!! History Commons Alert, Exciting News

Context of 'December 21-22, 2005: Justice Department Justifies Usurping of Congressional Authority for NSA Wiretapping'

This is a scalable context timeline. It contains events related to the event December 21-22, 2005: Justice Department Justifies Usurping of Congressional Authority for NSA Wiretapping. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 6 (560 events)
previous | 1, 2, 3, 4, 5, 6 | next

After the failure of the US federal government under the Articles of Confederation, the men working to shape the new American government—later termed the “Founders”—determine that the new government must have a president with power equal to that of Congress and the Supreme Court. The federal government itself has far more power under the new Constitution than it had under the Articles, but many Founders worry that the government will have, or take upon itself, the power to constrain or even destroy individual rights and freedoms. The government, therefore, will have strict limitations on its functions, and will be divided into three co-equal branches. Debate over whether the new government should have a single president or an executive council rages, but eventually the Founders decide that a single president could best act decisively in times of crisis. However, Congress has the strength to curtail presidential power via legislation and oversight. One of the Founders’ most crucial decisions is to give Congress, not the president, the power to declare war and commit military troops to battle. Congress must also authorize any military actions that fall short of actual war, the creation and maintenance of armies, and exercise control over how the president can call on the armed forces in emergencies. Finally, the Founders, all too aware that until the English Revolution of 1688, the King of England could use his “prerogative powers” to dispense with a law that he felt unnecessary, move to ensure that the US president cannot use a similar usurpation of power to override Congressional legislation, writing in the Constitution that the president must “take care that the laws be faithfully executed.” In 2007, reporter Charlie Savage, drawing on James Madison’s Federalist Papers, will write: “Knowing that it was inevitable that from time to time foolish, corrupt, or shortsighted individuals would win positions of responsibility in the government, the Founders came up with a system that would limit anyone’s ability to become a tyrant or to otherwise wreck the country. And over the next century and a half, the system worked as the Founders had designed it to work.” [Savage, 2007, pp. 14-16]

Entity Tags: James Madison, Charlie Savage

Timeline Tags: Civil Liberties

James Madison, one of the founders of the American system of constitutional government (see 1787), writes of the importance of Congress, not the president, retaining the power to send the nation to war. “Those who are to conduct a war cannot, in the nature of things, be proper or safe judges,” he writes, “whether a war ought to be commenced, continued, or concluded. They are barred from the latter functions by a great principle in free government, analagous to that which separates the sword from the purse, or the power from executing from the power of enacting laws.” [Savage, 2007, pp. 19]

Entity Tags: James Madison

Timeline Tags: Civil Liberties

President Abraham Lincoln, responding to a Confederate attack on Fort Sumter in South Carolina, does not wait for Congress to begin its next session to make his response. Instead, Lincoln, wielding powers that the Constitution does not grant him and without a formal declaration of war, drastically enlarges the Union’s army and navy, blockades Southern ports, spends money not appropriated by Congress, and arrests Northern citizens suspected of being Confederate sympathizers. All of these steps exceed his authority under the Constitution and under federal law. Lincoln addresses Congress as soon as it reconvenes, admitting that he has exceeded his authority (see 1787 and 1793), and refusing to argue that his actions are lawful based on any “prerogative of power” inherent to the presidency. Instead, he explains that he felt he had to respond immediately to the sudden crisis, and asks Congress to retroactively authorize his emergency actions. He says, “These measures, whether strictly legal or not, were ventured upon under what appeared to be a popular demand and a public necessity, trusting then, as now, that Congress would readily ratify them.” Congress gives Lincoln the retroactive authorization he seeks. [Savage, 2007, pp. 16-17]

Entity Tags: Abraham Lincoln

Timeline Tags: Civil Liberties

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

President Roosevelt signs the US declaration of war with Japan.President Roosevelt signs the US declaration of war with Japan. [Source: Franklin D. Roosevelt Presidential Library and Museum]President Roosevelt, recognizing that Congress has the Constitutional authority to declare war (see 1787 and 1793), asks the legislature for a declaration of war against Japan in retaliation for the Japanese air attack against US naval forces at Pearl Harbor. Roosevelt calls the date of the Pearl Harbor attack, December 7, 1941, “a day which will live in infamy.” He says, “I ask that the Congress declare that since the unprovoked and dastardly attack by Japan on Sunday, December 7, 1941, a state of war has existed between the United States and the Japanese Empire.” With a single exception—Representative Jeannette Rankin (R-MT)—every member of the House and Senate votes to authorize war against Japan. The next day, the US will declare war against Germany and Italy as well. [Savage, 2007, pp. 18; Franklin D. Roosevelt Library and Museum, 2/10/2008]

Entity Tags: Jeannette Rankin, Franklin Delano Roosevelt

Timeline Tags: Civil Liberties

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

President Harry Truman, without the approval of Congress, sends US troops to fight in the Korean War. Unlike his predecessor (see December 8, 1941), Truman asserts that he has the inherent right to do so as the commander in chief (see 1787 and 1793). Truman bases his decision in part on a UN Security Council resolution passed three days before—at the US’s behest—approving military aid to South Korea, which was invaded by North Korean troops on June 25. In 2007, reporter and author Charlie Savage will write: “But the permission of foreign states was irrelevant to the domestic legal issue of who got to decide whether the United States would go to war. No president had ever before launched anything on the scale of the Korean War without prior permission from Congress, as the Constitution requires.” Savage will explain why Congress allows Truman to usurp its prerogatives: “[M]embers of Congress, eager to appear tough against Communism and to support a war effort, did nothing to block Truman.” [Savage, 2007, pp. 19; Truman Library, 3/2008]

Entity Tags: Harry S. Truman, United Nations Security Council, Charlie Savage

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA launches the first of seven satellites, code-named “Canyon,” that can pick up various types of voice and data traffic from Earth orbit. Canyon will lead to a more sophisticated satellite intelligence system, code-named “Rhyolite” (later “Aquacade”—see Early 1970s). [Federation of American Scientists, 7/17/1997]

Entity Tags: Rhyolite, National Security Agency, Canyon

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

President Nixon authorizes the creation of a “special investigations unit,” later nicknamed the “Plumbers,” to root out and seal media leaks. The first target is Daniel Ellsberg, who leaked the Pentagon Papers to the press (see June 13, 1971); the team will burglarize the office of Ellsberg’s psychiatrist, Dr. Lewis Fielding, in hopes of securing information that the White House can use to smear Ellsberg’s character and undermine his credibility (see September 9, 1971). Nixon aide John Ehrlichman, who supervises the “Plumbers,” will later say that the Ellsberg burglary is “the seminal Watergate episode.” Author Barry Werth will later write, “[L]ike all original sins, it held the complete DNA of subsequent misdeeds.” During the upcoming court battle over the documents, Nixon tells his aide Charles Colson: “We’ve got a countergovernment here and we’ve got to fight it. I don’t give a damn how it’s done. Do whatever has to be done to stop those leaks.… I don’t want to be told why it can’t be done.” Whatever damaging information the “Plumbers” can find on Ellsberg will be itself leaked to the press, Nixon says. “Don’t worry about his trial [referring to Ellsberg’s arrest on conspiracy and espionage charges (see June 28, 1971) ]. Just get everything out. Try him in the press… leak it out.” [Werth, 2006, pp. 84-87] As he is wont to do, Nixon refers to his own success in convicting suspected Communist spy Alger Hiss in 1950. “We won the Hiss case in the papers,” he says. “We did. I had to leak stuff all over the place. Because the Justice Department would not prosecute it.… It was won in the papers…. I leaked out the papers. I leaked everything.… I leaked out the testimony. I had Hiss convicted before he ever got to the grand jury.” [Kutler, 1997, pp. 10; Reeves, 2001, pp. 337-338] In July 1973, FBI deputy director W. Mark Felt, the notorious “Deep Throat” (see May 31, 2005) will tell reporter Bob Woodward that Nixon created the Plumbers because the FBI would not do his bidding in regards to Ellsberg. Had the FBI agreed to investigate Ellsberg to the extent Nixon wanted, he would not have created the “Plumbers.” “The problem was that we [the FBI] wouldn’t burglarize” (see June 30-July 1, 1971), Felt will say. Ehrlichman will later testify, “Those fellows were going out as substitutes for the FBI.” [Woodward, 2005, pp. 107]

Entity Tags: Federal Bureau of Investigation, ’Plumbers’, Alger Hiss, Daniel Ellsberg, Richard M. Nixon, W. Mark Felt, Lewis Fielding, Bob Woodward, John Ehrlichman

Timeline Tags: Nixon and Watergate

July 1, 1971: Felt Becomes #3 FBI Official

FBI Director J. Edgar Hoover promotes W. Mark Felt to be the #3 official in the bureau. Though Hoover’s longtime assistant and confidante Clyde Tolson is putatively the #2 man at the bureau, Tolson is seriously ill and does not often come to work, so Felt essentially becomes the FBI’s deputy director, in charge of day-to-day operations. Felt has access to virtually every piece of information the FBI possesses. Felt will become the celebrated “Deep Throat,” Washington Post reporter Bob Woodward’s inside source for the Watergate investigations (see May 31, 2005). [Woodward, 2005, pp. 35]

Entity Tags: Bob Woodward, Clyde Tolson, Federal Bureau of Investigation, J. Edgar Hoover, W. Mark Felt

Timeline Tags: Nixon and Watergate

May 3, 1972: Gray Named FBI Director

L. Patrick Gray.L. Patrick Gray. [Source: Associated Press]L. Patrick Gray, an assistant attorney general in the Justice Department, is named the acting director of the FBI by President Nixon. [Federal Bureau of Investigation, 2007] Gray, a Navy veteran and a “straight arrow” who neither smokes nor drinks, hires the first female FBI agents and relaxes the rigid agency dress code. He has a long relationship with Nixon, and worked on Nixon’s staff in the late 1950s when Nixon was vice president. Considered an outsider by many FBI officials, his naming to the post particularly infuriates deputy director W. Mark Felt, who believes he should have been given the post. Felt, who becomes the celebrated Watergate source “Deep Throat” (see May 31, 2005), may have decided to leak Watergate-related information in part because of his dislike for Gray and his resentment at not becoming director. [New York Times, 7/7/2005]

Entity Tags: W. Mark Felt, Richard M. Nixon, L. Patrick Gray, Federal Bureau of Investigation

Timeline Tags: Nixon and Watergate

Arthur Bremer being restrained after shooting George Wallace.Arthur Bremer being restrained after shooting George Wallace. [Source: Kansas City Star]Around 4 p.m, gunman Arthur Bremer shoots Alabama Governor George Wallace in a Maryland shopping center. Wallace, mounting a third-party bid for the presidency, survives the shooting, but is crippled for life. He is also essentially out of the race. The political ramifications are powerful: Wallace, a segregationist Democrat, is doing well in many Southern states. With Wallace out of the picture, his voters will almost uniformly go to Richard Nixon, and whatever threadbare chance of victory Democratic candidate George McGovern has of defeating Nixon is over.
Lone Gunman - There is no evidence to connect Nixon or the GOP with Bremer—all evidence will show that Bremer is a classic “lone gunman” who stalked several presidential candidates before gunning down Wallace—but Nixon and his campaign officials know that even a hint of a connection between the Nixon campaign and Bremer would be politically devastating.
Break-in - On the night of the shooting, Nixon aide Charles Colson orders campaign operative E. Howard Hunt (see 2:30 a.m.June 17, 1972) to break into Bremer’s Milwaukee apartment to discover if Bremer had any political connections (hopefully Democratic or liberal connections, though none are ascertained). [Woodward, 2005, pp. 47-50] Interestingly, by 6:30 p.m., White House communications official Ken Clawson calls the Washington Post to announce that “left-wing” literature had been found in Bremer’s apartment, and that Bremer may have been associated with the presidential campaign of George McGovern. No such evidence is found. Colson tells reporters that Bremer is a dues-paying member of the Young Democrats of Milwaukee, a lie that makes it into several newspapers. Post editor Howard Simons will consider the idea that Wallace was assassinated on the orders of the White House—“the ultimate dirty trick”—but no evidence of that connection ever surfaces. [Bernstein and Woodward, 1974, pp. 326; Reeves, 2001, pp. 480]
FBI Leaves Apartment - Hunt will claim in his autobiography, Undercover, that he refused the order to burglarize Bremer’s apartment. The FBI finds both left-wing and right-wing literature in Bremer’s apartment, as well as a diary whose opening line is, “Now I start my diary of my personal plot to kill by pistol either Richard Nixon or George Wallace.” Local reporters will later claim that the FBI leaves Bremer’s apartment for about 90 minutes, during which time reporters and other unidentified figures are able to spirit away papers and other materials. It is not clear whether Hunt is one of those “unidentified figures.” [Spartacus Schoolnet, 8/2007]
Deep Throat - Top FBI official W. Mark Felt provides useful information for Washington Post reporter Bob Woodward’s profile of Bremer, operating as a “deep background” source. It is the first time Felt, who will become Woodward’s “Deep Throat” Watergate source (see May 31, 2005), gives important information to Woodward. [Woodward, 2005, pp. 47-50]

Entity Tags: Richard M. Nixon, Howard Simons, W. Mark Felt, George S. McGovern, Ken Clawson, E. Howard Hunt, Arthur Bremer, Bob Woodward, Charles Colson, George C. Wallace

Timeline Tags: Nixon and Watergate, Elections Before 2000

Washington Post reporter Bob Woodward learns that two of the Watergate burglars (see 2:30 a.m.June 17, 1972) have the name “E. Howard Hunt” in their address books, both with notations that indicate Hunt has a post at the White House. Woodward contacts his FBI source, W. Mark Felt—later known as “Deep Throat” (see May 31, 2005)—and asks Felt the first of many Watergate-related questions. Felt is reticent, merely telling Woodward that the burglary will “heat up” before hanging up on Woodward. Unsure what to do next, Woodward calls the White House and asks for Hunt. When no one answers Hunt’s office phone, the White House operator suggests that Hunt may be in the office of Charles Colson, the special counsel to President Nixon. Colson’s office gives Woodward the number of the Mullen Company, a public relations firm for which Hunt writes (Mullen is a possible CIA front company—see June 17, 1972). Woodward calls Hunt there, and when Hunt answers, asks him why his name is in the address book of two of the Watergate burglars. “Good God!” Hunt shouts, then says he has no comment, and slams down the phone. Within hours, Hunt will go into hiding. White House communications official Ken Clawson tells Woodward that Hunt worked with the White House in declassifying the Pentagon Papers (see March 1971), and, more recently, on a narcotics enforcement project. Clawson then puzzles Woodward by making the following unsolicited statement: “I’ve looked into the matter very thoroughly, and I am convinced that neither Mr. Colson nor anyone else at the White House had any knowledge of, or participation in, this deplorable incident at the Democratic National Committee.” Woodward soon learns that Hunt was a CIA agent between 1949 and 1970. Woodward again calls Felt, who guardedly tells him that Hunt is connected to the burglaries by far more than mere address books. Felt does not tell Woodward that he has already reviewed Hunt’s White House personnel file, and found that Hunt worked over 600 hours for Colson in less than a year. [Bernstein and Woodward, 1974, pp. 24-25; Woodward, 2005, pp. 56-58]

Entity Tags: W. Mark Felt, Bob Woodward, Charles Colson, Mullen Company, Democratic National Committee, Ken Clawson, E. Howard Hunt

Timeline Tags: Nixon and Watergate

Martha Mitchell.Martha Mitchell. [Source: Bettmann / Corbis]Martha Mitchell, the wife of Nixon campaign director John Mitchell, makes an unexpected phone call to UPI reporter Helen Thomas. Mrs. Mitchell is initially calm and even a bit sad, but when Thomas brings up the subject of Watergate, Mrs. Mitchell becomes agitated. She is “sick of the whole business,” she says, and adds: “I’ve given John an ultimatum. I’m going to leave him unless he gets out of the campaign. I’m sick and tired of politics. Politics is a dirty business.” [Thomas, 1999, pp. 210-211] Suddenly she screams, “You just get away—get away!” and the line goes dead. [Reeves, 2001, pp. 508] Three days later she calls Thomas again and asserts that she is a political prisoner in her own home. “I’m not going to stand for all of those dirty things that go on,” she shouts. “If you could see me, you wouldn’t believe it. I’m black and blue.” Washington Post reporter Bob Woodward believes that Mrs. Mitchell might be an unexpected fount of information about her husband’s inner dealings in the Watergate conspiracy, but when he interviews her in September, she will reveal nothing of import. [Bernstein and Woodward, 1974, pp. 92-95] In October 1972, W. Mark Felt, Washington Post reporter Bob Woodward’s FBI background source (see May 31, 2005), says of Mrs. Mitchell, “She knows nothing, apparently, but that doesn’t mean she won’t talk.” [Bernstein and Woodward, 1974, pp. 133]

Entity Tags: Martha Mitchell, W. Mark Felt, Helen Thomas, John Mitchell, Bob Woodward

Timeline Tags: Nixon and Watergate

The Rosslyn parking garage where Woodward and Felt meet.The Rosslyn parking garage where Woodward and Felt meet. [Source: Washington Post]Washington Post reporter Bob Woodward visits his FBI source, top bureau official W. Mark Felt (see May 31, 2005), at Felt’s suburban Virginia home. Felt instructs Woodward that if he is to continue funneling information to Woodward as his “deep background” source, ground rules need to be set. Felt brings his early FBI experience as a Nazi tracker to bear. No more phone calls and no more visits, Felt says. Woodward needs an unobtrusive way to contact Felt to arrange a meeting; Felt suggests that Woodward use a flowerpot with a small red flag currently on his apartment balcony. Moving the flowerpot from the front of the balcony to the rear will alert Felt that Woodward wants a meeting. The meetings will take place at 2 a.m. on the bottom level of an underground parking garage in Rosslyn, Virginia. Woodward is to employ countersurveillance techniques for these meetings—taking the stairs instead of the elevators, taking taxicabs instead of his personal car, switching cabs, walking the last few blocks to the garage. If Felt wants a meeting, he will, by methods he never explains, indicate this by marking Woodward’s morning copy of the New York Times. Woodward is never to divulge anything of Felt’s contacts or their relationship to anyone, Felt insists. “I had never heard of such extreme precautions,” Woodward recalls in 2005. “It was extraordinary.” Woodward realizes that Felt is an extraordinary source taking extraordinary risks, and agrees to the procedures. [Woodward, 2005, pp. 61-66]

Entity Tags: Bob Woodward, Federal Bureau of Investigation, W. Mark Felt

Timeline Tags: Nixon and Watergate

US Attorney Earl Silbert, the chief prosecutor for the Watergate burglary case (see 2:30 a.m.June 17, 1972), has the FBI “electronically sweep his office as well as the federal grand jury area” for surveillance devices. Silbert asks for the sweep because of information appearing in the Washington Post’s Watergate reporting that Silbert believes may be coming from inside the courthouse. The sweep, conducted on September 5, finds nothing. FBI deputy director W. Mark Felt—“Deep Throat” (see May 31, 2005)—signs off on Silbert’s request. [Woodward, 2005, pp. 68]

Entity Tags: W. Mark Felt, Earl Silbert, Federal Bureau of Investigation

Timeline Tags: Nixon and Watergate

Disappointed that the Watergate burglary indictments do not extend further than the five burglars and their two handlers (see 2:30 a.m.June 17, 1972 and September 15, 1972), Washington Post reporter Bob Woodward contacts W. Mark Felt (“Deep Throat”—see May 31, 2005), his FBI source, to ask about a story he and fellow reporter Carl Bernstein have drafted about the indictment. Woodward breaks the rules Felt laid down for contacting him (see August 1972), but Felt does not complain. Instead, Felt tells Woodward that the story is “[t]oo soft.” “You can go much stronger,” he says. Felt tells Woodward to look into “other intelligence gathering activities” beyond Watergate. Felt says that the money for the burglary and other operations is controlled by top assistants to former Attorney General John Mitchell, now chief of the Nixon re-election campaign (CREEP). In a frantic set of meetings with Judy Hoback, the treasurer of CREEP, Bernstein learns of a secret campaign fund managed by two top campaign aides, Jeb Magruder and Herbert L. “Bart” Porter, as well as White House aide and Watergate figure G. Gordon Liddy. Woodward calls Felt for more details, and after Felt abjures Woodward to make this his last phone call, confirms Magruder and Porter’s involvement. In essence, Felt tells Woodward to “follow the money,” though Woodward will not recall Felt using those exact words. [Bernstein and Woodward, 1974, pp. 73; Woodward, 2005, pp. 69-71]

Entity Tags: John Mitchell, Campaign to Re-elect the President, Bob Woodward, Carl Bernstein, Herbert L. Porter, G. Gordon Liddy, W. Mark Felt, Judy Hoback, Jeb S. Magruder

Timeline Tags: Nixon and Watergate

Around 2 a.m., Washington Post reporter Bob Woodward meets his FBI source, W. Mark Felt (popularly called “Deep Throat”—see May 31, 2005) in the underground parking garage Felt has designated as their rendezvous (see August 1972). Woodward’s partner Carl Bernstein has unearthed fascinating but puzzling information about a Nixon campaign “dirty tricks” squad headed by California lawyer Donald Segretti (see June 27, 1971, and Beyond and October 7, 1972). Woodward is desperately searching for a way to pull together the disparate threads of the various Watergate stories. An unusually forthcoming Felt says he will not give Woodward any new names, but directs him to look in “the direction of what was called ‘Offensive Security.’” Things “got all out of hand,” Felt tells Woodward, in “heavy-handed operation[s]” that went farther than perhaps their originators had intended. Felt says bluntly that Nixon campaign chairman John Mitchell was involved, and, “Only the president and Mitchell know” how deep Mitchell’s involvement really is. Mitchell “learned some things in those ten days after Watergate,” information that shocked even him. If what Mitchell knows ever comes to light, it could destroy the Nixon administration. Mitchell himself knew he was ruined after Watergate investigation began, and left the administration to try to limit the damage. Felt adds that Nixon aide John Ehrlichman ordered Watergate burglar E. Howard Hunt to leave town (see June 18, 1972), a revelation that surprises Woodward, since Ehrlichman’s name has not yet come up in the conspiracy stories.
Four Major Groups - There are four major groups within the Nixon presidential campaign, Felt says. The “November Group” handles campaign advertising. Another group handles political espionage and sabotage for both the Republican and Democratic National Conventions. A third “primary group” did the same for the campaign primaries (this group not only worked to sabotage Democrats, but Republican primary opponents of Nixon’s as well). And a fourth, the “Howard Hunt group,” is also known as the “Plumbers,” working under Hunt (see 2:30 a.m.June 17, 1972). Felt calls the Plumbers the “really heavy operations team.” Hunt’s group reports directly to Charles Colson, Nixon’s special counsel. One set of operations by Hunt’s group involved planting items in the press; Felt believes Colson and Hunt leaked stories of former Democratic vice presidential candidate Thomas Eagleton’s drunk driving record to reporters. “Total manipulation—that was their goal, with everyone eating at one time or another out of their hands. Even the press.” The Post is specifically being targeted, Felt warns; the White House plans to use the courts to make Woodward and Bernstein divulge their sources.
Watergate Investigation Deliberately Narrow - Felt says that the Justice Department’s indictments against the seven Watergate burglars (see September 15, 1972) was as narrow as Department officials could make it. Evidence of political espionage or illegal campaign finances that was not directly related to the burglary was not considered. Felt says that the investigation, as narrow as it was, was plagued by witness perjury and evasions.
Everything is Interconnected - Everything—surveillance operations, illegal campaign finances, campaign “dirty tricks”—is interconnected, Felt says. The Segretti story is just the tip of the iceberg: “You could write stories from now until Christmas or well beyond that.” The two men have been alternately standing and sitting in the unlighted parking garage for hours; dawn is approaching, and both are exhausted. Woodward knows he needs specifics, the names of these higher-ups. How is he to know if he is not being railroaded down investigative dead ends by White House media manipulation operations? How about the “Canuck letter” that destroyed the candidacy of Democratic presidential hopeful Edmund Muskie? “It was a White House operation,” Felt replies: “done inside the gates surrounding the White House and the Executive Office Building. Is that enough?” It is not, Woodward retorts. Are there more intelligence and sabotage operations still to come? Woodward angrily says that he is tired of their “chickensh_t games,” with Felt pretending he never provided primary information and Woodward contenting himself with scraps of disconnected information. Felt replies: “Okay. This is very serious. You can safely say that 50 people worked for the White House and CREEP [the Nixon re-election campaign] to play games and spy and sabotage and gather intelligence. Some of it is beyond belief, kicking at the opposition in every imaginable way. You already know some of it.” Woodward lists the many examples that he and Bernstein have been able to unearth: surveillance, following people, press leaks, fake letters, campaign sabotage, investigations of campaign workers’ private lives, theft, campaign provacateurs. Felt nods. “It’s all in the [FBI] files. Justice and the Bureau know about it, even though it wasn’t followed up.” Woodward, despite himself, is stunned. The White House had implemented a systematic plan to subvert the entire electoral process? Had used fifty people to do it? “You can safely say more than fifty,” Felt says, and walks up the ramp and out of the garage. It was 6 a.m. Woodward uses Felt’s information to help create one of the most devastating stories yet published about Watergate (see October 10, 1972). [Bernstein and Woodward, 1974, pp. 130-135; Woodward, 2005, pp. 75-79]
'Organizing Principle' of Watergate - Nixon White House counsel Leonard Garment will write in his 2000 book In Search of Deep Throat (in which he misidentifies the source as obscure Nixon staffer John Sears) that while Woodward’s source did not deliver “much in the way of specific information, he gave Woodward and Bernstein what they needed: an organizing principle.” It is during this time, Garment will write, that the reporters begin to truly understand the entirety of the Watergate conspiracy. [Woodward, 2005, pp. 191-194]

Entity Tags: E. Howard Hunt, Donald Segretti, Charles Colson, Carl Bernstein, Bob Woodward, ’Plumbers’, W. Mark Felt, US Department of Justice, Federal Bureau of Investigation, Richard M. Nixon, John Mitchell, John Ehrlichman, Committee to Re-elect the President, Leonard Garment, Edmund Muskie, John Sears, Thomas F. Eagleton

Timeline Tags: Nixon and Watergate

President Nixon meets in his hideaway office in the Executive Office Building with his chief of staff, H. R. Haldeman. Their conversation is captured on Nixon’s secret taping system (see July 13-16, 1973). Haldeman reports that he has learned from his own secret source that there is a leak in the highest echelons of the FBI, a source apparently funnelling information to Washington Post reporters Bob Woodward and Carl Bernstein: “Mark Felt.” Felt, the deputy director of the bureau, is Woodward’s clandestine background source “Deep Throat” (see May 31, 2005). Haldeman warns Nixon not to say anything because it would reveal Haldeman’s source, apparently some “legal guy” at the Post. Besides, “[I]f we move on [Felt], he’ll go out and unload everything. He knows everything that’s to be known in the FBI.” According to White House counsel John Dean, there are no legal sanctions that can be taken against Felt, because Felt has broken no laws. Dean is worried that if the White House takes any action, Felt will “go out and get himself on network television.” Nixon snarls: “You know what I’ll do with him, the little b_stard. Well, that’s all I want to hear about it.” Haldeman tells Nixon that Felt wants to be director of the FBI. Nixon’s first question: “Is he Catholic?” “No sir, he’s Jewish,” Haldeman replies. “Christ, put a Jew in there?” Nixon asks. “Well, that could explain it too,” Haldeman observes. [Woodward, 2005, pp. 85-86] Acting director L. Patrick Gray will inform Felt of the White House’s suspicions in early 1973, leading Felt to strenuously deny the charge, but Gray will refuse White House demands to fire Felt. [Woodward, 2005, pp. 139]

Entity Tags: L. Patrick Gray, Carl Bernstein, Bob Woodward, Federal Bureau of Investigation, H.R. Haldeman, John Dean, Richard M. Nixon, W. Mark Felt, Nixon administration

Timeline Tags: Nixon and Watergate

H. R. Haldeman.H. R. Haldeman. [Source: Southern Methodist University]Washington Post reporter Bob Woodward runs into difficulty with his FBI source, W. Mark Felt, the infamous “Deep Throat” (see May 31, 2005). Woodward wants information connecting Nixon’s chief of staff, H. R. Haldeman, to the Nixon campaign “slush fund” (see Early 1970), but Felt, apparently afraid of crossing Haldeman (see October 19, 1972), refuses to provide anything specific.
Origin of Error - Woodward and his colleague, Carl Bernstein, attempt to secure confirmation of Haldeman’s role in Watergate through the treasurer of the Nixon campaign’s secret fund (see September 29, 1972), Hugh Sloan. The reporters misinterpret Sloan’s cautious statements as indirect confirmation that Sloan had testified to the FBI of Haldeman’s involvement. Additionally, they misinterpret guarded “confirmations” from two other sources. On October 25, the Post publishes a story about Sloan’s supposed assertions.
'All Hell Broke Lose' - Sloan’s attorney denies that his client ever made such an assertion in his testimony (Sloan will later confirm that Haldeman was indeed in charge of the secret fund, but he never testified to that fact). As Woodward later writes, “All hell broke loose.” Woodward and his partner Carl Bernstein, both clearly upset, offer to resign from the Post, an offer that is refused. The White House celebrates the error, calling into question every story Bernstein and Woodward wrote for the Post; Republican supporters such as Senator Bob Dole (R-KS) join in. Post executive editor Ben Bradlee—who stands by the story—will later say that the erroneous story is his personal low point in the history of the entire Watergate coverage.
Repercussions - Felt is furious with Woodward for the erroneous story. They may have lost Haldeman, Felt says, and worse, have spooked other sources that might otherwise have come forward. “You’ve got people feeling sorry for Haldeman. I didn’t think that was possible.… You put the investigation back months. It puts everyone on the defensive—editors, FBI agents, everybody has to go into a crouch after this.” The reporters write another story admitting the error about Sloan’s testimony, but saying that Haldeman did indeed control the secret campaign fund. Woodward even quotes Felt, identifying him as “one source,” an unprecedented breach of the procedures they have established in using Felt as a “deep background” source. [Bernstein and Woodward, 1974, pp. 173-196; Woodward, 2005, pp. 88-92]

Entity Tags: W. Mark Felt, Washington Post, Hugh Sloan, Federal Bureau of Investigation, Ben Bradlee, H.R. Haldeman, Bob Woodward, Committee to Re-elect the President, Carl Bernstein, Robert J. (“Bob”) Dole

Timeline Tags: Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

W. Mark Felt.W. Mark Felt. [Source: Southern Methodist University]Washington Post reporter Bob Woodward once again meets with his FBI background source, W. Mark Felt—known around the Post offices as “Deep Throat” (see May 31, 2005). Felt says that everyone in the FBI knows, or is convinced, that former Nixon campaign chief John Mitchell and White House aide Charles Colson were the driving forces behind the “Plumbers,” the “special investigative unit” that carried out illegal surveillance and burglaries for the Nixon re-election campaign (see Late June-July 1971). “Colson’s role was active,” Felt says. “Mitchell’s position was more ‘amoral’ and less active—giving the nod but not conceiving the scheme.” While no one at the bureau doubts this, Felt says, there is only “the weakest circumstantial evidence” to prove it. “‘Insulation’ is the key word to understand why the evidence can’t be developed.” He adds, perhaps challengingly, “If the FBI couldn’t prove it, I don’t think the Washington Post can.” Mitchell and Colson sponsored convicted Watergate burglars G. Gordon Liddy and E. Howard Hunt, Felt says. “And if you’ll check, you’ll find that Liddy and Hunt had reputations that are the lowest. The absolute lowest. Hiring these two was immoral. They got exactly what they wanted. Liddy wanted to tap the New York Times and everybody knew it. And not everybody was laughing about it. Mitchell, among others, liked the idea.” (The scheme to wiretap the Times was never carried out.) With the convictions of the burglars (see January 8-11, 1973 and January 30, 1973), the White House’s plan now is to contain the damage and prevent any congressional hearings from finding out anything further. The key to the damage-control plan, Felt says, is the broad claim of presidential “executive privilege” to keep investigators from subpoenaing White House records. Someone from inside the conspiracy is going to have to crack, Felt says, or there will never be more than rumor and circumstantial evidence that will prove nothing. Felt is disgusted with the FBI investigation’s deliberate narrowness (see Mid-January, 1973), saying that it could have gone far deeper and farther afield than it did. “The efforts to separate the Watergate and the espionage-sabotage operations are a lot of bullsh_t,” he says. After heated discussions over Felt’s latest revelations, Woodward and his colleague Carl Bernstein decide there is not enough concrete evidence for a new story. [Bernstein and Woodward, 1974, pp. 243-246]

Entity Tags: Federal Bureau of Investigation, Carl Bernstein, Bob Woodward, Charles Colson, G. Gordon Liddy, E. Howard Hunt, Nixon administration, New York Times, John Mitchell, W. Mark Felt

Timeline Tags: Nixon and Watergate

Washington Post reporter Bob Woodward meets with W. Mark Felt, his secretive “Deep Throat” FBI source (see May 31, 2005), at an out-of-the-way bar in Maryland. During the meeting, Felt warns Woodward that the FBI is up in arms about finding the source, or sources, of news leaks about Watergate. The Nixon campaign lawsuit and subpoenas to Woodward and other reporters (see February 26, 1973) are “only the first step” in an all-out White House campaign against the press in general and the Post in particular. Felt says that Nixon has “told the appropriate people, ‘Go to any length’ to stop them. When he says that, he really means business.” There is about $5 million left in the Nixon campaign fund from the 1972 elections, and Nixon intends to use that money to, as Felt says, “take the Washington Post down a notch.” A full-blown grand jury investigation of the Watergate leaks is being planned, Felt says. Felt describes Nixon as “wild” and “shouting” about the idea. “He thinks the press is out to get him and therefore is disloyal; people who talk to the press are even worse—the enemies within, or something like that.” Felt seems surprisingly unconcerned, and explains that he feels the Nixon administration is, in Woodward’s words, “on the ropes.” “It can’t work. They’ll never get anyone. They never have. They’re hiding things that will come out and even discredit their war against leaks. They can’t stop the real story from coming out. That’s why they’re so desperate.… The flood is coming, I’m telling you.” Felt says that all of this is why L. Patrick Gray pressured the White House into naming him as permanent FBI director (see February 17, 1973), so he could help contain the leaks and ensure that the press never learns the true extent of Watergate. Felt also strongly implies that the Gray nomination is the result of implicit blackmail on Gray’s part—name him FBI director or, as Felt puts it, “all hell could break loose.” Gray and White House counsel John Dean will later deny this. [Bernstein and Woodward, 1974, pp. 268-270; Woodward, 2005, pp. 12-13]

Entity Tags: W. Mark Felt, Bob Woodward, Committee to Re-elect the President, Federal Bureau of Investigation, John Dean, Nixon administration, Washington Post, L. Patrick Gray

Timeline Tags: Nixon and Watergate

An internal FBI memo shows that the bureau suspects one of its own as being a source for Washington Post reporters Bob Woodward and Carl Bernstein for Watergate-related information. The memo reads in part: “As you know, Woodward and Bernstein have written numerous articles about Watergate [in which] they have frequently set forth information which they attribute to Federal investigators, Department of Justice sources and FBI sources.… [T]here is no question but that they have access to sources either in the FBI or the Department of Justice.” The memo says that the FBI’s acting director, L. Patrick Gray, has ordered an analysis of the reporters’ most recent article to determine its source and to locate the FBI leaker. The memo is signed by W. Mark Felt, the FBI’s deputy director and Woodward’s infamous source, nicknamed in the Post newsroom “Deep Throat” (see May 31, 2005). Woodward, who will read the memo for the first time in 1992, will realize as he pores over the document that Felt used the memo to cover his own tracks, not only by initiating the leak inquiry but by casting suspicion, however briefly, on US Attorney Donald Campbell. [Woodward, 2005, pp. 7-11]

Entity Tags: L. Patrick Gray, Bob Woodward, Carl Bernstein, US Department of Justice, Donald Campbell, Washington Post, Federal Bureau of Investigation, W. Mark Felt

Timeline Tags: Nixon and Watergate

After learning that the White House will soon make a dramatic Watergate admission, Washington Post reporter Bob Woodward meets clandestinely with his “Deep Throat” source, FBI deputy director W. Mark Felt (see May 31, 2005). Felt drops a bombshell. “You’d better hang on for this,” he says. “Dean and Haldeman are out—for sure” (see April 30, 1973). John Dean is President Nixon’s White House counsel and one of the key figures in the Watergate conspiracy. H. R. Haldeman is Nixon’s chief of staff and closest confidante. “Out. They’ll resign. There’s no way the president can avoid it.” Woodward and his colleague Carl Bernstein inform Post editor Ben Bradlee of Felt’s revelation (avoiding any identification of Felt). Bradlee is reluctant to print such an explosive story based on one “deep background” source, no matter how reliable. The story does not go to print. [Woodward, 2005, pp. 75-81] Felt’s story is accurate as far as it goes. The day before, Attorney General Richard Kleindienst had informed President Nixon that Dean and former campaign deputy Jeb Magruder testified, and that they named Haldeman, White House aide John Ehrlichman, and former campaign chief John Mitchell as co-conspirators. Dean went even further, demanding complete immunity and threatening to implicate Nixon if he was not given legal protection. Kleindienst says he will have to recuse himself from further involvement in the investigation because of his close relationship with Mitchell (see April 19, 1973), but deputy attorney general Henry Peterson will keep Nixon informed of any and all events that transpire. [Reeves, 2001, pp. 586-587] It is not clear if Felt knew that Mitchell and Ehrlichman had also been implicated; in any event, he does not inform Woodward. [Woodward, 2005, pp. 75-81]

Entity Tags: W. Mark Felt, Richard M. Nixon, Richard Kleindienst, Nixon administration, John Mitchell, H.R. Haldeman, Carl Bernstein, Henry Peterson, Bob Woodward, John Dean, John Ehrlichman, Ben Bradlee, Jeb S. Magruder

Timeline Tags: Nixon and Watergate

The New York Daily News reports that acting FBI director L. Patrick Gray destroyed potentially incriminating evidence taken from the safe of Watergate burglar E. Howard Hunt (see Late December 1972). Gray, who testified to this days before to the Watergate grand jury, said that he received the material from White House counsel John Dean. “I said early in the game,” Gray testifies, “that Watergate would be a spreading stain that would tarnish everyone with whom it came in contact—and I’m no exception.” Shortly afterwards, Washington Post reporter Bob Woodward learns from his “Deep Throat” source, FBI deputy director W. Mark Felt (see May 31, 2005), that the story is true. Felt informs Woodward that Gray was told by Nixon aides Dean and John Ehrlichman that the files were “political dynamite” that could do more damage to the Nixon administration than Watergate (see June 28, 1972). Woodward realizes that the story means Gray’s career at the FBI is finished. Woodward and his colleague Carl Bernstein write their own report for April 30; the same day, Gray resigns from the FBI (see April 5, 1973). Instead of Felt being named FBI director, as he had hoped, Nixon appoints the head of the Environmental Protection Agency, William Ruckelshaus, to head the bureau. Felt is keenly disappointed. [Time, 8/20/1973; O.T. Jacobson, 7/5/1974 pdf file; Woodward, 2005, pp. 96-98] When he learns of Gray’s actions, Post editor Howard Simons muses: “A director of the FBI destroying evidence? I never thought it could happen.” [Bernstein and Woodward, 1974, pp. 306-307] The FBI’s 1974 report on its Watergate investigation dates Gray’s resignation as April 27, not April 29 [O.T. Jacobson, 7/5/1974 pdf file] , a date supported by reports from Time. [Time, 8/20/1973]

Entity Tags: Carl Bernstein, E. Howard Hunt, John Dean, Bob Woodward, John Ehrlichman, Howard Simons, William Ruckelshaus, L. Patrick Gray, Federal Bureau of Investigation, New York Daily News, W. Mark Felt, Richard M. Nixon

Timeline Tags: Nixon and Watergate

Bob Woodward and Carl Bernstein in the offices of the Washington Post.Bob Woodward and Carl Bernstein in the offices of the Washington Post. [Source: Bettmann / Corbis]Washington Post reporter Bob Woodward writes a memo to his editor, Ben Bradlee, largely based on his meetings with his FBI background source, “Deep Throat” (FBI deputy director W. Mark Felt—see May 31, 2005). The memo is full of material that will soon come out in either Senate testimony or the media, but also contains some information that Woodward cannot sufficiently confirm to allow him to write a news report. One of the most explosive items Woodward writes is the line, “Dean talked with Senator Baker after Watergate committee formed and Baker is in the bag completely, reporting back directly to White House.” If this is true, then according to former White House counsel John Dean, now cooperating with the Senate investigation, then the ranking Republican senator on the committee, Howard Baker (R-TN), is a White House “mole,” providing information directly to the White House about the committee’s deliberations, discussions, and future plans. The memo also reports that President Nixon personally threatened Dean and that another White House aide, Jack Caulfield, threatened Watergate burglar James McCord by saying “your life is no good in this country if you don’t cooperate” with the White House efforts to keep the Watergate conspiracy secret. The list of “covert national and international things” done by the Nixon re-election campaign were begun by campaign chief John Mitchell: “The list is longer than anyone could imagine.” According to Felt, “[t]he covert activities involve the whole US intelligence community and are incredible.” Felt refuses to give Woodward “specifics because it is against the law. The cover-up had little to do with the Watergate, but was mainly to protect the covert operations.” Felt has also told Woodward that Nixon himself is being blackmailed by one of the Watergate burglars, E. Howard Hunt (see June 20-21, 1972), at a total cost of around $1 million; the blackmail scheme involves just about every Watergate-connected figure in the White House. One reason the White House “cut loose” Mitchell was because Mitchell could not raise his portion of the money. Felt also told Woodward that senior CIA officials, including CIA director Richard Helms and deputy director Vernon Walters, are involved to some extent. Dean has explosive information that he is ready to reveal, but “plumber” G. Gordon Liddy is willing to go to jail or even die before revealing anything. Finally, rumors are running through the White House and the law enforcement and intelligence communities that Nixon is having “fits of ‘dangerous’ depression.” Some of this information will later be confirmed and reported, some of it will remain unconfirmed. [Bernstein and Woodward, 1974, pp. 317-321; Spartacus Schoolnet, 8/2007] Felt also warns Woodward that he, fellow Post reporter Carl Bernstein, and others at the newspaper may be under CIA surveillance and may even be in personal danger. The reporters confirm much of what Felt provided in a discussion with a Dean associate the next day. But both reporters and the Post editors worry that the new information might be part of an elaborate White House scheme to set up the reporters with false, discreditable information. In the following months, information elicted in the Senate committee hearings verifies everything Felt told Woodward, except the warning about being possibly wiretapped by the CIA. That is never verified. [Bernstein and Woodward, 1974, pp. 317-321]

Entity Tags: G. Gordon Liddy, Federal Bureau of Investigation, Central Intelligence Agency, Carl Bernstein, Bob Woodward, Ben Bradlee, Washington Post, W. Mark Felt, John Mitchell, Senate Watergate Investigative Committee, John J. ‘Jack’ Caulfield, John Dean, Howard Baker, E. Howard Hunt, Vernon A. Walters, Richard Helms, Richard M. Nixon

Timeline Tags: Nixon and Watergate

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

Rose Mary Woods.Rose Mary Woods. [Source: Genevieve Naylor / Corbis]A gap of 18 and ½ minutes is found on the tape of a conversation between President Nixon and his aide, H. R. Haldeman, from June 20, 1972 (see July 13-16, 1973). Nixon lawyer Fred Buzhardt says he has no explanation for “the phenomenon.” Nixon’s secretary, Rose Mary Woods, denies any deliberate erasure. But electronics experts will eventually find that the tape has been deliberately erased at least five separate times. White House chief of staff Alexander Haig will blame “some sinister force” for the erasure.
Watergate Discussed - Former Watergate special prosecutor Archibald Cox’s subpoena of the tape (see July 23-26, 1973) says that “there is every reason to infer that the meeting included discussion of the Watergate incident.” That supposition is bolstered by previous testimony from former White House aide John Ehrlichman (see July 24, 1973). Watergate prosecutor Leon Jaworski says he is considering having all the remaining Watergate tapes placed under guard to prevent any further tampering. [Washington Post, 11/22/1973; Gerald R. Ford Library and Museum, 7/3/2007]
Three Suspects - Evidence later shows that only three people could have made the erasure: Woods; Stephen Bull, Nixon’s assistant; and Nixon himself. [Reston, 2007, pp. 33]
Washington Post Learns of Gap - Washington Post reporter Bob Woodward learned of “deliberate erasures” in the first week of November from his FBI source, W. Mark Felt (see May 31, 2005). White House sources confirmed that the tapes were often of poor quality, and that some inadvertent gaps existed, but, as press secretary Ron Ziegler tells Woodward’s colleague Carl Bernstein, to say that those gaps were deliberate would be “inaccurate.” When the deliberate gap is reported, Ziegler calls Bernstein to say that he did not know about the gap beforehand. Neither Bernstein nor Woodward doubt Ziegler—by this time, it is obvious that Nixon’s paranoia and penchant for secrecy extends even to the most trusted members of his staff. [Bernstein and Woodward, 1974, pp. 333-334]
Symbolic - In 2005, Woodward will write: “The missing 18 1/2-minute gap soon becomes a symbol for Nixon’s entire Watergate problem. The truth had been deleted. The truth was missing.” [Woodward, 2005, pp. 103]

Entity Tags: Rose Mary Woods, Stephen Bull, Richard M. Nixon, W. Mark Felt, Leon Jaworski, Ron Ziegler, H.R. Haldeman, Archibald Cox, Alexander M. Haig, Jr., John Ehrlichman, Carl Bernstein, Fred Buzhardt, Bob Woodward

Timeline Tags: Nixon and Watergate

The Justice Department’s Office of Planning and Evaluation (OPE) submits a report on the role and actions of the FBI in the Watergate investigations. The report finds that, even with the attempts of former Attorneys General John Mitchell and Richard Kleindienst, White House aides John Dean and Jeb Magruder, and others to “mislead and thwart the Bureau’s legitimate line of inquiry,” and the “contrived covers” used to direct attention away from the White House, the FBI investigation was “the ultimate key to the solution of not only the Watergate break-in (see 2:30 a.m.June 17, 1972) but the cover itself.” The report continues: “There can be no question that the actions of former Attorneys General Mitchell and Kleindienst served to thwart and/or impede the Bureau’s investigative effort. The actions of John W. Dean at the White House and Jeb S. Magruder at the Committee to Re-elect the President were purposefully designed to mislead and thwart the Bureau’s legitimate line of inquiry. At every stage of the investigation there were contrived covers placed in order to mislead the investigators.” The OPE notes the following problems in the investigation, and provides explanations of some:
bullet Providing information concerning ongoing investigations to the White House, and allowing Dean to actually sit in on interviews of White House personnel (see June 22, 1972).
bullet Failing to interview key members of CREEP, the Nixon re-election campaign organization, as well as allowing CREEP attorneys to sit in on interviews of CREEP employees and allowing those attorneys access to FBI investigative materials. The report says that the investigation initially focused on James McCord and E. Howard Hunt, and interviewed CREEP officials tied directly to them. The net was widened later on. However, the report acknowledges that many CREEP employees undoubtedly lied to FBI investigators, “most notably John Mitchell, Jeb Magruder, Bart Porter, Sally Harmony, and Maurice Stans.” Porter and Magruder in particular “lied most convincingly.” Another CREEP employee, Robert Reisner (Magruder’s assistant), was not interviewed because Reisner successfully hid from FBI investigators. The FBI believes it was Reisner who cleaned out the “Operation Gemstone” files from Magruder’s office (see January 29, 1972 and September 29, 1972). Numerous other financial and other files were also destroyed after being requested by the FBI, most notably Alfred Baldwin’s surveillance tapes and logs from the Democratic offices in the Watergate (see May 29, 1972). Many of these files were destroyed by G. Gordon Liddy. “It is apparent that most [CREEP] people in the summer of 1972 were quite willing to lie and/or tell us considerably less than the full truth,” the report notes.
bullet An untenable delay in searching and securing Watergate burglar E. Howard Hunt’s desk in the White House, putting the contents of that desk at risk of being removed, and the “[a]lleged activities by former Acting Director [L. Patrick] Gray to limit, contain, or obstruct FBI investigation of Watergate” (see June 22, 1972). Gray is known to have destroyed materials from Hunt’s desk given to him by Dean, and is known to have extensively interfered with the FBI’s investigation (see June 28-29, 1972 and Late December 1972). The report notes that while it cannot find specific evidence that Gray broke any laws in his attempts to impede the FBI’s investigation into the Watergate conspiracy, it is clear that Gray cooperated with the White House, specifically through Dean, to ensure that the White House was always aware of what avenues of investigation were being pursued. The OPE says that Gray’s destruction of files from Hunt’s safe did not necessarily impede the FBI’s investigation, because it has no way of knowing what was in those files. The report says that it is unfortunate that “many people make no distinction between the FBI’s actions and Mr. Gray’s actions.”
bullet Failure to interview key individuals with knowledge of the suspicious monies found in the burglars’ bank accounts.
bullet Failing to secure and execute search warrants for the burglars’ homes, automobiles, and offices. The OPE says that many of those issuing this criticism “should know better,” and claims that the FBI agents involved did their level best to obtain search warrants within the bounds of the law. The report notes that after the burglary, the assistant district attorney prosecuting the case, Earl Silbert, did not believe there was probable cause to search burglar James McCord’s home or office until after July 10, 1972, when Baldwin told the FBI that he had taken surveillance equipment to McCord’s home (see June 17, 1972). Even then, Silbert decided that because of the amount of time—23 days—that had expired, a search warrant would have been pointless.
bullet Failing to identify and interview a number of people listed in the burglars’ address books. The OPE report notes that the decision to interview far less than half of the names in the books was made by FBI agents in the Miami field office, and due to the “fast moving extensive investigation which was then being conducted,” the decision to only track down a selected few from the books was right and proper. The report notes that subsequent interviews by reporters of some of the people in the address books elicited no new information. The report also notes that Gray refused to countenance interviews of the remaining subjects in the address book while the trial of the seven burglars (see January 8-11, 1973) was underway.
bullet Failing to find and remove a surveillance device from the Democratic National Committee headquarters (see September 13, 1972). The OPE calls this failure “inexplicable.”
bullet Failure to thoroughly investigate CREEP agent Donald Segretti (see June 27, 1971, and Beyond) and other CREEP operatives. The OPE finds that because Segretti was initially uncooperative with FBI investigators, and because an “extensive investigation” turned up nothing to connect Segretti with the Watergate conspiracy, the agents chose not to continue looking into Segretti’s actions. Only after press reports named Segretti as part of a massive, White House-directed attempt to subvert the elections process (see October 7, 1972) did the FBI discuss reopening its investigation into Segretti. After reviewing its information, the FBI decided again not to bother with Segretti. The OPE finds that the decision was valid, because Segretti had not apparently broken any federal laws, and the FBI does not conduct violations of election laws unless specifically requested to do so by the Justice Department. The report also says that politics were a concern: by opening a large, extensive investigation into the Nixon campaign’s “dirty tricks,” that investigation might have impacted the upcoming presidential elections.
bullet Media leaks from within the FBI concerning key details about the investigation (see May 31, 2005). The report finds no evidence to pin the blame for the leaks on any particular individual. The report notes that New York Times reporter John Crewdson seemed to have unwarranted access to FBI documents and files, but says it has turned that matter over to another agency inside the bureau.
bullet Failing to interview, or adequately interview, key White House officials such as H. R. Haldeman, Charles Colson, Dwight Chapin, and others. The report justifies the decision not to interview Haldeman because the FBI had no information that Haldeman had any knowledge of, or involvement in, the burglary itself.
bullet “Alleged attempt on part of Department of Justice officials to limit, contain, or obstruct FBI investigation.” The report is particularly critical of Kleindienst’s concealment of his contact with Liddy about the burglary (see June 17, 1972).
bullet “Alleged attempt by CIA officials to interfere, contain, or impede FBI Watergate investigation.” The report notes that during the Senate Watergate Committee hearings, Republican co-chairman Howard Baker (R-TN) tried repeatedly to assert that the CIA was behind the burglary. The report calls Baker’s theory “intriguing” but says no evidence of CIA involvement on any operational level was ever found. The report notes that there is still no explanation for the discussions regarding the CIA paying the burglars (see June 26-29, 1972), or the CIA’s involvement with Hunt before the burglary—loaning him cameras, providing him with materials for a disguise, and helping Hunt get film from the first burglary developed. According to the report, Gray stopped the FBI from pursuing these leads. The FBI report says that the CIA involvement apparently had nothing to do with the Watergate burglary, but was more in support of Hunt’s activities with the Ellsberg break-in (see September 9, 1971).
bullet “Alleged activities on part of White House officials to limit, contain, or obstruct FBI Watergate investigation (Dean, Haldeman, Ehrlichman, Colson, et cetera).” The report notes, “There is absolutely no question but that the president’s most senior associates at the White House conspired with great success for nine months to obstruct our investigation.” The report says it was “common knowledge” throughout the investigation that the White House was paying only “lip service” to investigators’ requests for honest, complete answers; the report cites Dean as a specific offender. [O.T. Jacobson, 7/5/1974 pdf file]

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

FBI official R. E. Lewis writes an internal memo suggesting that the FBI disclose “some information from the Watergate investigation aimed at restoring to the FBI any prestige lost during that investigation. He argues, “Such information could also serve to dispel the false impression left by the book All the President’s Men (see June 15, 1974) that its authors, Carl Bernstein and Bob Woodward, not the FBI, solved the Watergate case.”
FBI Ahead of Reporters - “[A] comparison of the chronology of our investigation with the events cited in All the President’s Men will show we were substantially and constantly ahead of these Washington Post investigative reporters,” Lewis writes. “In essence, they were interviewing the same people we had interviewed but subsequent to our interviews and often after the interviewer had testified before the grand jury. The difference, which contributes greatly to the false image, is that the Washington Post blatantly published whatever they learned (or thought they learned) while we reported our findings to the US attorney and the Department [of Justice] solely for prosecutorial consideration.”
Decision Not to Go Public - The FBI will decide not to make any of its information public, citing ongoing prosecutions. In 2005, Woodward will counter: “What Long didn’t say—and what Felt [FBI deputy director Mark Felt, Woodward’s “Deep Throat”—see May 31, 2005] understood—was that the information wasn’t going anywhere until it was public. The US attorney and the Justice Department failed the FBI, as they folded too often to White House and other political pressure to contain the investigation and prosecution to the Watergate bugging (see 2:30 a.m.June 17, 1972). There was also a failure of imagination on the part of lots of experienced prosecutors, including US Attorney Earl Silbert, who could not initially bring himself to believe that the corruption ran to the top of the Justice Department and the White House. Only when an independent special prosecutor was appointed (see May 18, 1973) did the investigation eventually go to the broader sabotage and espionage matters. In other words, during 1972, the cover-up was working exceptionally well.” [Woodward, 2005, pp. 120-121]

Entity Tags: W. Mark Felt, R. E. Lewis, Earl Silbert, Federal Bureau of Investigation, Bob Woodward, Carl Bernstein, US Department of Justice

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

The US Foreign Intelligence Advisory Board recommended in 1970 that “economic intelligence be considered a function of national security” equal to that of other intelligence. In 1977, the NSA, CIA, and Department of Commerce forms a joint “Office of Intelligence Liaison” (later renamed the “Office of Executive Support”) specifically authorized to handle “foreign intelligence” of interest to the Commerce Department, much of it provided by the NSA. The other countries using Echelon, the NSA’s satellite surveillance program, which include Britain, Canada, Australia, and New Zealand, all operate similar programs. President Bill Clinton will extend this operation in 1993. In 1993, the European company Panavia will be specifically targeted over aircraft sales to the Middle East. In 1994, US companies will be given NSA and CIA intelligence intercepts that help them win contracts in Indonesia. Other information that will be provided by US intelligence to US and allied corporations include information about the emission standards for Japanese automobiles, 1995 trade negotiations over the US importing of Japanese luxury cars, France’s participation in the GATT trade negotiations of 1993, and the 1997 Asian-Pacific Economic Conference. [Science and Technology Assessments Office, 8/15/2000]

Entity Tags: William Jefferson (“Bill”) Clinton, Issuetsdeah, National Security Agency, Office of Executive Support, Panavia

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

Former FBI Deputy Director W. Mark Felt, who served before and during the Watergate era, denounces the attempts by the Nixon administration to control the FBI and the Justice Department. Felt, who unbeknownst to the public was Washington Post reporter Bob Woodward’s celebrated inside source nicknamed “Deep Throat” (see May 31, 2005), writes scathingly in his memoir The FBI Pyramid of what he calls the “White House-Justice Department cabal” that worked to conceal the Watergate conspiracy. He does not reveal himself to be Woodward’s source. [Woodward, 2005, pp. 33]

Entity Tags: Nixon administration, Bob Woodward, Washington Post, US Department of Justice, W. Mark Felt

Timeline Tags: Nixon and Watergate

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The Supreme Court rules in INS v. Chadha that Congress has no right to issue what it calls “legislative vetoes,” essentially provisions passed by Congress giving the executive branch specific powers but with Congress reserving the right to veto specific decisions by the executive branch if it does not approve of the decisions made by the executive. Congress had relied on such “legislative vetoes” for years to curb the expanding power of the president. The Court strikes down hundreds of these “legislative vetoes” throughout federal law. Congress quickly schedules hearings to decide how to respond to the Court’s ruling. White House attorney John Roberts (see September 29, 2005), a young, fast-rising conservative, is one of a team of lawyers assigned to review the administration’s upcoming testimony before Congress. Some of the lawyers want to push Congress to place independent agencies such as the Federal Trade Commission (FTC) and Food and Drug Administration (FDA) under White House control—part of the evolving “unitary executive” theory of presidential power (see April 30, 1986). Roberts writes: “With respect to independent agencies… the time may be ripe to reconsider the existence of such entities, and take action to bring them back within the executive branch.… I agree that the time is ripe to reconsider the Constitutional anomaly of independent agencies… More timid souls may, however, desire to see this deleted as provocative.” [Savage, 2007, pp. 256-257]

Entity Tags: Reagan administration, Food and Drug Administration, Federal Trade Commission, John G. Roberts, Jr, US Supreme Court

Timeline Tags: Civil Liberties

Young White House attorney John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983), is selected to respond to a letter from retired Supreme Court Justice Arthur Goldberg. The former justice is commenting on the Reagan administration’s decision to unilaterally invade the tiny Caribbean island nation of Grenada. Goldberg wrote that President Reagan probably did violate the Constitution by sending troops to Grenada without Congressional approval, and in that sense has left himself open to impeachment. However, he added, the invasion had succeeded in establishing democracy in that nation. Therefore Reagan’s actions should be compared to those of President Abraham Lincoln during the Civil War, because, like Lincoln, he “acted in good faith and in the belief that this served our national interest” (see April 12 - July 1861). Drafting the letter for Reagan’s signature, Roberts thanks Goldberg for his defense of Reagan but insists that the invasion was perfectly legal. The president, Roberts writes, has “inherent authority in international affairs to defend American lives and interests and, as commander in chief, to use the military when necessary in discharging these responsibilities.” [Savage, 2007, pp. 257]

Entity Tags: Reagan administration, John G. Roberts, Jr, Arthur Goldberg, Ronald Reagan

Timeline Tags: Civil Liberties

Young conservative White House lawyer John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983 and October 1983), advises senior Reagan officials that the White House should challenge the 1978 Presidential Records Act. To Roberts’s mind, the law goes much too far in requiring that presidential papers be considered government property and should, with some exceptions, be released to the public 12 years after a president leaves office. The law infringes on the right of a president to keep information secret, Roberts argues. Later, he will argue that the 12-year rule is far too brief and, as it would “inhibit the free flow of candid advice and recommendations within the White House,” is unconstitutional. [Savage, 2007, pp. 258]

Entity Tags: Reagan administration, John G. Roberts, Jr, Presidential Records Act

Timeline Tags: Civil Liberties

Young conservative White House lawyer John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983 and October 1983), expands on his previous argument that the president’s papers and documents should remain secret and unavailable to the public (see February 13, 1984). Roberts writes that the Reagan administration should oppose a bill pending in Congress that would make the National Archives a separate agency, independent of the White House. Roberts writes that the “legislation could grant the archivist [the head of the National Archives] some independence from presidential control, with all the momentous constitutional consequences that would entail.” Others in the White House disagree with Roberts, and the administration does not oppose the bill. Roberts suggests that President Reagan attach a signing statement to the bill making it clear that Reagan has the power to fire the archivist if he/she tries to disobey the White House in releasing a presidential document. [Savage, 2007, pp. 258]

Entity Tags: National Archives and Records Administration, Reagan administration, John G. Roberts, Jr

Timeline Tags: Civil Liberties

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Steven Calabresi joins the Justice Department. Calabresi is a young conservative lawyer who has clerked for appeals court Robert Bork, who failed to secure a position on the Supreme Court just months before (see July 1-October 23, 1987). Calabresi, a co-founder of the Federalist Society of conservative lawyers and judges, joins forces with another ambitious young Justice Department lawyer, John Harrison, and the two begin working to expand the power of the president. Calabresi and Harrison decide that an aggressive use of presidential signing statements can advance the president’s authority to the detriment of the legislative and judicial branches. Unfazed by a recent judicial rejection of just such signing statement usage (see 1984-1985), Calabresi and Harrison write a memo to Attorney General Edwin Meese advocating the issuing of more signing statements as part of a larger strategy to increase the president’s influence over the law. Calabresi and Harrison are interested in how what they call “activist judges” use the legislative history of a bill that became law to interpret that law’s meaning in subsequent judicial actions. The two lawyers believe that by issuing signing statements, the president can create a parallel record of presidential interpretations of potentially ambiguous laws to help guide judicial decisions. Meese approves of the idea, and in December has the West Publishing Company, which prints the US Code Congressional and Administration News, the standard collection of bills’ legislative history, begin including presidential signing statements in its publications. In 2007, author Charlie Savage will call Meese’s move “a major step in increasing the perceived legitimacy of the device.” [Savage, 2007, pp. 232] In 2007, Calabresi will say: “I initially thought of signing statements as presidential legislative history. I’ve subsequently come to think of them as being important vehicles by which presidents can control subordinates in the executive branch. They subsequently came to be important to the unitary executive [theory of presidential power].” [Savage, 2007, pp. 234]

Entity Tags: John Harrison, Charlie Savage, Federalist Society, West Publishing Company, US Department of Justice, Edwin Meese, Robert Bork, Steven Calabresi, US Supreme Court

Timeline Tags: Civil Liberties

Edwin Meese.Edwin Meese. [Source: GQ (.com)]Attorney General Edwin Meese receives a report, “Separation of Powers: Legislative-Executive Relations.” Meese had commissioned the report from the Justice Department’s Domestic Policy Committee, an internal “think tank” staffed with hardline conservative scholars and policy advisers.
Recommendations for Restoring, Expanding Executive Power - The Meese report approvingly notes that “the strong leadership of President Reagan seems clearly to have ended the congressional resurgence of the 1970s.” It lays out recommendations for restoring the power taken from the executive branch after Watergate and Vietnam, and adding new powers besides. It recommends that the White House refuse to enforce laws and statutes that “unconstitutionally encroach upon the executive branch,” and for Reagan to veto more legislation and to use “signing statements” to state the White House’s position on newly passed laws. It also assails the 1972 War Powers Resolution and other laws that limit presidential power.
Reinterpreting the Separation of Powers and the Concept of 'Checks and Balances' - Perhaps most importantly, the Meese report claims that for 200 years, courts and scholars alike have misunderstood and misinterpreted the Founders’ intentions in positing the “separation of powers” system (see 1787 and 1793). The belief that the Constitution mandates three separate, co-equal branches of government—executive, judicial, and legislative—who wield overlapping areas of authority and work to keep each of the other branches from usurping too much power—a concept taught in school as “checks and balances”—is wrong, the report asserts. Instead, each branch has separate and independent sets of powers, and none of the three branches may tread or encroach on the others’ area of responsibility and authority. “The only ‘sharing of power’ is the sharing of the sum of all national government power,” the report claims. “But that is not joint shared, it is explicitly divided among the three branches.” According to the report, the White House should exercise total and unchallenged control of the executive branch, which, as reporter and author Charlie Savage will later explain, “could be conceived of as a unitary being with the president as its brain.” The concept of “checks and balances” is nothing more than an unconstitutional attempt by Congress to encroach on the rightful power of the executive. This theory of presidential function will soon be dubbed the “unitary executive theory,” a title adapted from a passage by Alexander Hamilton in the Federalist Papers. [Savage, 2007, pp. 47-48] Charles Fried, Reagan’s solicitor general during the second term, will later write that though the unitary executive theory displays “perfect logic” and a “beautiful symmetry,” it is difficult to defend, because it “is not literally compelled by the words of the Constitution. Nor did the framers’ intent compel this view.” [Savage, 2007, pp. 50]

Entity Tags: Charles Fried, Reagan administration, Domestic Policy Committee, US Department of Justice, Ronald Reagan, Edwin Meese, Charlie Savage

Timeline Tags: Civil Liberties

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Robert Bork.Robert Bork. [Source: National Constitution Center]The controversial nomination of conservative judge Robert Bork to the Supreme Court is defeated in the US Senate. Bork is denied a seat on the Court in a 58-42 vote, because his views are thought to be extremist and even some Republicans vote against him.
'Right-Wing Zealot' - Bork, nominated by President Reagan as one of the sitting judges who most completely reflects Reagan’s judiciary philosophy (see 1985-1986), is characterized even by administration officials as a “right-wing zealot.” Reagan also wants a nominee to placate the hard right over their disaffection caused by the brewing Iran-Contra scandal. However, to make him more palatable for the majority of Americans, Reagan officials attempt to repackage Bork as a moderate conservative. Senate Judiciary Committee member Edward Kennedy (D-MA) attacks Bork’s political philosophy, saying before the committee hearings: “[In Bork’s America] women would be forced into back alley abortions, blacks would sit at segregated lunch counters, rogue police could break down citizens’ doors in midnight raids, schoolchildren could not be taught about evolution, writers and artists could be censored at the whim of government, and the doors of the federal courts would be shut on the fingers of millions of citizens for whom the judiciary is the—and is often the only—protector of the individual rights that are the heart of our democracy.… No justice would be better than this injustice.” Kennedy’s words provoke complaint, but the characterization of Bork is based on his lengthy record of court verdicts and his large body of judicial writings.
Racial Equality Issues - Although there is no evidence to suggest that Bork is himself a racist, former Nixon White House counsel John Dean will write that “his positions on civil rights were an anathema to all who cared about equality in America.” Constitutional law professor Herman Schwartz will write in 2004, “Bork condemned the Fourteenth Amendment’s Equal Protection Clause decisions outlawing the poll tax (to him it was just ‘a very small tax’), the decision establishing the one-person, one-vote principle, abolishing school segregation in the District of Columbia, barring courts from enforcing racially restrictive housing covenants, preventing a state from sterilizing certain criminals or interfering with the right to travel, and prohibiting discrimination against out-of-wedlock children…. Bork’s hostility to governmental action on behalf of minorities did not stop with his critique of court action. In 1963 he criticized a section of the proposed Civil Rights Act of 1964 that required white businesses to serve blacks as resting on a principle of ‘unsurpassed ugliness.’”
Ready to Fight - The Reagan administration understands that Bork’s nomination is opposed; on July 1, the day of his announced nomination, the media reports that Reagan will try to ensure Bork’s confirmation by waging an “active campaign.” Even Senate-savvy James Baker, Reagan’s chief of staff, is uncertain about Bork’s chances at being confirmed, and further worries that even if Bork wins the fight, the cost to Reagan’s political capital will be too high.
His Own Worst Enemy - Conservatives Justice Department official Terry Eastland will later say Senate Democrats sabotage Bork’s chances at faring well in the confirmation hearings, even positioning his table to ensure the least favorable angles for Bork on television. However, the public’s opinion of Bork is unfavorable, and Dean will write: “[I]t was not the position of his chair in the hearing room that made Bork look bad, but rather his arrogance, his hubris, and his occasional cold-bloodedness, not to mention his equivocations and occasional ‘confirmation conversions,’ where he did what no one else could do. He made himself a terrible witness who did not appear to be truthful.” The confirmation conversions even surprise some of his supporters, as Bork abandons his previous stances that the First Amendment only applies to political speech, and the Fourteenth Amendment’s equal protection clause does not apply to women. The Senate Judiciary Committee passes Bork’s nomination along to the full Senate, where Bork is defeated 58-42.
The Verb 'To Bork' - In 2007, Dean will write, “Bork’s defeat made him both a martyr and a verb,” and quotes conservative pundit William Safire as writing that “to bork” someone means to viciously attack a political figure, particularly by misrepresenting that figure in the media. [Dean, 2007, pp. 137-143]

Entity Tags: Herman Schwartz, US Department of Justice, Gregory Peck, Edward M. (“Ted”) Kennedy, US Supreme Court, William Safire, Ronald Reagan, James A. Baker, Senate Judiciary Committee, Terry Eastland, Robert Bork, John Dean

Timeline Tags: Civil Liberties

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

Former White House counsel John Dean, who served prison time for his complicity in the Watergate conspiracy (see September 3, 1974), receives an early morning phone call from CBS reporter Mike Wallace. Dean has tried to keep a low public profile for over a decade, focusing on his career in mergers and acquisitions and staying out of politics. Wallace wants Dean’s reaction to a not-yet-published book by Leonard Colodny and Robert Gettlin, Silent Coup, which advances a very different theory about the Watergate affair than is generally accepted. According to Dean’s own writing and a Columbia Journalism Review article about the book, the book’s allegations are as follows:
bullet Richard Nixon was guilty of nothing except being a dupe. Instead, Dean is the mastermind behind the Watergate conspiracy. Dean became involved both to find embarrassing sexual information on the Democrats and to protect his girlfriend, Maureen “Mo” Biner (later his wife), who is supposedly listed in a notebook linked to a prostitution ring operating out of the Watergate Hotel. This alleged prostitution ring was, the authors assert, patronized or even operated by officials of the Democratic Party. Dean never told Nixon about the prostitution ring, instead concocting an elaborate skein of lies to fool the president. According to the authors, Dean’s wife Maureen knew all about the call girl ring through her then-roommate, Heidi Rikan, whom the authors claim was actually a “madame” named Cathy Dieter. The address book belonged to a lawyer involved in the prostitution ring, Philip Macklin Bailey.
bullet According to the book, the other schemer involved in Watergate was Nixon’s chief of staff Alexander Haig. Haig wanted to conceal his role as part of a military network spying on Nixon and his national security adviser, Henry Kissinger (see December 1971). Haig orchestrated the titular “silent coup” to engineer Nixon’s removal from office.
bullet Haig was the notorious “Deep Throat,” the inside source for Washington Post reporter Bob Woodward (see May 31, 2005). Far from being a crusading young reporter, Woodward is, the book alleges, a “sleazy journalist” trying to cover up his background in military intelligence. Woodward had a strong, if covert, working relationship with Haig. [Columbia Journalism Review, 11/1991; Dean, 2006, pp. xv-xvii]
During the phone call, Wallace tells Dean, “According to Silent Coup, you, sir, John Dean, are the real mastermind of the Watergate break-ins, and you ordered these break-ins because you were apparently seeking sexual dirt on the Democrats, which you learned about from your then girlfriend, now wife, Maureen.” Wallace says that the book alleges that Dean had a secretive relationship with E. Howard Hunt, one of the planners of the Watergate burglary. Dean replies that he had little contact with Hunt during their White House careers, and calls the entire set of allegations “pure bullsh_t.” He continues: “Mike, I’m astounded. This sounds like a sick joke.” Wallace says that the authors and publisher, St. Martin’s Press, claim Dean was interviewed for the book, but Dean says no one has approached him about anything related to this book until this phone call. Dean says he is willing to refute the book’s claims on Wallace’s 60 Minutes, but wants to read it first. CBS cannot give Dean a copy of the book due to a confidentiality agreement. [Dean, 2006, pp. xv-xvii] Dean will succeed in convincing Time’s publishers not to risk a lawsuit by excerpting the book (see May 7, 1991), and will learn that the book was co-authored behind the scenes by Watergate burglar and conservative gadfly G. Gordon Liddy (see May 9, 1991 and After). The book will be published weeks later, where it will briefly make the New York Times bestseller list (see May 1991) and garner largely negative reviews (see June 1991).

Entity Tags: Heidi Rikan, G. Gordon Liddy, CBS News, Bob Woodward, Alexander M. Haig, Jr., St. Martin’s Press, Robert Gettlin, Philip Macklin Bailey, E. Howard Hunt, Maureen Dean, Mike Wallace, Leonard Colodny, Richard M. Nixon, Henry A. Kissinger, John Dean

Timeline Tags: Nixon and Watergate

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

Clarence Thomas survives the Senate hearings to join the Supreme Court.Clarence Thomas survives the Senate hearings to join the Supreme Court. [Source: PBS]The full Senate votes to confirm Clarence Thomas (see July 2-August 28, 1991, October 8, 1991, and October 11-12, 1991) on a 52-48 vote, the lowest margin of victory by any Supreme Court nominee in US history. It is possible that some senators’ votes are influenced by a wash of “fast-action” polls reported by the White House, purporting to show that African-Americans overwhelmingly support Thomas, and a majority of citizens support Thomas’s confirmation. A year later, analysis proves those polls to be completely wrong. [Thomas Hearings Website, 8/1997; Dean, 2007, pp. 146-153] In 1992, Senator Joseph Biden (D-DE), a member of the Senate Judiciary Committee, will say: “That last hearing was not about Clarence Thomas. It was not about Anita Hill. It was about a massive power struggle going on in this country, a power struggle between women and men, and a power struggle between minoritites and the majority.” [Thomas Hearings Website, 8/1997]

Entity Tags: US Supreme Court, Joseph Biden, Bush administration (41), Clarence Thomas, Senate Judiciary Committee

Timeline Tags: Civil Liberties

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Bomb damage in underground levels of the WTC in 1993.Bomb damage in underground levels of the WTC in 1993. [Source: Najlah Feanny/ Corbis]An attempt to topple the World Trade Center in New York City fails, but six people are killed and over 1,000 injured in the misfired blast. The explosion is caused by the detonation of a truck bomb in the underground parking garage. An FBI explosives expert will later state, “If they had found the exact architectural Achilles’ heel or if the bomb had been a little bit bigger, not much more, 500 pounds more, I think it would have brought her down.” Ramzi Yousef, who has close ties to Osama bin Laden, organizes the attempt. [Village Voice, 3/30/1993; US Congress, 2/24/1998] The New York Times will report on Emad Salem, an undercover agent who will be the key government witness in the trial against Yousef. Salem will testify that the FBI knew about the attack beforehand and told him it would thwart the attack by substituting a harmless powder for the explosives. However, an FBI supervisor called off this plan and the bombing was not stopped. [New York Times, 10/28/1993] Other suspects were ineptly investigated before the bombing as early as 1990. Several of the bombers were trained by the CIA to fight in the Afghan war and the CIA will conclude, in internal documents, that it was “partly culpable” for this bombing (see January 24, 1994). [Independent, 11/1/1998] 9/11 mastermind Khalid Shaikh Mohammed is an uncle of Yousef and also has a role in the bombing (see March 20, 1993). [Independent, 6/6/2002; Los Angeles Times, 9/1/2002] One of the bombers even leaves a message, which will be found by investigators, stating, “Next time, it will be very precise.” [Associated Press, 9/30/2001]

Entity Tags: Khalid Shaikh Mohammed, Federal Bureau of Investigation, Ramzi Yousef, Osama bin Laden, World Trade Center, Emad Salem, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb.Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb. [Source: National Geographic]Eight people are arrested, foiling a plot to bomb several New York City landmarks. The targets were the United Nations building, 26 Federal Plaza, and the Lincoln and Holland tunnels. This is known as the “Landmarks” or “Day of Terror” plot. The plotters are connected to Ramzi Yousef and the “Blind Sheikh,” Sheikh Omar Abdul-Rahman. If the bombing, planned for later in the year, had been successful, thousands would have died. An FBI informant named Emad Salem had infiltrated the group, gathering information that leads to arrests of the plotters (see April 23, 1993). [US Congress, 7/24/2003] Abdul-Rahman will eventually be sentenced to life in prison for a role in the plot. Nine others will be given long prison terms, including Ibrahim El-Gabrowny and Clement Rodney Hampton-El. [New York Times, 1/18/1996] Siddig Siddig Ali, who was possibly the main force behind the plot (see April 23, 1993), will eventually be sentenced to only 11 years in prison because he agreed to provide evidence on the other suspects [New York Times, 10/16/1999]

Entity Tags: Ramzi Yousef, Siddig Siddig Ali, Ibrahim El-Gabrowny, Clement Rodney Hampton-El, Emad Salem, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

A National Security Agency (NSA) linguist runs afoul of his superiors after he and other linguists submit a report concluding that Islamist terrorists are planning attacks on America. The analyst, who insists on remaining anonymous and is nicknamed “J” by press reports, is fluent in an unusual number of languages. His and his colleagues’ study of Arabic language messages, and the flow of money to terrorist organizations from Saudi Arabia, lead them to believe that Saudi extremists are plotting an attack. J will recall in January 2006: “You could see, this was the pure rhetoric of Osama bin Laden and his group, the exact same group, and we had an early indication.… All of us in the group had this view of a burgeoning threat, and suddenly we were all trotted off to the office of security. Then came the call to report for a battery of psychological tests.” J will issue further warnings of potential terrorist strikes, this time involving hijackers, passenger planes, and US buildings, in May 2001 (see May 2001). In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/25/2006]

Entity Tags: “J”, National Security Agency

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

The Alfred P. Murrah Building after being bombed.The Alfred P. Murrah Building after being bombed. [Source: CBS News]A truck bomb destroys the Alfred P. Murrah Federal Building in Oklahoma City, killing 168 people in America’s worst domestic terrorist attack. Timothy McVeigh, later convicted in the bombing, has ideological roots both in the Patriot world and among neo-Nazis like William Pierce, whose novel, The Turner Diaries (see 1978), served as a blueprint for the attack. [Washington Post, 4/20/1995; Southern Poverty Law Center, 6/2001; Clarke, 2004, pp. 127] Initially, many believe that no American set off the bomb, and suspect Islamist terrorists of actually carrying out the bombing (see 10:00 a.m. April 19, 1995 and After). Their suspicions prove groundless. Investigators will find that the bomb is constructed of some 5,000 pounds of ammonium nitrate and fuel oil, carried in 20 or so blue plastic 55-gallon barrels arranged inside a rented Ryder truck (see April 15, 1995). The bomb is detonated by a slow-burning safety fuse, most likely lit by hand. The fuse is attached to a much faster-burning detonation cord (“det cord”) which ignites the fertilizer and fuel-oil mixture. [New York Times, 4/27/1995] The Murrah Federal Building houses a number of federal agencies, including offices for the Bureau of Alcohol, Tobacco and Firearms (BATF); the Social Security Administration; the Housing and Urban Development (HUD), Veterans Affairs, and Agriculture departments; and the Secret Service. [Washington Post, 4/20/1995] It encompasses an entire city block, between 5th and 4th Streets and Harvey and Robinson Streets, and features a U-shaped, indented drive on 5th that allows for quick pickup and delivery parking. The entire building’s facade on this side is made of glass, allowing passersby to see into the offices in the building, as well as into the America’s Kids day care center on the second floor, which by this time is filling with children. It is in this driveway that McVeigh parks his truck. [Serrano, 1998, pp. 99-102]
Entering the City - McVeigh drives into Oklahoma City, entering around 8:30 a.m. from his overnight stop in Ponca City, Oklahoma; the details reported of his entrance into the city vary (see 7:00 a.m. - 8:35 a.m., April 19, 1995). At 8:55 a.m., a security camera captures the Ryder truck as it heads towards downtown Oklahoma City [Douglas O. Linder, 2006] , a sighting bolstered by three people leaving the building who later say they saw the truck parked in front of the Murrah Building around this time. At 8:57, a security camera captures an image of McVeigh’s Ryder truck being parked outside the Murrah Building in a handicapped zone. One survivor of the blast, Marine recruiter Michael Norfleet, later recalls seeing the Ryder truck parked just outside the building next to the little circle drive on 5th Street leading up to the main entrance of the building. Norfleet had parked his black Ford Ranger in front of the Ryder.
McVeigh Lights Fuses - McVeigh drives the Ryder truck west past the Murrah Building on NW Fourth Street, turns north on a one-way street, and turns right on Fifth Street. He pulls the truck over and parks near the Firestone store, next to a chain-link fence. He then lights the five-minute fuses from inside the cab (see 8:15 a.m. and After, April 18, 1995), sets the parking brake, drops the key behind the seat, opens the door, locks the truck, exits, and shuts the door behind him. A man later claims to have hit his brakes to avoid someone matching McVeigh’s description as he crossed Fifth Street around 9:00 a.m. McVeigh walks quickly toward a nearby YMCA building where he has hidden his getaway car, a battered yellow Mercury Marquis (see April 13, 1995), in the adjoining alleyway, crossing Robinson Street and crossing another street to get to the alleyway. He begins to jog as he approaches his car. He later says he remembers a woman looking at him as she is walking down the steps to enter the building; he will describe her as white, in her mid-30s, with dirty blonde hair. According to McVeigh’s own recollection, he is about 20 feet into the alley when the bomb goes off. [Stickney, 1996, pp. 184-185; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 158; Douglas O. Linder, 2006; The Oklahoman, 4/2009]
Truck Explodes - At 9:02 a.m., the truck explodes, destroying most of the Murrah Building and seriously damaging many nearby buildings. Eventually, it will be determined that 168 people die in the blast, including 19 children. Over 500 are injured. The children are in the second-story day care center just above the parking space where McVeigh leaves the Ryder truck. McVeigh will later tell his biographers that he is lifted off his feet by the power of the blast.
Devastation and Death - When the bomb detonates, the day care center and the children plummet into the basement. The building, constructed with large glass windows, collapses, sending a wave of flying glass shards and debris into the building and the surrounding area. The oldest victim is 73-year-old Charles Hurlbert, who has come to the Social Security office on the first floor. Hurlbert’s wife Jean, 67, also dies in the blast. The youngest victim is four-month-old Gabeon Bruce, whose mother is also in the Social Security office. One victim, Rebecca Anderson, is a nurse who runs towards the building to render assistance. She never makes it to the building; she is struck in the head by a piece of falling debris and will die in a hospital four days after the blast. Her heart and kidneys will be transplanted into survivors of the bombing. [Denver Post, 6/3/1997; New York Times, 6/3/1997; Serrano, 1998, pp. 153-154; Oklahoma City Journal Record, 3/29/2001] Sherri Sparks, who has friends still unaccounted for in the building, tells a reporter in the hours after the blast, “Oh, I can’t stand the thought of… those innocent children, sitting there playing, thinking they’re safe, and then this happens.” The explosion leaves a 30-foot-wide, 8-foot-deep crater in the street that is covered by the wreckage of the building’s upper floors. The north face of the nine-story building collapses entirely. [Washington Post, 4/20/1995; Washington Post, 4/22/1995] Mary Heath, a psychologist who works about 20 blocks from the Murrah Building, says the blast “shook the daylights out of things—it scared us to death. We felt the windows shake before we heard the noise.” In a neighboring building, a Water Resources Board meeting is just commencing; the audiotape of the meeting captures the sound of the blast (see 9:02 a.m. and After, April 19, 1995). [Washington Post, 4/20/1995; The Oklahoman, 4/2009] Norfleet, trapped in the Marine Corps office, is thrown into a wall by the explosion. His skull is fractured, and a shard of glass punctures his right eye. Three separate arteries are pierced, and Norfleet begins bleeding heavily. Two supply sergeants in the office are far less injured; Norfleet asks one, “How bad am I hurt?” and one replies, “Sir, you look really bad.” One of the two begins giving Norfleet first aid; Norfleet later recalls: “He immediately went into combat mode and started taking care of me. He laid me on a table and he started looking for bandages to administer first aid. And while I was laying on that table, I just knew that I was losing strength and that if I stayed in the building, I would die.” Norfleet wraps a shirt around his head and face to slow the bleeding, and the two sergeants help him to the stairs, through the fallen rubble, and eventually out. Norfleet will later say that he follows “a blood trail of somebody that had gone down the steps before me” to get outside, where he is quickly put into an ambulance. He loses almost half his body’s blood supply and his right eye. He will never fly again, and will soon be discharged for medical incapacity. [Serrano, 1998, pp. 161-162] Eighteen-month-old Phillip Allen, called “P.J.” by his parents, miraculously survives the blast. The floor gives way beneath him and he plunges 18 feet to land on the stomach of an adult worker on the floor below, Calvin Johnson. Landing on Johnson’s stomach saves P.J.‘s life. Johnson is knocked unconscious by the blast and by the impact of the little boy falling on him, but when he awakes, he carries the toddler to safety. P.J.‘s grandfather calls the child “Oklahoma’s miracle kid,” and media reports use the label when retelling the story of the miraculous rescue. P.J. is one of six children in the day care center to survive the blast. [Stickney, 1996, pp. 275-277] Some people later report their belief that the Murrah Building was rocked by a second explosion just moments after the first one, the second coming from a secure area managed by the Bureau of Alcohol, Tobacco and Firearms (BATF) that illegally stored explosives. Law professor Douglas O. Linder will later write, “Both seismic evidence and witness testimony supports the ‘two blast theory.’” [Douglas O. Linder, 2006] That theory is later disputed (see After 9:02 a.m. April 19, 1995).
Explosion's Effects Felt Miles Away - Buildings near the Murrah are also damaged, seven severely, including the Journal Record newspaper building, the offices of Southwestern Bell, the Water Resources Board, an Athenian restaurant, the YMCA, a post office building, and the Regency Tower Hotel. Two Water Resources Board employees and a restaurant worker are killed in the blast. The Journal Record building loses its roof. Assistant Fire Chief Jon Hansen later recalls, “The entire block looked like something out of war-torn Bosnia.” Every building within four blocks of the Murrah suffers some effects. A United Parcel Service truck 10 miles away has its windows shattered by the blast. Cars in parking lots around the area catch fire and burn. Millions of sheets of paper, and an innumerable number of glass shards, shower down for hundreds of feet around the building. [Stickney, 1996, pp. 28-30]
Truck Axle Crushes Nearby Car - Richard Nichols (no relation to bomber Timothy McVeigh’s co-conspirator Terry Nichols), a maintenance worker standing with his wife a block and a half away from the Murrah Building, is spun around by the force of the blast. They throw open the back door of their car and begin taking their young nephew Chad Nichols out of the back seat, when Richard sees a large shaft of metal hurtling towards them. The “humongous object… spinning like a boomerang,” as Richard later describes it, hits the front of their Ford Festiva, smashing the windshield, crushing the front end, driving the rear end high into the air, and sending the entire car spinning backwards about 10 feet. Chad is not seriously injured. The metal shaft is the rear axle of the Ryder truck. Later, investigators determine that it weighs 250 pounds and was blown 575 feet from where the truck was parked. Governor Frank Keating (R-OK) points out the axle to reporters when he walks the scene a day or so later, causing some media outlets to incorrectly report that Keating “discovered” the axle. The scene will take investigators days to process for evidence. [Stickney, 1996, pp. 32; New York Times, 6/3/1997; Serrano, 1998, pp. 187-189]
First Responders Begin Arriving - Within minutes, survivors begin evacuating the building, and first responders appear on the scene (see 9:02 a.m. - 10:35 a.m. April 19, 1995).
McVeigh's Getaway - McVeigh flees the bomb site in his Mercury getaway car (see 9:02 a.m. and After, April 19, 1995), but is captured less than 90 minutes later (see 9:03 a.m. -- 10:17 a.m. April 19, 1995).

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

April 25, 1996: New Anti-Terrorism Law Passed

President Clinton signs the Antiterrorism and Effective Death Penalty Act, which the New York Times calls “broad legislation that provides new tools and penalties for federal law-enforcement officials to use in fighting terrorism.” The Clinton administration proposed the bill in the aftermath of the Oklahoma City terrorist bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). In many ways, the original bill will be mirrored by the USA Patriot Act six years later (see October 26, 2001). Civil libertarians on both the left and right opposed the legislation. Political analyst Michael Freeman called the proposal one of the “worst assaults on civil liberties in decades,” and the Houston Chronicle called it a “frightening” and “grievous” assault on domestic freedoms. Many Republicans opposed the bill, and forced a compromise that removed increased wiretap authority and lower standards for lawsuits against sellers of guns used in crimes. CNN called the version that finally passed the Republican-controlled Congress a “watered-down version of the White House’s proposal. The Clinton administration has been critical of the bill, calling it too weak. The original House bill, passed last month, had deleted many of the Senate’s anti-terrorism provisions because of lawmakers’ concerns about increasing federal law enforcement powers. Some of those provisions were restored in the compromise bill.” [CNN, 4/18/1996; New York Times, 4/25/1996; Roberts, 2008, pp. 35] An unusual coalition of gun rights groups such as the National Rifle Association (NRA) and civil liberties groups such as the American Civil Liberties Union (ACLU) led the opposition to the law. [New York Times, 4/17/1996] By the time Congress passed the bill, it had been, in the words of FBI Director Louis Freeh, “stripped… of just about every meaningful provision.” [Roberts, 2008, pp. 35] The law makes it illegal in the US to provide “material support” to any organization banned by the State Department. [Guardian, 9/10/2001]

Entity Tags: William Jefferson (“Bill”) Clinton, Louis J. Freeh, National Rifle Association, American Civil Liberties Union, Clinton administration, Michael Freeman, USA Patriot Act, US Congress

Timeline Tags: Complete 911 Timeline, Civil Liberties, US Domestic Terrorism

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

Omar Nasiri, who informs on al-Qaeda for the British intelligence service MI6 and the French service Direction Générale de la Sécurité Extérieure (DSGE), makes contact with al-Qaeda logistics manager Abu Zubaida using a telephone bugged by MI6. Nasiri met Abu Zubaida in Pakistan (see Mid 1995-Spring 1996). Usually, when Nasiri calls the number, he talks to one of Abu Zubaida’s associates, but sometimes he talks to Abu Zubaida himself. The phone is used to relay messages between Abu Zubaida in Pakistan and al-Qaeda representatives in London, in particular leading imam Abu Qatada. The French will apparently make great use of this information (see October 1998 and After). [Nasiri, 2006, pp. 270-1, 273, 281]

Entity Tags: Direction Générale de la Sécurité Extérieure, Abu Zubaida, UK Secret Intelligence Service (MI6), Abu Qatada, Omar Nasiri

Timeline Tags: Complete 911 Timeline

On several occasion between 1996 and 1999, future 9/11 hijacker Hani Hanjour attends flight schools in Arizona (see October 1996-December 1997 and 1998). The 9/11 Commission will later note, “It is clear that when Hanjour lived in Arizona in the 1990s, he associated with several individuals who have been the subject of counterterrorism investigations.” Some of the time, he is accompanied by two friends, Bandar Al Hazmi and Rayed Abdullah. Al Hazmi and Abdullah have been friends with each other in high school in Saudi Arabia, but it is not known if either knew Hanjour before moving to the US. Al Hazmi and Hanjour are roommates for a time. Al Hazmi will finish his training and leave the US for the last time in January 2000 (he apparently will be interviewed overseas in 2004). Abdullah becomes a leader of a Phoenix mosque where he reportedly gives extremist speeches. He will continue to train with Hanjour occasionally through the summer of 2001. The FBI apparently will investigate him in May 2001. He will repeatedly be questioned by authorities after 9/11, then move to Qatar. In 2004, the 9/11 Commission will report that the FBI remains suspicious of Al Hazmi and Abdullah, but neither man is charged with any crime. The 9/11 Commission will also imply that another of Hanjour’s Arizona associates is al-Qaeda operative Ghassan al Sharbi. Al Sharbi will be arrested in Pakistan in March 2002 with al-Qaeda leader Abu Zubaida (see March 28, 2002). He apparently is a target of Ken Williams’s “Phoenix memo”(see July 10, 2001). Another associate of Hanjour’s, Hamed al Sulami, is in telephone contact with a radical Saudi imam who is said to be the spiritual advisor to al-Qaeda leader Abu Zubaida. This imam may have a role in recruiting some of the 9/11 hijackers. Abdulaziz Alomari, for instance, was a student of this imam. It seems that al Sulami is also a target of Williams’s memo. [Washington Post, 9/10/2002; US Congress, 9/26/2002; 9/11 Commission, 7/24/2004, pp. 233, 520-521, 529]

Entity Tags: Rayed Abdullah, Hani Hanjour, Bandar Al Hazmi, Ghassan al Sharbi, Hamed al Sulamis

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Counterterrorism expert Rohan Gunaratna will later write that after the US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), surveillance of al-Qaeda is stepped up around the world. “One intelligence officer attached to the French embassy in Islamabad, [Pakistan], urged his counterparts in foreign missions in Pakistan to detail the recipients of phone calls made by… al-Qaeda leader Abu Zubaida, then living in Peshawar, to individuals in their various countries.” As a result, “several governments [launch] investigations of their own.” [Gunaratna, 2003, pp. 245] A close associate of Zubaida in Peshawar at this time is Khalil Deek, who is actually a mole for the Jordanian government (see 1998-December 11, 1999). One such investigation is launched by the Philippine government on October 16, 1998, after being asked by French intelligence to gather intelligence on people in the Philippines in contact with Zubaida. Code named CoPlan Pink Poppy, the investigation reveals connections between al-Qaeda and the Moro Islamic Liberation Front (MILF), a Philippine militant group. On December 16, 1999, Abdesselem Boulanouar and Zoheir Djalili, two French Algerians belonging to the Algerian al-Qaeda affiliate the Salafist Group for Call and Combat (GSPC), are arrested due to information learned from monitoring Zubaida’s calls to the Philippines. Boulanouar is arrested at an airport carrying a terrorist training manual he admitted writing for the MILF. Both men also are arrested carrying explosive devices. French intelligence says Boulanouar had ties to Ahmed Ressam (see December 14, 1999), and like Ressam, may have been planning to carry out attacks at the turn of the millennium. He will be deported to France and imprisoned on terrorism related charges. CoPlan Pink Poppy will be canceled in 2000 for lack of funds. [Gulf News, 3/14/2000; Ressa, 2003, pp. 132-133; Gunaratna, 2003, pp. 245] However, while details are murky, it appears other governments continue to monitor Zubaida’s calls. Around the same time as the Philippines arrests, one militant in Jordan is even arrested while still in the middle of a phone call to Zubaida (see November 30, 1999). US intelligence will remain intensely focused on Zubaida before 9/11 (see Late March-Early April 2001 and May 30, 2001), and just days before 9/11 the NSA will monitor calls Zubaida is making to the US (see Early September 2001). It appears his calls will continue to be monitored after 9/11 as well (see October 8, 2001).

Entity Tags: Khalil Deek, Zoheir Djalili, Moro Islamic Liberation Front, Direction Générale de la Sécurité Extérieure, Abdesselem Boulanouar, Philippines, Abu Zubaida, Al-Qaeda, Ahmed Ressam, Salafist Group for Preaching and Combat

Timeline Tags: Complete 911 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Diana Dean.Diana Dean. [Source: Seattle Times]Al-Qaeda operative Ahmed Ressam is arrested in Port Angeles, Washington, attempting to enter the US with components of explosive devices. One hundred and thirty pounds of bomb-making chemicals and detonator components are found inside his rental car. He subsequently admits he planned to bomb Los Angeles International Airport on December 31, 1999. [New York Times, 12/30/2001] Alert border patrol agent Diana Dean stops him; she and other agents nationwide had been warned recently to look for suspicious activity. Ressam’s bombing would have been part of a wave of attacks against US targets over the New Year’s weekend (see December 15-31, 1999). He is later connected to al-Qaeda and convicted. [US Congress, 9/18/2002; PBS Frontline, 10/3/2002]

Entity Tags: Diana Dean, Ahmed Ressam, Los Angeles International Airport, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. [Source: FBI]About a dozen of Osama bin Laden’s trusted followers hold a secret, “top-level al-Qaeda summit” in the city of Kuala Lumpur, Malaysia. [CNN, 8/30/2002; San Diego Union-Tribune, 9/27/2002] According to an unnamed senior CIA official, before the summit started, the CIA learned that “11 young guys” were going to attend, and “young guys” is slang for operatives traveling. [Bamford, 2008, pp. 18] Plans for the October 2000 bombing of the USS Cole (see October 12, 2000) and the 9/11 attacks are discussed. [USA Today, 2/12/2002; CNN, 8/30/2002] At the request of the CIA, the Malaysian Secret Service monitors the summit and then passes the information on to the US (see January 5-8, 2000 and Shortly After). Attendees of the summit are said to include:
Nawaf Alhazmi and Khalid Almihdhar - The CIA and FBI will later miss many opportunities to foil the 9/11 plot through Alhazmi and Almihdhar and the knowledge of their presence at this summit. The CIA already knows many details about these two by the time the summit begins (see January 2-4, 2000), and tracked Almihdhar as he traveled to it (see January 2-5, 2000).
Yazid Sufaat - Sufaat is a Malaysian who owns the condominium where the summit is held. He is also a trained biologist and is said to be a leading figure in al-Qaeda’s attempts to get a biological or chemical weapon. [New York Times, 1/31/2002; Newsweek, 6/2/2002] Malaysian officials also recognize Sufaat from summit surveillance photos, as he is a long-time Malaysian resident (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002] A possibility to expose the 9/11 plot through Sufaat’s presence at this summit will later be missed in September 2000 (see September-October 2000). Sufaat will travel to Afghanistan in June 2001 and be arrested by Malaysian authorities when he returns to Malaysia in late 2001 (see December 19, 2001). [Australian, 12/24/2002] He will be released in 2008 (see December 4, 2008).
Hambali - An Indonesian militant known as Hambali, or Nurjaman Riduan Isamuddin [BBC, 8/15/2003] , was heavily involved in the Bojinka plot, an early version of the 9/11 plot (see January 6, 1995 and June 1994). [CNN, 3/14/2002; CNN, 8/30/2002] The FBI was aware of who he was and his connections to the Bojinka plot at least by 1999 and identified a photograph of him by that time (see May 23, 1999). He will be arrested by Thai authorities in August 2003 (see August 12, 2003). [CNN, 8/14/2003; CBS News, 8/15/2003] Malaysian officials recognize Hambali from summit surveillance photos, as he is a long-time Malaysian resident. But the US does not tell them of his Bojinka connections, so they will not know to arrest him after the summit is over (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002]
Khalid Shaikh Mohammed - Mohammed is sometimes referred to as “KSM,” an al-Qaeda leader and the alleged “mastermind” of the 9/11 attacks. The US has known KSM is an Islamic militant since the exposure of Operation Bojinka in January 1995 (see January 6, 1995), and knows what he looks like. US officials will state that they only realized the summit was important in 2001, but the presence of KSM should have proved its importance. [Los Angeles Times, 2/2/2002] Although the possible presence of KSM at this summit will be disputed by US officials, one counterterrorism expert will testify before the 9/11 Commission in 2003 that he has access to transcripts of KSM’s interrogations since his capture, and that KSM has admitted leading this summit and telling the attendees about a planes-as-weapons plot targeting the US (see July 9, 2003). [Newsweek, 7/9/2003; New York Post, 7/10/2003] Many other media reports will identify him as being there. [Independent, 6/6/2002; CNN, 8/30/2002; CNN, 11/7/2002; Canadian Broadcasting Corporation, 10/29/2003] For instance, according to Newsweek: “Mohammed’s presence would make the intelligence failure of the CIA even greater. It would mean the agency literally watched as the 9/11 scheme was hatched—and had photographs of the attack’s mastermind… doing the plotting.” [Newsweek, 7/9/2003] In Hambali’s 2008 Guantanamo file, it will be mentioned that KSM stays a week at Sufaat’s condominium with Alhazmi and Almihdhar, which would seem to make clear that KSM is there for the entire duration of the summit (see Early January 2000). [US Department of Defense, 10/30/2008]
Khallad bin Attash - Khallad bin Attash, a “trusted member of bin Laden’s inner circle,” is in charge of bin Laden’s bodyguards, and serves as bin Laden’s personal intermediary at least for the USS Cole bombing. [Newsweek, 9/20/2001 pdf file] He is also thought to be a “mastermind” of that attack. Attash is reportedly planning to be one of the 9/11 hijackers, but will be unable to get a US visa. [9/11 Commission, 6/16/2004, pp. 8] US intelligence had been aware of his identity as early as 1995. [US Congress, 9/18/2002] A possibility to expose the 9/11 plot through bin Attash’s presence at this summit will be missed in January 2001 (see January 4, 2001). Bin Attash had been previously arrested in Yemen for suspected terror ties, but was let go (see Summer 1999). [Contemporary Southeast Asia, 12/1/2002] He will be captured in Pakistan by the US in April 2003 (see April 29, 2003). In 2008, Newsweek will report that bin Attash confessed during interrogation that, while staying at Sufaat’s condominium, he and Alhazmi talked “about the possibility of hijacking planes and crashing them or holding passengers as hostages.” [Newsweek, 12/16/2008]
Abd al-Rahim al-Nashiri - Al-Nashiri is one of al-Qaeda’s top field commanders and operates out of Malaysia while 9/11 is being prepared. [Los Angeles Times, 10/10/2001; Gunaratna, 2003, pp. 188; Graham and Nussbaum, 2004, pp. 59] He was involved in an arms smuggling plot (see 1997) and the East African embassy bombings (see August 22-25 1998), in which his cousin was martyred (see 10:35-10:39 a.m., August 7, 1998). He also organized the attack against the USS The Sullivans (see January 3, 2000), and will be involved in the attacks against the USS Cole (see October 12, 2000) and the Limburg (see October 6, 2002). He will be arrested in the United Arab Emirates in November 2002 (see Early October 2002). An al-Qaeda operative identified a photo of al-Nashiri for the FBI in late 1998 (see August 22-25 1998). [9/11 Commission, 7/24/2004, pp. 152-3] (Note: in the sources, al-Nashiri is referred to by two of his aliases: Muhammad Omar al-Harazi and Al Safani.) [CNN, 12/11/2000; Central Intelligence Agency, 9/6/2006]
Ramzi bin al-Shibh - Investigators believe he wants to be the 20th 9/11 hijacker. His presence at the summit may not be realized until after 9/11, despite the fact that US intelligence has a picture of him next to bin Attash, and has video footage of him. [Newsweek, 11/26/2001; Washington Post, 7/14/2002; Time, 9/15/2002; Die Zeit (Hamburg), 10/1/2002; CNN, 11/7/2002] German police will have credit card receipts indicating bin al-Shibh is in Malaysia at this time. [Los Angeles Times, 9/1/2002] Ulrich Kersten, director of Germany’s federal anticrime agency, the Bundeskriminalamt, will later say, “There are indications that Ramzi bin al-Shibh was in Kuala Lumpur for the meeting.” [New York Times, 8/24/2002] Another account noting he was photographed at the summit will further note that he enters and leaves Thailand three times in the first three weeks of January 2000. [Los Angeles Times, 10/17/2001] Anonymous Malaysian officials will later claim he is at the summit, but US officials will deny it. Two local militants who serve as drivers for the attendees will later be arrested in Malaysia. They will be shown photos of the attendees, and confirm that bin al-Shibh was at the summit. [Associated Press, 9/20/2002] One account will say he is recognized at the time of the summit, which makes it hard to understand why he is not tracked back to Germany and the Hamburg cell with Mohamed Atta and other 9/11 hijackers. [Der Spiegel (Hamburg), 10/1/2002] Another opportunity to expose the 9/11 plot through bin al-Shibh’s presence at this summit will be missed in June. It appears bin al-Shibh and Almihdhar are directly involved in the attack on the USS Cole in October 2000 (see October 10-21, 2000). [Guardian, 10/15/2001; Washington Post, 7/14/2002; Newsweek, 9/4/2002]
Salem Alhazmi - Alhazmi, a 9/11 hijacker and brother of Nawaf Alhazmi, is possibly at the summit, although very few accounts will mention it. [Australian, 12/24/2002] US intelligence intercepts from before the summit indicate that he at least had plans to attend. [US Congress, 7/24/2003, pp. 51 pdf file]
Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said) - A Yemeni al-Qaeda operative, al-Taizi is reportedly meant to be one of the 9/11 hijackers, but will be unable to enter the US due to greater scrutiny for Yemenis. [9/11 Commission, 6/16/2004, pp. 8] Al-Taizi will be captured in Pakistan in February 2002, and then sent to the US prison in Guantanamo a few months later (see February 7, 2002). According to his 2008 Guantanamo file, he traveled from Afghanistan to Malaysia with bin Attash about two weeks before the summit. Bin Attash was missing a leg, and he had a prosthetic leg fitted and then stayed in the hospital to recover from the surgery. Bin Attash and al-Taizi stay at Sufaat’s house for the duration of the summit. Al-Taizi then flies to Yemen to visit his family there. [US Department of Defense, 10/25/2008]
Others - Unnamed members of the Egyptian-based Islamic Jihad are also said to be at the summit. [Cox News Service, 10/21/2001] Islamic Jihad merged with al-Qaeda in February 1998. [ABC News, 11/17/2001] However, according to the Wall Street Journal, bin Attash and Fahad al-Quso are suspected of being Islamic Jihad members at one point, so this may just be a reference to them. [Wall Street Journal, 10/8/2001] Note that there are a total of 10 names mentioned above, and it will be reported that the CIA learned that 11 operatives were to attend, so either not all of them make it, or some names of attendees will remain unknown.
Summit Associates - The following individuals are probably not at the summit meetings, but are in the region and assisting or linked with the attendees at this time:
Fahad Al-Quso - Al-Quso is a top al-Qaeda operative who is involved in the bombing of the USS Cole. Some sources will indicate al-Quso is present in Malaysia, and a person who looks like him will later be seen in a photograph of the meeting (see June 11, 2001). [Newsweek, 9/20/2001 pdf file] However, other sources will say al-Quso did not reach Kuala Lumpur, but met with bin Attash around this time in Bangkok, Thailand (see January 5-6, 2000 and January 8-15, 2000). [9/11 Commission, 7/24/2004, pp. 159; Wright, 2006, pp. 330] Although al-Quso apparently is not at the summit, there are a series of phone calls during the time of the summit between his hotel in Bangkok, a phone booth near the condominium where the summit is held, and his family home in Yemen (see (January 5-8, 2000)). Al-Quso will be arrested by Yemeni authorities in the fall of 2000 (see Late October-Late November 2000), but the FBI will not be given a chance to fully interrogate him before 9/11. He will escape from prison in 2003. [CNN, 5/15/2003]
Ahmad Sajuli Abdul Rahman - An operative of Jemaah Islamiyah, al-Qaeda’s Southeast Asian affiliate, Sajuli takes the visiting Arabs around Kuala Lumpur, but apparently does not attend the summit meetings. [US Congress, 10/17/2002] According to the later Guantanamo file of summit attendee al-Taizi, one of the attendees Sajuli escorts around town is future 9/11 hijacker Khalid Almihdhar. Sajuli also helps arrange al-Taizi’s transportation at the end of the summit. [US Department of Defense, 10/25/2008] Sajuli will be arrested in Malaysia in December 2001 (see December 29, 2001).
Ahmad Hikmat Shakir - A suspected al-Qaeda agent of Iraqi nationality, Shakir is a greeter at Kuala Lumpur airport. He meets Almihdhar there and travels with him to the apartment where the summit is held, but he probably does not attend the summit meetings. [Associated Press, 10/2/2002; Newsweek, 10/7/2002; Australian, 12/24/2002; Knight Ridder, 6/12/2004] After 9/11, he will be linked to the 1993 World Trade Center bombing and the 1995 Bojinka plot. Jordan will arrest him and let him go after the US says it doesn’t want to take custody of him (see September 17, 2001).
Dhiren Barot - Dhiren Barot (a.k.a. Abu Eissa al-Hindi) is a British citizen of Indian descent. According to a 2006 Observer article, Barot “is not believed to have been present” at the summit meetings. However, he does go to Kuala Lumpur during the time of the summit with summit attendee bin Attash. And shortly after the summit, Barot holds meetings with Hambali. It will later be reported that Barot is sent by KSM to New York City in early 2001 to case potential targets there, although whether this is part of the 9/11 plot or some other plot is unclear (see May 30, 2001). Barot will be arrested in 2004 in Britain for plotting attacks there, and sentenced to 30 years in prison (see August 3, 2004). [Observer, 12/12/2006]
Another Unnamed Local Militant - Malaysian officials will say that two local Jemaah Islamiyah act as drivers for the attendees. These drivers apparently have no idea who the attendees are or what they are doing; they are just tasked to drive them around. In a 2002 Associated Press article, officials will not name these drivers, but will say that they are among the dozens of alleged Jemaah Islamiyah militants arrested in December 2001 and January 2002. Since Sajuli mentioned above is arrested at that time, he presumably is one of these drivers. It is not known who the other driver is. (Sufaat will be arrested at that time as well, but the Associated Press article will make clear Sufaat is not one of the drivers.) [Associated Press, 9/20/2002]
Probably Not Involved: Mohamed al-Khatani - A Saudi, he allegedly will confess to attending the summit while being held in the US Guantanamo prison (see July 2002). He apparently will unsuccessfully attempt to enter the US in August 2001 to join the 9/11 plot (see August 4, 2001). However, al-Khatani will later recant his testimony and say he lied to avoid torture (see October 26, 2006). Furthermore, his 2008 Guantanamo file, leaked to the public in 2011, contains no hint of him even possibly attending the summit. The contents of the file must be treated with extreme caution, especially since he is repeatedly and brutally tortured (see August 8, 2002-January 15, 2003 and January 14, 2009). But according to the general narrative of the file, al-Khatani had no involvement with Islamist militancy in early 2000, only starts to get involved with militants in mid-2000, and first attends a militant training camp in Afghanistan in late 2000. [US Department of Defense, 10/30/2008]

Entity Tags: Hambali, Abu Bara al-Taizi, Dhiren Barot, Central Intelligence Agency, Ahmad Hikmat Shakir, Ahmad Sajuli Abdul Rahman, Al-Qaeda, Abd al-Rahim al-Nashiri, Islamic Jihad, Jemaah Islamiyah, Fahad al-Quso, Khalid Shaikh Mohammed, Ulrich Kersten, Yazid Sufaat, Khalid Almihdhar, Ramzi bin al-Shibh, Salem Alhazmi, Mohamed al-Khatani, Malaysian Secret Service, Khallad bin Attash, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Page 1 of 6 (560 events)
previous | 1, 2, 3, 4, 5, 6 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike