT&T’s Internet service. In 2002 and 2003, Klein witnessed the construction of of a “secret room,” a facility within the facility that was used by the National Security Agency (NSA) to gather billions of email, telephone, VoIP (voice over Internet Protocol), and text messages, most of which were sent by ordinary Americans. The NSA did its electronic surveillance, Klein writes, secretly and without court warrants. Klein describes himself as “wiring up the Big Brother machine,” and was so concerned about the potential illegality and constitutional violations of the NSA’s actions (with AT&T’s active complicity) that he retained a number of non-classified documents proving the extent of the communications “vacuuming” being done. Klein later used those documents to warn a number of reporters, Congressional members, and judges of what he considered a horrific breach of Americans’ right to privacy. [Klein, 2009, pp. 9-11, 21-24, 33, 35, 38, 40] In 2007, Klein described his job with the firm as “basically to keep the systems going. I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. I tested circuits long distance across the country. That was my job: to keep the network up.” He explained why he chose to become a “whistleblower:” “Because I remember the last time this happened.… I did my share of anti-war marches when that was an active thing back in the ‘60s, and I remember the violations and traffic transgressions that the government pulled back then for a war that turned out to be wrong, and a lot of innocent people got killed over it. And I’m seeing all this happening again, only worse. When the [NSA] got caught in the ‘70s doing domestic spying, it was a big scandal, and that’s why Congress passed the FISA [Foreign Intelligence Surveillance Act] law, as you know, to supposedly take care of that (see 1978). So I remember all that. And the only way any law is worth anything is if there’s a memory so that people can say: ‘Wait a minute. This happened before.’ And you’ve got to step forward and say: ‘I remember this. This is the same bad thing happening again, and there should be a halt to it.’ And I’m a little bit of that institutional memory in the country; that’s all.” [PBS Frontline, 5/15/2007]

Entity Tags: National Security Agency, AT&T, BookSurge, Mark Klein

Timeline Tags: Civil Liberties

John Birch Society logo.John Birch Society logo. [Source: John Birch Society]John F. McManus, the head of the far-right, anti-Communist John Birch Society (JBS), releases a booklet through the organization entitled “Reality vs. Myth” that attempts to, in the words of the JBS, “set the record straight” about what the organization is and is not. According to McManus, the JBS has never held anti-Semitic or racist views, or tolerated such within its organization. All such assertions come from “enemies” of the organization, often from persons or organizations with Communist affiliations (see March 10, 1961 and 1963), he writes. [John Birch Society, 2011]
History of Anti-Communism - The organization was founded in 1958 by candy magnate Robert Welch, a former Massachusetts Republican Party official who began railing about what he considered the “pervasive” influence of Communism in all aspects of American society, particularly in the federal government. Liberals are inherently opposed to freedom and democracy, Welch argued, because liberals are in favor of collectivism/socialism, and therefore are witting or unwitting traitors to the individualist tenets that underlie the US Constitution. The JBS became a vocal opponent of the United Nations, alleging as early as 1959 that the UN intended to establish a “New World Order” (NWO) or “one-world government” (see September 11, 1990). The JBS has also portrayed itself as a fundamentally Christian organization, and views Communism and other non-American forms of government as inherently “godless.” Since the end of World War II, the organization has asserted, the US government has been actively attempting to implement “godless Communism” in place of a Constitutional democracy, including a 1958 claim by Welch that then-President Eisenhower was “a dedicated conscious agent of the communist conspiracy.” Some “Bircher” officials have touted the NWO as being rooted in the alleged Illuminati Freemason conspiracy. In 1964, the JBS enthusiastically supported the presidential candidacy of Senator Barry Goldwater (R-AZ), though a large number of members supported Eisenhower’s vice-president, Richard Nixon (R-CA) over Goldwater. The organization opposed John F. Kennedy (D-MA), accusing him of being a traitor and a Communist dupe (see November 1963), accusations it had also leveled against Eisenhower. After Goldwater’s defeat, Welch attempted to land the segregationist governor of Alabama, George Wallace (D-AL), as a standardbearer for the JBS. [Political Research Associates, 2010] McManus insists that the JBS’s overarching loyalty is to the Christian Bible, the US Constitution and the Declaration of Independence. ” Our organization was created to uphold the truths in the Declaration and the limitations upon government in the Constitution,” he writes. “Not alone in such an endeavor, we welcome all who treasure what our nation’s Founders produced.” [John Birch Society, 2011]
Less Overt Racist, Anti-Semitic Stances - During the Kennedy and Johnson administrations, the JBS painted the civil rights movement as a Communist conspiracy, accusing “ignorant” and “uneducated” African-Americans of either being witting or unwitting dupes of a Communist conspiracy against America. It launched a powerful and well-organized assault on the civil rights movement, calling it a “fraud” and labeling it the “Negro Revolutionary Movement.” Some JBS publications and officials also asserted that the nation’s financial system was controlled largely by Jews with little if any loyalty to the US, and in some instances actively working to undermine and destabilize America’s economy. Such assertions led many to characterize the JBS as a racist and anti-Semitic organization, characterizations that the organization has always disputed. It has touted its very small number of African-American and Jewish members as proof of its claims not to be institutionally racist or anti-Semitic. In 2010, the liberal Political Research Associates (PRA) wrote: “The JBS… discouraged overt displays of racism, while it promoted policies that had the effect of racist oppression by its opposition to the Civil Rights movement. The degree of political racism expressed by the JBS was not ‘extremist’ but similar to that of many mainstream Republican and Democratic elected officials at the time. This level of mainstream racism should not be dismissed lightly, as it was often crude and sometimes violent, treating Black people in particular as second-class citizens, most of whom had limited intelligence and little ambition. In [one JBS publication], Martin Luther King, Jr. is portrayed as an agent of a massive communist conspiracy to agitate among otherwise happy Negroes to foment revolution, or at least promote demands for more collectivist federal government intrusion.” PRA also went on to note that one of its founders, Revilo P. Oliver, was forced to resign from the JBS after making anti-Semitic and racist comments at a 1996 JBS rally. And, the PRA wrote, “When crude antisemitism was detected in JBS members, their membership was revoked[,]” though the organization still held that anti-American Jews were attempting to do damage to the nation’s economy. “At its core, however, the Birch view of the conspiracy does not reveal it to be controlled or significantly influenced by Jews in general, or a secret group of conniving Jews, nor is their evidence of a hidden agenda within the Society to promote suspicion of Jews. The Society always struggled against what it saw as objectionable forms of prejudice against Jews, but it can still be criticized for having continuously promoted mild antisemitic stereotyping. Nevertheless, the JBS was closer to mainstream stereotyping and bigotry than the naked race hate and genocidal antisemitism of neonazi or KKK groups. In a sense, the Birch society pioneered the encoding of implicit cultural forms of ethnocentric White racism and Christian nationalist antisemitism rather than relying on the White supremacist biological determinism and open loathing of Jews that had typified the old right prior to WWII. Throughout its existence, however, the Society has promoted open homophobia and sexism. The Society’s anti-communism and states rights libertarianism was based on sincere principles, but it clearly served as a cover for organizing by segregationists and White supremacists. How much of this was conscious, and how much unconscious, is difficult to determine.” [Political Research Associates, 2010] McManus calls attempts to point out the JBS’s history of implicit racism and anti-Semitism as deliberate, dishonest attempts to “stigmatize” the group, usually by persons and organizations who are working to implement a one-world government and see the JBS as a roadblock to that goal. “There was no evidence that the Society was racist, neo-Nazi, anti-Semitic, or subversive of good order,” McManus claims. “But that didn’t stop many from making such charges.… There were some attempts to defend JBS against the flood of vicious characterizations but these were overwhelmed by widespread and undeserved nastiness. No private organization in our nation’s history had ever been treated so unfairly.” He calls efforts to show the JBS as racist “vicious” and false. “If truth were told,” he writes, “the John Birch Society should be congratulated nationally for its important work in diffusing racial animosities.” [John Birch Society, 2011] Many prominent white supremacist leaders used their membership in the JBS to help promote their more overtly racist organizations (see 1970-1974 and 1973). Former Ku Klux Klan leader Johnny Lee Clary has said the JBS “is just a political version of the KKK, without the name of the KKK. They center on the political ideas of the Klan and are not as vocal in public on the ideas of the racial superiority, but they attract the same people and say the same things behind closed doors.… They are racist, and full of hate and are officially listed as a hate group with several civil rights organizations throughout the USA” (see April 13, 2009). Among other non-white leaders, the JBS has labeled South Africa’s Nelson Mandela as a “Communist tyrant” (see December 11, 2009).
Reframing Itself - In the late 1970s, the JBS saw its influence waning as more modern organizations comprising what some have called the “New Right” came to the fore. In the 1980s, the JBS lost even more influence after attacking Reagan administration policies. It managed to revive itself by toning down its anti-Communist rhetoric and emphasizing its warnings about the New World Order and positioning itself as a long-time advocate of right-wing, muscularly patriotic popularism. Author and journalist Andrew Reinbach notes that the JBS provided an ideological “seed bank” for many of the tenets currently embraced by the various “tea party” organizations on the right (see February 4-8, 2010 and February 15, 2010), an assertion echoed by conservative journalist Matthew Boyle. [Huffington Post, 9/12/2011; Daily Caller, 11/29/2011] McManus credits the JBS with helping bring about the impeachment of then-President Clinton, stopping the establishment of a free-trade entity in the Western Hemisphere, and putting an end to what it calls “the drive to a sovereignty-compromising North American Union.” McManus says JBS efforts to “educate” the world about the UN has prevented that organization “from becoming the tyrannical world government intended by its founders.” He writes that the JBS successfully thwarted the federal government’s alleged plans to federalize all American law enforcement, and credits the JBS’s black membership with preventing wholesale rioting and insurrection during the Civil Rights Era. He touts the JBS as being one of the primary organizations that blocked the passage of the Equal Rights Amendment. And he credits the JBS with being among the first organizations to warn about what it calls the dangers of illegal immigration. He touts the support of, among others, presidential candidate Ron Paul (R-TX—see 1978-1996 and July 22, 2007) and conservative commentator Pat Buchanan (see June 12, 2009, June 20, 2009, July 16, 2009, and October 18, 2011 and After) as validating the organization’s ideology and positions, and notes that in recent years, the JBS was an official sponsor of the Conservative Political Action Conference (see April 19, 2010 and February 9-11, 2012). And he claims that attempts to paint tea party organizations as far-right, racist, or homophobic are similar to the efforts by Communists and NWO conspiratists to destroy the Society. He concludes by writing to prospective members: “Don’t allow yourself to be influenced by the false image created by the Society’s enemies. Our country is under attack and The John Birch Society offers a workable plan to combat it.” [John Birch Society, 2011]

Entity Tags: John F. Kennedy, John Birch Society, Dwight Eisenhower, Conservative Political Action Conference, Barry Goldwater, Andrew Reinbach, George C. Wallace, Ron Paul, United Nations, Richard M. Nixon, Political Research Associates, Patrick Buchanan, Martin Luther King, Jr., Nelson Mandela, Revilo P. Oliver, Johnny Lee Clary, Robert Welch, John F. McManus

Timeline Tags: Domestic Propaganda

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike